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"], 0x1228}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0xf0, 0x28, 0x1, 0x0, 0x0, {{@in6=@private2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@local}, @in=@private}}, 0xf0}}, 0x0) 05:41:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:41:06 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x800}, 0x1c) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) 05:41:06 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x800}, 0x1c) clock_getres(0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) [ 467.145092] FAT-fs (loop4): bogus number of reserved sectors [ 467.146425] FAT-fs (loop4): Can't find a valid FAT filesystem 05:41:06 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', 0x0}) 05:41:06 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb052) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xd9a00, 0x1000}, 0x18, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000000)='./file2\x00', 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file2\x00') fcntl$setlease(r1, 0x400, 0x1) fcntl$setown(r1, 0x8, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9}, 0x9) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000500)={'syz1', "c2c084adbe9cb64dcf5a5c42fe915cf8cd94c7a4994d89856fbb159f3902a2dc3344926f9cfa3763cfcdc0ce4cffc70bd9c4bc0d1544f1800fd3f5cad73e349ff11f448c43fc9333456c20ed9f44f9d5208c823966f57bcd336e81e89fe461b7796394e3983831889680faf7f66bed01094f1e539a82be344dbfee33f351111fe3d508a692b078d48a572a59d42f0707129a710504ae32335c577a8587e30f779ac5908fb9f5f2949604d4c4fca9e2c0c3557afc7ecd0956bf004834605f6c688074e2936cb17f32470d78415064886e6e29767bb1029657f9b85109f7fd9df6c89f9dab1eeadbf26078"}, 0xee) mount$tmpfs(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), 0x2022440, &(0x7f0000000200)={[{@huge_never}, {@nr_blocks={'nr_blocks', 0x3d, [0xaed3baf14b1df9a5, 0x35, 0x67, 0x31, 0x33, 0xc]}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'local', '', @val={0x3a, [0x37, 0x0, 0x35, 0x39, 0x2c, 0x2d, 0x32, 0x33]}}}}], [{@appraise_type}, {@pcr={'pcr', 0x3d, 0x1f}}]}) socket$netlink(0x10, 0x3, 0x0) creat(&(0x7f0000000040)='./file2\x00', 0x0) 05:41:06 executing program 0: keyctl$chown(0x4, 0x0, 0xee01, 0xee00) r0 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000500)={'fscrypt:', @desc4}, &(0x7f0000000680)={0x0, "51bab78fbede0eb5fae9c09d1193a258a2e3125ffdcd424c2f8cf56e277a15201fa83a9d96dbd58e991ffb9e07a1638e07a037807e7786eb446cd80e9a5867be", 0x3b}, 0x48, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000700)='id_legacy\x00', &(0x7f0000000740)=@keyring={'key_or_keyring:', r0}) r2 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r0) r3 = add_key$fscrypt_v1(&(0x7f0000000300), &(0x7f0000000380)={'fscrypt:', @desc2}, &(0x7f0000000480)={0x0, "e776948c30407f746b4bce4fe1dfd22cfc491372bfef696cb8114417300486c7dc67510f255163554a8b1c56f99015cff18dde6bfd24cab6fc6fe129421a032a", 0x10032}, 0x48, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, &(0x7f0000000400)=@chain={'key_or_keyring:', r3}) add_key$keyring(0x0, &(0x7f0000000800)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000100), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000340), &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r1) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='wchan\x00') add_key$keyring(&(0x7f0000000240), &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) add_key$fscrypt_provisioning(&(0x7f0000000640), &(0x7f0000000780)={'syz', 0x0}, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYRES64=r0, @ANYRESOCT, @ANYRES32=0x0, @ANYRES32, @ANYRES64=r2, @ANYRESHEX, @ANYRESOCT], 0x29, 0xfffffffffffffff9) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r5, 0x0, &(0x7f0000000380)='\x00', 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}, 0x3040, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412e500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r4}}, 0x58) 05:41:06 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x800}, 0x1c) clock_getres(0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:41:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:41:06 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:41:06 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', 0x0}) [ 467.338794] loop4: detected capacity change from 0 to 41948160 [ 467.371590] FAT-fs (loop4): bogus number of reserved sectors [ 467.372922] FAT-fs (loop4): Can't find a valid FAT filesystem 05:41:06 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:06 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x800}, 0x1c) clock_getres(0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:41:06 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:06 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) clock_getres(0x8, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r4 = openat$incfs(r1, &(0x7f0000000140)='.log\x00', 0x402000, 0x10) sendfile(r4, r1, 0x0, 0x26a7) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000000c0)='\x00', 0x0, r3) read(r3, &(0x7f0000000000), 0x1b4000) 05:41:06 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam}) 05:41:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{0x0}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:41:07 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x800}, 0x1c) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) 05:41:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 467.627003] loop4: detected capacity change from 0 to 41948160 [ 467.645526] FAT-fs (loop4): bogus number of reserved sectors [ 467.647072] FAT-fs (loop4): Can't find a valid FAT filesystem 05:41:07 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam}) 05:41:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:41:21 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:21 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:21 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x800}, 0x1c) clock_getres(0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:41:22 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam}) 05:41:22 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:22 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:41:22 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) clock_getres(0x8, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r4 = openat$incfs(r1, &(0x7f0000000140)='.log\x00', 0x402000, 0x10) sendfile(r4, r1, 0x0, 0x26a7) read(r3, &(0x7f0000000000), 0x1b4000) [ 482.583511] loop4: detected capacity change from 0 to 41948160 [ 482.603673] FAT-fs (loop4): bogus number of reserved sectors [ 482.604993] FAT-fs (loop4): Can't find a valid FAT filesystem 05:41:22 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) bind$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0x800}, 0x1c) clock_getres(0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:41:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) 05:41:33 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:41:33 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:41:33 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 1) 05:41:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:33 executing program 0: fdatasync(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000140)={0x9, 0x1, {0xffffffffffffffff, 0x3, 0x3ff, 0x3, 0xfff}, 0x1}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f00000003c0)={0x2, 0x2, {0xffffffffffffffff, 0x1, 0x78f, 0x0, 0x7fff}, 0x7fffffff}) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x80489439, &(0x7f00000002c0)) r1 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000700)=[{&(0x7f0000000100)="b91d99d3a3908a50f31eb323e6", 0xd, 0xfffffffffffffffd}, {&(0x7f0000000440)="76457a6531320c82f75fe3c8a5109e07a78b18a4f122a52e6abe0da1cb4f5ad0339f28991bd24a0f772a05f7edb28f08413d4af46cf6264f6db9ef52caf40bb70d2548fa594b82a99f8bd458c5de9c5e9f5ec298eba310759858c86683ec50fd1c4c34039562053ad43d4437cf5cb6f41fd5faecbb33a0b6cab1a5928c348a4b0a54f7a2836b1c87246cdd14e2a0c99ed3895c1e55bc4146b12b148e2013df21bd120b6a0f06c905e49027", 0xab, 0x3f}, {&(0x7f0000000200)="b98c78", 0x3, 0x4}, {&(0x7f0000000500)="edb5b51e676d47300e3dd73dc790b215f3bfacfaa2f5c74f25ecbd9eedf699c439ec87b63aa671938a7fb1af2ab6967e7d0cf69c7d1d81f1a25da397248171aa54aa3f2fdd887a9d79e572a1004ee85a5034f25a307b757471eb14b4650f5e5ba34c159d220c1ace743fd81f9d10e9519fc8fe53505859bc4ec494cd6d0864d7bcb22d0d09c8905e74b48815d29b87bd0780f07788e712cb910e71b7e8d71d5408cd959e225fcba7dcb725c6f1db19dfdce6e89b69fe62af753b12ee3a13038035e661ef2d882ff9212a371399d45f27b0f8e98f5e220152f9f67a01cc7eeb1ca294c6b9a8dcf7fd156ab922cc00f221348c2fc73a19424e", 0xf8, 0x80000001}, {&(0x7f0000000340)="2e4d2807b85b98456d9a897edb7dae95d50d86b7fcbc03ed1f", 0x19, 0x1}, {&(0x7f0000000600)="90da283e5657bc483135fb8104139e08b3d64e348be0538cdcc247f42ae40a044d398feecf6535b48da538bf352cf6e9f0a807564270ee8a3ddad22960ffe2aa75c38364cb41e559e2d9d99487ab615aa18c9f17652d62fe92ec1076252505ee8ad357cd94e21c5ba2878aa2377b4c3c7e00287bb44475758b702ab566687ec66bdcba191e4e886d55808de7bb5bb059ad43138271d546763267bd2b73af0f85113585d0adbfed6518e627c592897624abe4997f56498fe4276563c86bdebd1d3189b76e84fb98824f59915d887b41f2885293800773aec282894fed431e50d864cbcf7b4888cf305f1a316f900539", 0xef, 0x800}], 0x41000, &(0x7f00000007c0)={[], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@smackfsroot={'smackfsroot', 0x3d, 'vfat\x00'}}, {@euid_eq}, {@dont_appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x30, 0x35, 0x26, 0x35, 0x38, 0x62, 0x37], 0x2d, [0x64, 0x60, 0x38, 0x32], 0x2d, [0x35, 0x35, 0x496d7c80ed655459, 0x32], 0x2d, [0x61, 0x37, 0x39, 0x62], 0x2d, [0x65, 0x64, 0x39, 0x65, 0x30, 0x3d, 0x35, 0x33]}}}]}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000380)={@id={0x2, 0x0, @c}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='vfat\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r3, 0x1}, 0x14}}, 0x0) ftruncate(r2, 0x5) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x240280) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f00000001c0)=0x9) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) 05:41:33 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) clock_getres(0x8, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) openat$incfs(r1, &(0x7f0000000140)='.log\x00', 0x402000, 0x10) read(r3, &(0x7f0000000000), 0x1b4000) [ 494.318675] loop4: detected capacity change from 0 to 41948160 [ 494.331303] FAULT_INJECTION: forcing a failure. [ 494.331303] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 494.333833] CPU: 1 PID: 5686 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 494.335303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 494.337064] Call Trace: [ 494.337629] dump_stack+0x107/0x167 [ 494.338407] should_fail.cold+0x5/0xa [ 494.338748] FAT-fs (loop4): bogus number of reserved sectors [ 494.339235] _copy_from_user+0x2e/0x1b0 [ 494.340511] FAT-fs (loop4): Can't find a valid FAT filesystem [ 494.341282] sock_do_ioctl+0x153/0x300 [ 494.343326] ? compat_ifr_data_ioctl+0x180/0x180 [ 494.344340] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 494.345564] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 494.346671] ? do_vfs_ioctl+0x283/0x10d0 [ 494.347544] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 494.348657] ? generic_block_fiemap+0x60/0x60 [ 494.349610] ? lock_downgrade+0x6d0/0x6d0 [ 494.350494] sock_ioctl+0x3ef/0x710 [ 494.351276] ? dlci_ioctl_set+0x30/0x30 [ 494.352128] ? selinux_file_ioctl+0xb6/0x270 [ 494.353066] ? dlci_ioctl_set+0x30/0x30 [ 494.353919] __x64_sys_ioctl+0x19a/0x210 [ 494.354789] do_syscall_64+0x33/0x40 [ 494.355746] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 494.356945] RIP: 0033:0x7fa66ccb2b19 [ 494.357732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 494.361900] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 494.363540] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 494.365065] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 494.366594] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 494.368119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 494.369643] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 [ 494.413139] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:41:33 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) clock_getres(0x8, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) 05:41:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:41:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:41:33 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:41:33 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) [ 494.554082] loop4: detected capacity change from 0 to 41948160 05:41:34 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 2) [ 494.562194] FAT-fs (loop4): bogus number of reserved sectors [ 494.563513] FAT-fs (loop4): Can't find a valid FAT filesystem [ 494.607872] FAULT_INJECTION: forcing a failure. [ 494.607872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 494.610403] CPU: 0 PID: 5701 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 494.612019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 494.613819] Call Trace: [ 494.614384] dump_stack+0x107/0x167 [ 494.615168] should_fail.cold+0x5/0xa [ 494.615989] _copy_from_user+0x2e/0x1b0 [ 494.616839] dev_ethtool+0x181/0x4b00 [ 494.617657] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 494.618775] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 494.620013] ? find_held_lock+0x2c/0x110 [ 494.620883] ? lock_acquire+0x197/0x470 [ 494.621723] ? dev_ioctl+0x2ad/0xd30 [ 494.622520] ? lock_release+0x680/0x680 [ 494.623378] ? avc_has_extended_perms+0x7f1/0xf40 [ 494.624415] ? __mutex_lock+0x4fe/0x10b0 [ 494.625274] ? dev_ioctl+0x2ad/0xd30 [ 494.626058] ? lock_acquire+0x197/0x470 [ 494.626899] ? find_held_lock+0x2c/0x110 [ 494.627765] ? mutex_lock_io_nested+0xf30/0xf30 [ 494.628755] ? dev_load+0x7b/0x250 [ 494.629510] ? lock_downgrade+0x6d0/0x6d0 [ 494.630381] ? inet6_release+0x70/0x70 [ 494.631219] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 494.632339] dev_ioctl+0x2b8/0xd30 [ 494.633091] sock_do_ioctl+0x17d/0x300 [ 494.633911] ? compat_ifr_data_ioctl+0x180/0x180 [ 494.634915] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 494.636141] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 494.637237] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 494.638343] ? generic_block_fiemap+0x60/0x60 [ 494.639294] ? lock_downgrade+0x6d0/0x6d0 [ 494.640172] sock_ioctl+0x3ef/0x710 [ 494.640942] ? dlci_ioctl_set+0x30/0x30 [ 494.641787] ? selinux_file_ioctl+0xb6/0x270 [ 494.642714] ? dlci_ioctl_set+0x30/0x30 [ 494.643567] __x64_sys_ioctl+0x19a/0x210 [ 494.644433] do_syscall_64+0x33/0x40 [ 494.645220] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 494.646298] RIP: 0033:0x7fa66ccb2b19 [ 494.647089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 494.650974] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 494.652604] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 494.654129] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 494.655647] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 494.657160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 494.658673] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:41:45 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:45 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:45 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:41:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:41:45 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:45 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 3) 05:41:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:41:45 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) clock_getres(0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) [ 506.449693] FAULT_INJECTION: forcing a failure. [ 506.449693] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 506.452259] CPU: 0 PID: 5718 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 506.453712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 506.455567] Call Trace: [ 506.456143] dump_stack+0x107/0x167 [ 506.456913] should_fail.cold+0x5/0xa [ 506.457730] _copy_from_user+0x2e/0x1b0 [ 506.458580] dev_ethtool+0x2b80/0x4b00 [ 506.459423] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 506.460544] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 506.461776] ? find_held_lock+0x2c/0x110 [ 506.462657] ? lock_acquire+0x197/0x470 [ 506.463516] ? dev_ioctl+0x2ad/0xd30 [ 506.464314] ? lock_release+0x680/0x680 [ 506.465162] ? avc_has_extended_perms+0x7f1/0xf40 [ 506.466198] ? __mutex_lock+0x4fe/0x10b0 [ 506.467060] ? dev_ioctl+0x2ad/0xd30 [ 506.467868] ? lock_acquire+0x197/0x470 [ 506.468710] ? find_held_lock+0x2c/0x110 [ 506.469580] ? mutex_lock_io_nested+0xf30/0xf30 [ 506.470569] ? dev_load+0x7b/0x250 [ 506.471331] ? lock_downgrade+0x6d0/0x6d0 [ 506.472206] ? inet6_release+0x70/0x70 [ 506.473035] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 506.474151] dev_ioctl+0x2b8/0xd30 [ 506.475419] sock_do_ioctl+0x17d/0x300 [ 506.476248] ? compat_ifr_data_ioctl+0x180/0x180 [ 506.477253] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 506.478465] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 506.479570] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 506.480685] ? generic_block_fiemap+0x60/0x60 [ 506.481632] ? lock_downgrade+0x6d0/0x6d0 [ 506.482514] sock_ioctl+0x3ef/0x710 [ 506.483321] ? dlci_ioctl_set+0x30/0x30 [ 506.484167] ? selinux_file_ioctl+0xb6/0x270 [ 506.485103] ? dlci_ioctl_set+0x30/0x30 [ 506.485949] __x64_sys_ioctl+0x19a/0x210 [ 506.486812] do_syscall_64+0x33/0x40 [ 506.487609] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 506.488698] RIP: 0033:0x7fa66ccb2b19 [ 506.489479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 506.493392] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 506.495030] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 506.496577] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 506.498097] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 506.499639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 506.501161] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 [ 506.509430] loop4: detected capacity change from 0 to 41948160 [ 506.523326] FAT-fs (loop4): bogus number of reserved sectors [ 506.524761] FAT-fs (loop4): Can't find a valid FAT filesystem 05:41:45 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) clock_getres(0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:41:46 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:41:46 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:41:46 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 506.715073] loop4: detected capacity change from 0 to 41948160 [ 506.735530] FAT-fs (loop4): bogus number of reserved sectors [ 506.736869] FAT-fs (loop4): Can't find a valid FAT filesystem 05:41:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:41:58 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) clock_getres(0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:41:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400", 0xc}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 519.508221] loop4: detected capacity change from 0 to 41948160 05:41:58 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:41:58 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:41:58 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 4) [ 519.527595] FAT-fs (loop4): bogus number of reserved sectors [ 519.529030] FAT-fs (loop4): Can't find a valid FAT filesystem [ 519.548932] FAULT_INJECTION: forcing a failure. [ 519.548932] name failslab, interval 1, probability 0, space 0, times 1 [ 519.551377] CPU: 1 PID: 5750 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 519.552836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 519.554596] Call Trace: [ 519.555156] dump_stack+0x107/0x167 [ 519.555942] should_fail.cold+0x5/0xa [ 519.556752] ? __get_vm_area_node+0xd4/0x340 [ 519.557677] should_failslab+0x5/0x20 [ 519.558484] kmem_cache_alloc_node_trace+0x59/0x340 [ 519.559563] __get_vm_area_node+0xd4/0x340 [ 519.560468] __vmalloc_node_range+0x13f/0x9e0 [ 519.561420] ? dev_ethtool+0x2bb8/0x4b00 [ 519.562276] ? dev_ethtool+0x2bb8/0x4b00 [ 519.563137] ? __might_fault+0xd3/0x180 [ 519.563986] ? lock_downgrade+0x6d0/0x6d0 [ 519.564859] ? __vmalloc_node+0x110/0x110 [ 519.565755] ? dev_ethtool+0x2bb8/0x4b00 [ 519.566615] __vmalloc_node+0xb5/0x110 [ 519.567475] ? dev_ethtool+0x2bb8/0x4b00 [ 519.568337] dev_ethtool+0x2bb8/0x4b00 [ 519.569161] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 519.570268] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 519.571509] ? find_held_lock+0x2c/0x110 [ 519.572381] ? lock_acquire+0x197/0x470 [ 519.573218] ? dev_ioctl+0x2ad/0xd30 [ 519.574013] ? lock_release+0x680/0x680 [ 519.574854] ? avc_has_extended_perms+0x7f1/0xf40 [ 519.575889] ? __mutex_lock+0x4fe/0x10b0 [ 519.576744] ? dev_ioctl+0x2ad/0xd30 [ 519.577538] ? lock_acquire+0x197/0x470 [ 519.578371] ? find_held_lock+0x2c/0x110 [ 519.579222] ? mutex_lock_io_nested+0xf30/0xf30 [ 519.580213] ? dev_load+0x7b/0x250 [ 519.580965] ? lock_downgrade+0x6d0/0x6d0 [ 519.581834] ? inet6_release+0x70/0x70 05:41:58 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) [ 519.582655] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 519.584021] dev_ioctl+0x2b8/0xd30 [ 519.584780] sock_do_ioctl+0x17d/0x300 [ 519.585604] ? compat_ifr_data_ioctl+0x180/0x180 [ 519.586605] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 519.587835] ? __sanitizer_cov_trace_switch+0x45/0x80 05:41:59 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) [ 519.588932] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 519.590151] ? generic_block_fiemap+0x60/0x60 [ 519.591131] ? lock_downgrade+0x6d0/0x6d0 [ 519.592021] sock_ioctl+0x3ef/0x710 [ 519.592786] ? dlci_ioctl_set+0x30/0x30 [ 519.593632] ? selinux_file_ioctl+0xb6/0x270 [ 519.594560] ? dlci_ioctl_set+0x30/0x30 [ 519.595410] __x64_sys_ioctl+0x19a/0x210 [ 519.596273] do_syscall_64+0x33/0x40 [ 519.597057] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 519.598137] RIP: 0033:0x7fa66ccb2b19 [ 519.598925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 519.602809] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 519.604419] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 519.605922] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 519.607429] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 519.608935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 519.610438] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:41:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) [ 519.613079] syz-executor.7: vmalloc: allocation failure: 232 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz7,mems_allowed=0 [ 519.616488] CPU: 1 PID: 5750 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 519.617938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 519.619693] Call Trace: [ 519.620246] dump_stack+0x107/0x167 [ 519.621029] warn_alloc.cold+0x95/0x18a [ 519.621879] ? zone_watermark_ok_safe+0x260/0x260 [ 519.622900] ? __get_vm_area_node+0xd4/0x340 [ 519.623839] ? __kasan_kmalloc.constprop.0+0xa2/0xd0 [ 519.624914] ? __get_vm_area_node+0x262/0x340 [ 519.625869] __vmalloc_node_range+0x58f/0x9e0 [ 519.626822] ? dev_ethtool+0x2bb8/0x4b00 [ 519.627687] ? __might_fault+0xd3/0x180 [ 519.628537] ? lock_downgrade+0x6d0/0x6d0 [ 519.629410] ? __vmalloc_node+0x110/0x110 [ 519.630293] ? dev_ethtool+0x2bb8/0x4b00 [ 519.631149] __vmalloc_node+0xb5/0x110 [ 519.631983] ? dev_ethtool+0x2bb8/0x4b00 [ 519.632845] dev_ethtool+0x2bb8/0x4b00 [ 519.633672] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 519.634780] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 519.636023] ? find_held_lock+0x2c/0x110 [ 519.636890] ? lock_acquire+0x197/0x470 [ 519.637732] ? dev_ioctl+0x2ad/0xd30 [ 519.638519] ? lock_release+0x680/0x680 [ 519.639375] ? avc_has_extended_perms+0x7f1/0xf40 [ 519.640415] ? __mutex_lock+0x4fe/0x10b0 [ 519.641273] ? dev_ioctl+0x2ad/0xd30 [ 519.642057] ? lock_acquire+0x197/0x470 [ 519.642893] ? find_held_lock+0x2c/0x110 [ 519.643764] ? mutex_lock_io_nested+0xf30/0xf30 [ 519.644743] ? dev_load+0x7b/0x250 [ 519.645491] ? lock_downgrade+0x6d0/0x6d0 [ 519.646361] ? inet6_release+0x70/0x70 [ 519.647183] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 519.648302] dev_ioctl+0x2b8/0xd30 [ 519.649056] sock_do_ioctl+0x17d/0x300 [ 519.649876] ? compat_ifr_data_ioctl+0x180/0x180 [ 519.650880] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 519.652114] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 519.653207] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 519.654321] ? generic_block_fiemap+0x60/0x60 [ 519.655265] ? lock_downgrade+0x6d0/0x6d0 [ 519.656164] sock_ioctl+0x3ef/0x710 [ 519.656934] ? dlci_ioctl_set+0x30/0x30 [ 519.657787] ? selinux_file_ioctl+0xb6/0x270 [ 519.658719] ? dlci_ioctl_set+0x30/0x30 [ 519.659576] __x64_sys_ioctl+0x19a/0x210 [ 519.660436] do_syscall_64+0x33/0x40 [ 519.661221] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 519.662302] RIP: 0033:0x7fa66ccb2b19 [ 519.663092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 519.666996] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 519.668614] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 519.670125] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 519.671643] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 519.673148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 519.674664] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 [ 519.676252] Mem-Info: [ 519.676834] active_anon:56 inactive_anon:47868 isolated_anon:0 [ 519.676834] active_file:8949 inactive_file:43579 isolated_file:0 [ 519.676834] unevictable:0 dirty:159 writeback:0 [ 519.676834] slab_reclaimable:8279 slab_unreclaimable:61374 [ 519.676834] mapped:81025 shmem:112 pagetables:1340 bounce:0 [ 519.676834] free:170499 free_pcp:486 free_cma:0 [ 519.683573] Node 0 active_anon:224kB inactive_anon:191472kB active_file:35796kB inactive_file:174316kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:324184kB dirty:636kB writeback:0kB shmem:448kB writeback_tmp:0kB kernel_stack:4160kB all_unreclaimable? no [ 519.688556] Node 0 DMA free:15908kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 519.694108] lowmem_reserve[]: 0 1616 1616 1616 [ 519.695152] Node 0 DMA32 free:665992kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:224kB inactive_anon:191472kB active_file:35796kB inactive_file:174316kB unevictable:0kB writepending:752kB present:2080640kB managed:1660444kB mlocked:0kB pagetables:5360kB bounce:0kB free_pcp:1928kB local_pcp:820kB free_cma:0kB [ 519.701460] lowmem_reserve[]: 0 0 0 0 [ 519.702307] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 519.705426] Node 0 DMA32: 444*4kB (UM) 122*8kB (M) 112*16kB (UM) 62*32kB (UME) 125*64kB (UM) 71*128kB (UME) 29*256kB (UME) 12*512kB (UM) 6*1024kB (UME) 2*2048kB (UE) 151*4096kB (UM) = 665920kB [ 519.709311] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 519.711133] 21407 total pagecache pages [ 519.712022] 0 pages in swap cache [ 519.712790] Swap cache stats: add 0, delete 0, find 0/0 [ 519.713954] Free swap = 0kB [ 519.714624] Total swap = 0kB [ 519.715263] 524158 pages RAM [ 519.715946] 0 pages HighMem/MovableOnly [ 519.716819] 105070 pages reserved 05:41:59 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:41:59 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:41:59 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 5) 05:41:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) [ 519.896741] FAULT_INJECTION: forcing a failure. [ 519.896741] name failslab, interval 1, probability 0, space 0, times 0 [ 519.899180] CPU: 1 PID: 5765 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 519.900654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 519.902412] Call Trace: [ 519.902975] dump_stack+0x107/0x167 05:41:59 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 519.903760] should_fail.cold+0x5/0xa [ 519.904794] ? create_object.isra.0+0x3a/0xa30 [ 519.905765] should_failslab+0x5/0x20 [ 519.906578] kmem_cache_alloc+0x5b/0x310 [ 519.907459] create_object.isra.0+0x3a/0xa30 [ 519.908390] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 519.909480] kmem_cache_alloc_node_trace+0x16d/0x340 [ 519.910574] __get_vm_area_node+0xd4/0x340 [ 519.911492] __vmalloc_node_range+0x13f/0x9e0 [ 519.912443] ? dev_ethtool+0x2bb8/0x4b00 [ 519.913301] ? dev_ethtool+0x2bb8/0x4b00 [ 519.914163] ? __might_fault+0xd3/0x180 [ 519.915013] ? lock_downgrade+0x6d0/0x6d0 [ 519.915905] ? __vmalloc_node+0x110/0x110 [ 519.916799] ? dev_ethtool+0x2bb8/0x4b00 [ 519.917667] __vmalloc_node+0xb5/0x110 [ 519.918497] ? dev_ethtool+0x2bb8/0x4b00 [ 519.919371] dev_ethtool+0x2bb8/0x4b00 [ 519.920218] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 519.921339] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 519.922582] ? find_held_lock+0x2c/0x110 [ 519.923468] ? lock_acquire+0x197/0x470 [ 519.924321] ? dev_ioctl+0x2ad/0xd30 [ 519.925118] ? lock_release+0x680/0x680 [ 519.925979] ? avc_has_extended_perms+0x7f1/0xf40 [ 519.927015] ? __mutex_lock+0x4fe/0x10b0 [ 519.927903] ? dev_ioctl+0x2ad/0xd30 [ 519.928704] ? lock_acquire+0x197/0x470 [ 519.929041] loop4: detected capacity change from 0 to 41948160 [ 519.929541] ? find_held_lock+0x2c/0x110 [ 519.931747] ? mutex_lock_io_nested+0xf30/0xf30 [ 519.932731] ? dev_load+0x7b/0x250 [ 519.933485] ? lock_downgrade+0x6d0/0x6d0 [ 519.934365] ? inet6_release+0x70/0x70 [ 519.935194] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 519.936327] dev_ioctl+0x2b8/0xd30 [ 519.937089] sock_do_ioctl+0x17d/0x300 [ 519.937918] ? compat_ifr_data_ioctl+0x180/0x180 [ 519.938947] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 519.940188] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 519.941290] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 519.942409] ? generic_block_fiemap+0x60/0x60 [ 519.943364] ? lock_downgrade+0x6d0/0x6d0 [ 519.944269] sock_ioctl+0x3ef/0x710 [ 519.945049] ? dlci_ioctl_set+0x30/0x30 [ 519.945908] ? selinux_file_ioctl+0xb6/0x270 [ 519.946851] ? dlci_ioctl_set+0x30/0x30 [ 519.947710] __x64_sys_ioctl+0x19a/0x210 [ 519.948580] do_syscall_64+0x33/0x40 [ 519.949372] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 519.950468] RIP: 0033:0x7fa66ccb2b19 [ 519.951262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 519.951347] FAT-fs (loop4): invalid media value (0x00) [ 519.955210] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 519.955231] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 519.955242] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 519.955253] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 519.955272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 519.956442] FAT-fs (loop4): Can't find a valid FAT filesystem [ 519.958018] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:41:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) 05:41:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x3f, 0x3000000000000}) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:41:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:41:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:41:59 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:41:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:41:59 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:41:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470", 0x12}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:41:59 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:41:59 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:41:59 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) [ 520.316807] loop4: detected capacity change from 0 to 41948160 [ 520.322398] FAT-fs (loop4): invalid media value (0x00) [ 520.323703] FAT-fs (loop4): Can't find a valid FAT filesystem [ 533.238283] FAULT_INJECTION: forcing a failure. [ 533.238283] name failslab, interval 1, probability 0, space 0, times 0 [ 533.240834] CPU: 1 PID: 5809 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 533.242296] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 533.244070] Call Trace: [ 533.244656] dump_stack+0x107/0x167 [ 533.245443] should_fail.cold+0x5/0xa [ 533.246273] ? alloc_vmap_area+0x148/0x1d10 [ 533.247193] should_failslab+0x5/0x20 [ 533.248020] kmem_cache_alloc_node+0x55/0x330 [ 533.248987] alloc_vmap_area+0x148/0x1d10 [ 533.249872] ? kmem_cache_alloc_node_trace+0x16d/0x340 [ 533.251012] ? mark_held_locks+0x9e/0xe0 [ 533.251911] ? purge_vmap_area_lazy+0xc0/0xc0 [ 533.252871] ? kasan_unpoison_shadow+0x33/0x50 [ 533.253845] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 533.254932] __get_vm_area_node+0x127/0x340 [ 533.255875] __vmalloc_node_range+0x13f/0x9e0 [ 533.256831] ? dev_ethtool+0x2bb8/0x4b00 [ 533.257712] ? dev_ethtool+0x2bb8/0x4b00 [ 533.258784] ? __might_fault+0xd3/0x180 [ 533.259668] ? lock_downgrade+0x6d0/0x6d0 [ 533.260763] ? __vmalloc_node+0x110/0x110 [ 533.261676] ? dev_ethtool+0x2bb8/0x4b00 [ 533.262733] __vmalloc_node+0xb5/0x110 [ 533.263596] ? dev_ethtool+0x2bb8/0x4b00 [ 533.264481] dev_ethtool+0x2bb8/0x4b00 [ 533.265321] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 533.266454] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 533.267704] ? find_held_lock+0x2c/0x110 [ 533.268777] ? lock_acquire+0x197/0x470 [ 533.269626] ? dev_ioctl+0x2ad/0xd30 [ 533.270430] ? lock_release+0x680/0x680 [ 533.271289] ? avc_has_extended_perms+0x7f1/0xf40 [ 533.272350] ? __mutex_lock+0x4fe/0x10b0 [ 533.273231] ? dev_ioctl+0x2ad/0xd30 [ 533.274039] ? lock_acquire+0x197/0x470 [ 533.274902] ? find_held_lock+0x2c/0x110 [ 533.275802] ? mutex_lock_io_nested+0xf30/0xf30 [ 533.276796] ? dev_load+0x7b/0x250 [ 533.277563] ? lock_downgrade+0x6d0/0x6d0 [ 533.278443] ? inet6_release+0x70/0x70 [ 533.279299] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 533.280434] dev_ioctl+0x2b8/0xd30 [ 533.281377] sock_do_ioctl+0x17d/0x300 [ 533.282215] ? compat_ifr_data_ioctl+0x180/0x180 [ 533.283223] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 533.284447] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 533.285792] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 533.286915] ? generic_block_fiemap+0x60/0x60 [ 533.288100] ? lock_downgrade+0x6d0/0x6d0 [ 533.289177] sock_ioctl+0x3ef/0x710 [ 533.290129] ? dlci_ioctl_set+0x30/0x30 [ 533.291165] ? selinux_file_ioctl+0xb6/0x270 [ 533.292309] ? dlci_ioctl_set+0x30/0x30 [ 533.293341] __x64_sys_ioctl+0x19a/0x210 [ 533.294402] do_syscall_64+0x33/0x40 [ 533.295376] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 533.296720] RIP: 0033:0x7fa66ccb2b19 [ 533.297676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 533.302441] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 533.304433] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 533.306290] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 533.308163] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 533.310015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 533.311887] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 [ 533.313895] syz-executor.7: vmalloc: allocation failure: 232 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz7,mems_allowed=0 [ 533.317354] CPU: 1 PID: 5809 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 533.319116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 533.321294] Call Trace: [ 533.321973] dump_stack+0x107/0x167 [ 533.322933] warn_alloc.cold+0x95/0x18a [ 533.323980] ? zone_watermark_ok_safe+0x260/0x260 [ 533.325222] ? slab_free_freelist_hook+0xa9/0x180 [ 533.326494] ? __get_vm_area_node+0x2cf/0x340 [ 533.327677] ? kasan_unpoison_shadow+0x33/0x50 [ 533.329159] ? __get_vm_area_node+0x262/0x340 [ 533.330332] __vmalloc_node_range+0x58f/0x9e0 [ 533.331486] ? dev_ethtool+0x2bb8/0x4b00 [ 533.332582] ? __might_fault+0xd3/0x180 [ 533.333580] ? lock_downgrade+0x6d0/0x6d0 [ 533.334613] ? __vmalloc_node+0x110/0x110 [ 533.335676] ? dev_ethtool+0x2bb8/0x4b00 [ 533.336688] __vmalloc_node+0xb5/0x110 [ 533.337516] ? dev_ethtool+0x2bb8/0x4b00 [ 533.338370] dev_ethtool+0x2bb8/0x4b00 [ 533.339192] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 533.340540] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 533.341982] ? find_held_lock+0x2c/0x110 [ 533.342853] ? lock_acquire+0x197/0x470 [ 533.343696] ? dev_ioctl+0x2ad/0xd30 [ 533.344476] ? lock_release+0x680/0x680 [ 533.345523] ? avc_has_extended_perms+0x7f1/0xf40 [ 533.346549] ? __mutex_lock+0x4fe/0x10b0 [ 533.347399] ? dev_ioctl+0x2ad/0xd30 [ 533.348192] ? lock_acquire+0x197/0x470 [ 533.349021] ? find_held_lock+0x2c/0x110 [ 533.349876] ? mutex_lock_io_nested+0xf30/0xf30 [ 533.350856] ? dev_load+0x7b/0x250 [ 533.351611] ? lock_downgrade+0x6d0/0x6d0 [ 533.352481] ? inet6_release+0x70/0x70 [ 533.353311] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 533.354418] dev_ioctl+0x2b8/0xd30 [ 533.355160] sock_do_ioctl+0x17d/0x300 [ 533.355986] ? compat_ifr_data_ioctl+0x180/0x180 [ 533.356984] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 533.358188] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 533.359411] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 533.360808] ? generic_block_fiemap+0x60/0x60 [ 533.361754] ? lock_downgrade+0x6d0/0x6d0 [ 533.362630] sock_ioctl+0x3ef/0x710 [ 533.363394] ? dlci_ioctl_set+0x30/0x30 [ 533.364246] ? selinux_file_ioctl+0xb6/0x270 [ 533.365175] ? dlci_ioctl_set+0x30/0x30 [ 533.366000] __x64_sys_ioctl+0x19a/0x210 [ 533.366861] do_syscall_64+0x33/0x40 [ 533.367677] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 533.368752] RIP: 0033:0x7fa66ccb2b19 [ 533.369529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 533.373404] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 533.374996] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 533.376506] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 533.378004] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 533.379515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 533.381308] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 [ 533.382883] Mem-Info: [ 533.383420] active_anon:56 inactive_anon:48248 isolated_anon:0 [ 533.383420] active_file:8961 inactive_file:43594 isolated_file:0 [ 533.383420] unevictable:0 dirty:318 writeback:0 [ 533.383420] slab_reclaimable:8295 slab_unreclaimable:61093 [ 533.383420] mapped:81065 shmem:112 pagetables:1246 bounce:0 [ 533.383420] free:170347 free_pcp:549 free_cma:0 [ 533.390324] Node 0 active_anon:224kB inactive_anon:192992kB active_file:35844kB inactive_file:174376kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:324260kB dirty:1272kB writeback:0kB shmem:448kB writeback_tmp:0kB kernel_stack:4064kB all_unreclaimable? no [ 533.395355] Node 0 DMA free:15908kB min:48kB low:60kB high:72kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 533.400910] lowmem_reserve[]: 0 1616 1616 1616 05:42:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:42:12 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 6) 05:42:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:42:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:42:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) 05:42:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:42:12 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:42:12 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:42:12 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:42:12 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:42:12 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) [ 533.401959] Node 0 DMA32 free:665140kB min:5116kB low:6768kB high:8420kB reserved_highatomic:0KB active_anon:224kB inactive_anon:192992kB active_file:35844kB inactive_file:174376kB unevictable:0kB writepending:1272kB present:2080640kB managed:1660444kB mlocked:0kB pagetables:5108kB bounce:0kB free_pcp:2212kB local_pcp:1036kB free_cma:0kB [ 533.408610] lowmem_reserve[]: 0 0 0 0 [ 533.409493] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 533.412582] Node 0 DMA32: 157*4kB (UME) 153*8kB (UM) 57*16kB (UME) 123*32kB (UME) 107*64kB (UME) 70*128kB (UM) 30*256kB (UME) 12*512kB (UM) 6*1024kB (UME) 2*2048kB (UE) 151*4096kB (UM) = 665068kB [ 533.416531] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 533.418387] 21458 total pagecache pages [ 533.419262] 0 pages in swap cache [ 533.420042] Swap cache stats: add 0, delete 0, find 0/0 [ 533.421198] Free swap = 0kB [ 533.421885] Total swap = 0kB [ 533.422571] 524158 pages RAM [ 533.423213] 0 pages HighMem/MovableOnly [ 533.424097] 105070 pages reserved [ 533.438769] loop4: detected capacity change from 0 to 41948160 [ 533.527922] FAT-fs (loop4): invalid media value (0x00) [ 533.529157] FAT-fs (loop4): Can't find a valid FAT filesystem 05:42:26 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:42:26 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) [ 547.077237] FAULT_INJECTION: forcing a failure. [ 547.077237] name failslab, interval 1, probability 0, space 0, times 0 [ 547.079780] CPU: 1 PID: 5831 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 547.081239] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 547.083012] Call Trace: [ 547.083579] dump_stack+0x107/0x167 05:42:26 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 7) 05:42:26 executing program 2: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:42:26 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:42:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) [ 547.084374] should_fail.cold+0x5/0xa [ 547.085367] ? create_object.isra.0+0x3a/0xa30 [ 547.086338] should_failslab+0x5/0x20 [ 547.087153] kmem_cache_alloc+0x5b/0x310 [ 547.088037] ? sock_do_ioctl+0x17d/0x300 [ 547.088907] ? sock_ioctl+0x3ef/0x710 [ 547.089722] create_object.isra.0+0x3a/0xa30 [ 547.090659] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 547.091751] kmem_cache_alloc_node+0x169/0x330 [ 547.092750] alloc_vmap_area+0x148/0x1d10 [ 547.093648] ? kmem_cache_alloc_node_trace+0x16d/0x340 [ 547.094780] ? mark_held_locks+0x9e/0xe0 [ 547.095665] ? purge_vmap_area_lazy+0xc0/0xc0 [ 547.096650] ? kasan_unpoison_shadow+0x33/0x50 [ 547.097628] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 547.098707] __get_vm_area_node+0x127/0x340 [ 547.099640] __vmalloc_node_range+0x13f/0x9e0 [ 547.100629] ? dev_ethtool+0x2bb8/0x4b00 [ 547.101519] ? dev_ethtool+0x2bb8/0x4b00 [ 547.102388] ? __might_fault+0xd3/0x180 [ 547.103243] ? lock_downgrade+0x6d0/0x6d0 05:42:26 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:42:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) [ 547.104137] ? __vmalloc_node+0x110/0x110 [ 547.105160] ? dev_ethtool+0x2bb8/0x4b00 [ 547.106030] __vmalloc_node+0xb5/0x110 [ 547.106866] ? dev_ethtool+0x2bb8/0x4b00 [ 547.107739] dev_ethtool+0x2bb8/0x4b00 [ 547.108581] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 547.109704] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 547.110958] ? find_held_lock+0x2c/0x110 [ 547.111863] ? lock_acquire+0x197/0x470 [ 547.112719] ? dev_ioctl+0x2ad/0xd30 [ 547.113524] ? lock_release+0x680/0x680 [ 547.114382] ? avc_has_extended_perms+0x7f1/0xf40 [ 547.115426] ? __mutex_lock+0x4fe/0x10b0 [ 547.116311] ? dev_ioctl+0x2ad/0xd30 [ 547.117112] ? lock_acquire+0x197/0x470 [ 547.117966] ? find_held_lock+0x2c/0x110 [ 547.119035] ? mutex_lock_io_nested+0xf30/0xf30 [ 547.120047] ? dev_load+0x7b/0x250 [ 547.120819] ? lock_downgrade+0x6d0/0x6d0 [ 547.121708] ? inet6_release+0x70/0x70 [ 547.122542] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 547.123665] dev_ioctl+0x2b8/0xd30 [ 547.124442] sock_do_ioctl+0x17d/0x300 [ 547.125271] ? compat_ifr_data_ioctl+0x180/0x180 [ 547.126295] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 547.127526] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 547.128787] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 547.130029] ? generic_block_fiemap+0x60/0x60 [ 547.130980] ? lock_downgrade+0x6d0/0x6d0 [ 547.131873] sock_ioctl+0x3ef/0x710 [ 547.132645] ? dlci_ioctl_set+0x30/0x30 [ 547.133500] ? selinux_file_ioctl+0xb6/0x270 [ 547.134437] ? dlci_ioctl_set+0x30/0x30 [ 547.135288] __x64_sys_ioctl+0x19a/0x210 [ 547.136172] do_syscall_64+0x33/0x40 [ 547.137041] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 547.138133] RIP: 0033:0x7fa66ccb2b19 [ 547.138919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 547.142834] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.144459] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 547.145980] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 547.147496] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 547.149027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 547.150556] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:42:26 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) 05:42:26 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:42:26 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:42:26 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 547.192790] loop4: detected capacity change from 0 to 41948160 [ 547.209826] FAT-fs (loop4): invalid media value (0x00) [ 547.211020] FAT-fs (loop4): Can't find a valid FAT filesystem 05:42:26 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:42:26 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 8) [ 547.272826] FAULT_INJECTION: forcing a failure. [ 547.272826] name failslab, interval 1, probability 0, space 0, times 0 [ 547.274230] CPU: 0 PID: 5859 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 547.275013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 547.275984] Call Trace: [ 547.276296] dump_stack+0x107/0x167 [ 547.276724] should_fail.cold+0x5/0xa [ 547.277169] ? kmemleak_scan_area+0xa6/0x360 [ 547.277681] should_failslab+0x5/0x20 [ 547.278131] kmem_cache_alloc+0x5b/0x310 [ 547.278604] kmemleak_scan_area+0xa6/0x360 [ 547.279100] alloc_vmap_area+0x171/0x1d10 [ 547.279585] ? kmem_cache_alloc_node_trace+0x16d/0x340 [ 547.280207] ? mark_held_locks+0x9e/0xe0 [ 547.280686] ? purge_vmap_area_lazy+0xc0/0xc0 [ 547.281208] ? kasan_unpoison_shadow+0x33/0x50 [ 547.281741] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 547.282330] __get_vm_area_node+0x127/0x340 [ 547.282835] __vmalloc_node_range+0x13f/0x9e0 [ 547.283351] ? dev_ethtool+0x2bb8/0x4b00 [ 547.283835] ? dev_ethtool+0x2bb8/0x4b00 [ 547.284309] ? __might_fault+0xd3/0x180 [ 547.284774] ? lock_downgrade+0x6d0/0x6d0 [ 547.285251] ? __vmalloc_node+0x110/0x110 [ 547.285739] ? dev_ethtool+0x2bb8/0x4b00 [ 547.286214] __vmalloc_node+0xb5/0x110 [ 547.286669] ? dev_ethtool+0x2bb8/0x4b00 [ 547.287149] dev_ethtool+0x2bb8/0x4b00 [ 547.287607] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 547.288225] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 547.288902] ? find_held_lock+0x2c/0x110 [ 547.289377] ? lock_acquire+0x197/0x470 [ 547.289835] ? dev_ioctl+0x2ad/0xd30 [ 547.290393] ? lock_release+0x680/0x680 [ 547.290864] ? avc_has_extended_perms+0x7f1/0xf40 [ 547.291434] ? __mutex_lock+0x4fe/0x10b0 [ 547.291942] ? dev_ioctl+0x2ad/0xd30 [ 547.292376] ? lock_acquire+0x197/0x470 [ 547.292839] ? find_held_lock+0x2c/0x110 [ 547.293315] ? mutex_lock_io_nested+0xf30/0xf30 [ 547.293862] ? dev_load+0x7b/0x250 [ 547.294268] ? lock_downgrade+0x6d0/0x6d0 [ 547.294753] ? inet6_release+0x70/0x70 [ 547.295214] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 547.295838] dev_ioctl+0x2b8/0xd30 [ 547.296256] sock_do_ioctl+0x17d/0x300 [ 547.296709] ? compat_ifr_data_ioctl+0x180/0x180 [ 547.297261] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 547.297939] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 547.298542] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 547.299159] ? generic_block_fiemap+0x60/0x60 [ 547.299677] ? lock_downgrade+0x6d0/0x6d0 [ 547.300172] sock_ioctl+0x3ef/0x710 [ 547.300596] ? dlci_ioctl_set+0x30/0x30 [ 547.301060] ? selinux_file_ioctl+0xb6/0x270 [ 547.301573] ? dlci_ioctl_set+0x30/0x30 [ 547.302039] __x64_sys_ioctl+0x19a/0x210 [ 547.302526] do_syscall_64+0x33/0x40 [ 547.302960] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 547.303555] RIP: 0033:0x7fa66ccb2b19 [ 547.303997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 547.306133] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.307018] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 547.307859] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 547.308697] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 547.309526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 547.310356] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 [ 547.311843] kmemleak: Cannot allocate a scan area, scanning the full object 05:42:26 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:42:26 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:42:40 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:42:40 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:42:40 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:42:40 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 9) 05:42:40 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) 05:42:40 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:42:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400", 0x15}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:42:40 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) [ 561.077747] loop4: detected capacity change from 0 to 41948160 [ 561.081247] FAT-fs (loop4): invalid media value (0x00) [ 561.081946] FAT-fs (loop4): Can't find a valid FAT filesystem [ 561.091364] FAULT_INJECTION: forcing a failure. [ 561.091364] name failslab, interval 1, probability 0, space 0, times 0 [ 561.092827] CPU: 0 PID: 5873 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 561.093683] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 561.094745] Call Trace: [ 561.095093] dump_stack+0x107/0x167 [ 561.095553] should_fail.cold+0x5/0xa [ 561.096042] ? __vmalloc_node_range+0x7a2/0x9e0 [ 561.096636] should_failslab+0x5/0x20 [ 561.097125] __kmalloc_node+0x76/0x420 [ 561.097626] __vmalloc_node_range+0x7a2/0x9e0 [ 561.098205] ? __might_fault+0xd3/0x180 [ 561.098708] ? __vmalloc_node+0x110/0x110 [ 561.099245] ? dev_ethtool+0x2bb8/0x4b00 [ 561.099761] __vmalloc_node+0xb5/0x110 [ 561.100256] ? dev_ethtool+0x2bb8/0x4b00 [ 561.100775] dev_ethtool+0x2bb8/0x4b00 [ 561.101271] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 561.101942] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 561.102674] ? find_held_lock+0x2c/0x110 [ 561.103201] ? lock_acquire+0x197/0x470 [ 561.103712] ? dev_ioctl+0x2ad/0xd30 [ 561.104186] ? lock_release+0x680/0x680 [ 561.104688] ? avc_has_extended_perms+0x7f1/0xf40 [ 561.105317] ? __mutex_lock+0x4fe/0x10b0 [ 561.105831] ? dev_ioctl+0x2ad/0xd30 [ 561.106322] ? lock_acquire+0x197/0x470 [ 561.106836] ? find_held_lock+0x2c/0x110 [ 561.107345] ? mutex_lock_io_nested+0xf30/0xf30 [ 561.107930] ? dev_load+0x7b/0x250 [ 561.108397] ? lock_downgrade+0x6d0/0x6d0 [ 561.108913] ? inet6_release+0x70/0x70 [ 561.109411] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 561.110076] dev_ioctl+0x2b8/0xd30 [ 561.110524] sock_do_ioctl+0x17d/0x300 [ 561.111011] ? compat_ifr_data_ioctl+0x180/0x180 [ 561.111609] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 561.112358] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 561.113001] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 561.113661] ? generic_block_fiemap+0x60/0x60 [ 561.114224] ? lock_downgrade+0x6d0/0x6d0 [ 561.114760] sock_ioctl+0x3ef/0x710 [ 561.115222] ? dlci_ioctl_set+0x30/0x30 [ 561.115717] ? selinux_file_ioctl+0xb6/0x270 [ 561.116286] ? dlci_ioctl_set+0x30/0x30 [ 561.116781] __x64_sys_ioctl+0x19a/0x210 [ 561.117286] do_syscall_64+0x33/0x40 [ 561.117759] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 561.118400] RIP: 0033:0x7fa66ccb2b19 [ 561.118868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 561.121215] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 561.122191] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 561.123098] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 561.124018] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 561.124912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 561.125802] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:42:40 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 10) 05:42:40 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:42:40 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:42:40 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) 05:42:40 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 561.239116] FAULT_INJECTION: forcing a failure. [ 561.239116] name failslab, interval 1, probability 0, space 0, times 0 [ 561.241673] CPU: 1 PID: 5886 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 561.243122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 561.244870] Call Trace: [ 561.245436] dump_stack+0x107/0x167 [ 561.246203] should_fail.cold+0x5/0xa [ 561.247029] ? __vmalloc_node_range+0x7a2/0x9e0 [ 561.248023] should_failslab+0x5/0x20 [ 561.248825] __kmalloc_node+0x76/0x420 [ 561.249659] __vmalloc_node_range+0x7a2/0x9e0 [ 561.250616] ? __might_fault+0xd3/0x180 [ 561.251454] ? __vmalloc_node+0x110/0x110 [ 561.252359] ? dev_ethtool+0x2bb8/0x4b00 [ 561.253224] __vmalloc_node+0xb5/0x110 [ 561.254045] ? dev_ethtool+0x2bb8/0x4b00 [ 561.254917] dev_ethtool+0x2bb8/0x4b00 [ 561.255750] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 561.256868] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 561.258091] ? find_held_lock+0x2c/0x110 [ 561.258956] ? lock_acquire+0x197/0x470 [ 561.259800] ? dev_ioctl+0x2ad/0xd30 [ 561.260606] ? lock_release+0x680/0x680 [ 561.261456] ? avc_has_extended_perms+0x7f1/0xf40 [ 561.262503] ? __mutex_lock+0x4fe/0x10b0 [ 561.263365] ? dev_ioctl+0x2ad/0xd30 [ 561.264163] ? lock_acquire+0x197/0x470 [ 561.265004] ? find_held_lock+0x2c/0x110 [ 561.265865] ? mutex_lock_io_nested+0xf30/0xf30 [ 561.266850] ? dev_load+0x7b/0x250 [ 561.267605] ? lock_downgrade+0x6d0/0x6d0 [ 561.268496] ? inet6_release+0x70/0x70 [ 561.269333] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 561.270451] dev_ioctl+0x2b8/0xd30 [ 561.271209] sock_do_ioctl+0x17d/0x300 [ 561.272042] ? compat_ifr_data_ioctl+0x180/0x180 [ 561.273050] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 561.274262] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 561.275353] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 561.276473] ? generic_block_fiemap+0x60/0x60 [ 561.277418] ? lock_downgrade+0x6d0/0x6d0 [ 561.278423] sock_ioctl+0x3ef/0x710 [ 561.279307] ? dlci_ioctl_set+0x30/0x30 [ 561.280246] ? selinux_file_ioctl+0xb6/0x270 [ 561.281251] ? dlci_ioctl_set+0x30/0x30 [ 561.282101] __x64_sys_ioctl+0x19a/0x210 [ 561.282965] do_syscall_64+0x33/0x40 [ 561.283748] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 561.284992] RIP: 0033:0x7fa66ccb2b19 [ 561.285906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 561.290081] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 561.291688] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 561.293211] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 561.294730] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 561.296264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 561.297793] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:42:40 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:42:53 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 11) [ 574.366835] FAULT_INJECTION: forcing a failure. [ 574.366835] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 574.369272] CPU: 1 PID: 5910 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 574.370634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 574.372339] Call Trace: [ 574.372884] dump_stack+0x107/0x167 [ 574.373625] should_fail.cold+0x5/0xa [ 574.374401] __alloc_pages_nodemask+0x182/0x600 [ 574.375350] ? __kmalloc_node+0x1ae/0x420 [ 574.376288] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 574.377593] ? mark_held_locks+0x9e/0xe0 [ 574.378412] ? trace_hardirqs_on+0x5b/0x180 [ 574.379438] alloc_pages_current+0x187/0x280 [ 574.380338] __vmalloc_node_range+0x60a/0x9e0 [ 574.381253] ? __vmalloc_node+0x110/0x110 [ 574.382106] ? dev_ethtool+0x2bb8/0x4b00 [ 574.382922] __vmalloc_node+0xb5/0x110 [ 574.383711] ? dev_ethtool+0x2bb8/0x4b00 [ 574.384567] dev_ethtool+0x2bb8/0x4b00 [ 574.385363] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 574.386439] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 574.387629] ? find_held_lock+0x2c/0x110 [ 574.388469] ? lock_acquire+0x197/0x470 [ 574.389430] ? dev_ioctl+0x2ad/0xd30 [ 574.390193] ? lock_release+0x680/0x680 [ 574.391060] ? avc_has_extended_perms+0x7f1/0xf40 [ 574.392122] ? __mutex_lock+0x4fe/0x10b0 [ 574.392959] ? dev_ioctl+0x2ad/0xd30 [ 574.393726] ? lock_acquire+0x197/0x470 [ 574.394525] ? find_held_lock+0x2c/0x110 [ 574.395334] ? mutex_lock_io_nested+0xf30/0xf30 [ 574.396287] ? dev_load+0x7b/0x250 [ 574.397193] ? lock_downgrade+0x6d0/0x6d0 [ 574.398102] ? inet6_release+0x70/0x70 [ 574.398885] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 574.399955] dev_ioctl+0x2b8/0xd30 [ 574.400685] sock_do_ioctl+0x17d/0x300 [ 574.401475] ? compat_ifr_data_ioctl+0x180/0x180 [ 574.402432] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 574.403592] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 574.404633] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 574.405710] ? generic_block_fiemap+0x60/0x60 [ 574.406613] ? lock_downgrade+0x6d0/0x6d0 [ 574.407453] sock_ioctl+0x3ef/0x710 [ 574.408190] ? dlci_ioctl_set+0x30/0x30 [ 574.408994] ? selinux_file_ioctl+0xb6/0x270 [ 574.409888] ? dlci_ioctl_set+0x30/0x30 [ 574.410700] __x64_sys_ioctl+0x19a/0x210 [ 574.411529] do_syscall_64+0x33/0x40 [ 574.412289] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 574.413321] RIP: 0033:0x7fa66ccb2b19 [ 574.414075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 574.417794] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 574.419325] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 574.420768] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 574.422217] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 574.423654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 05:42:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:42:53 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) 05:42:53 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:42:53 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:42:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:42:53 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) 05:42:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:42:53 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) [ 574.425091] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 [ 574.429624] loop4: detected capacity change from 0 to 41948160 [ 574.446378] FAT-fs (loop4): bogus number of FAT sectors [ 574.447075] FAT-fs (loop4): Can't find a valid FAT filesystem 05:43:09 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:09 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:43:09 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) 05:43:09 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:09 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) 05:43:09 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:43:09 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 12) [ 589.844565] FAULT_INJECTION: forcing a failure. [ 589.844565] name failslab, interval 1, probability 0, space 0, times 0 [ 589.845921] loop4: detected capacity change from 0 to 41948160 [ 589.847087] CPU: 1 PID: 5934 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 589.849973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 589.851768] Call Trace: [ 589.852340] dump_stack+0x107/0x167 [ 589.853144] should_fail.cold+0x5/0xa [ 589.853971] ? create_object.isra.0+0x3a/0xa30 [ 589.854935] should_failslab+0x5/0x20 [ 589.855735] kmem_cache_alloc+0x5b/0x310 [ 589.856600] create_object.isra.0+0x3a/0xa30 [ 589.857549] kmemleak_vmalloc+0x49/0x120 [ 589.858433] __vmalloc_node_range+0x574/0x9e0 [ 589.859410] ? __vmalloc_node+0x110/0x110 [ 589.860318] ? dev_ethtool+0x2bb8/0x4b00 [ 589.861200] __vmalloc_node+0xb5/0x110 [ 589.862038] ? dev_ethtool+0x2bb8/0x4b00 [ 589.862916] dev_ethtool+0x2bb8/0x4b00 [ 589.863762] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 589.864902] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 589.866161] ? find_held_lock+0x2c/0x110 [ 589.867049] ? lock_acquire+0x197/0x470 [ 589.867908] ? dev_ioctl+0x2ad/0xd30 [ 589.868725] ? lock_release+0x680/0x680 [ 589.869584] ? avc_has_extended_perms+0x7f1/0xf40 [ 589.870623] ? __mutex_lock+0x4fe/0x10b0 [ 589.871497] ? dev_ioctl+0x2ad/0xd30 [ 589.871803] FAT-fs (loop4): bogus number of FAT sectors [ 589.872302] ? lock_acquire+0x197/0x470 [ 589.873488] FAT-fs (loop4): Can't find a valid FAT filesystem [ 589.874310] ? find_held_lock+0x2c/0x110 [ 589.876424] ? mutex_lock_io_nested+0xf30/0xf30 [ 589.877435] ? dev_load+0x7b/0x250 [ 589.878219] ? lock_downgrade+0x6d0/0x6d0 [ 589.879114] ? inet6_release+0x70/0x70 [ 589.879953] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 589.881096] dev_ioctl+0x2b8/0xd30 [ 589.881863] sock_do_ioctl+0x17d/0x300 [ 589.882687] ? compat_ifr_data_ioctl+0x180/0x180 [ 589.883688] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 589.884925] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 589.886028] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 589.887145] ? generic_block_fiemap+0x60/0x60 [ 589.888101] ? lock_downgrade+0x6d0/0x6d0 [ 589.889001] sock_ioctl+0x3ef/0x710 [ 589.889758] ? dlci_ioctl_set+0x30/0x30 [ 589.890615] ? selinux_file_ioctl+0xb6/0x270 [ 589.891621] ? dlci_ioctl_set+0x30/0x30 [ 589.892696] __x64_sys_ioctl+0x19a/0x210 [ 589.893562] do_syscall_64+0x33/0x40 [ 589.894360] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 589.895694] RIP: 0033:0x7fa66ccb2b19 [ 589.896501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 589.900451] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 589.902093] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 589.903627] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 589.905147] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 589.906774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 589.908427] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:43:09 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:09 executing program 0: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:09 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 13) 05:43:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f8", 0x16}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:43:09 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) 05:43:09 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) [ 590.070562] FAULT_INJECTION: forcing a failure. [ 590.070562] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 590.073089] CPU: 0 PID: 5948 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 590.074536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 590.076312] Call Trace: [ 590.076896] dump_stack+0x107/0x167 [ 590.077692] should_fail.cold+0x5/0xa [ 590.078524] _copy_to_user+0x2e/0x180 [ 590.079338] dev_ethtool+0x2c0b/0x4b00 [ 590.080187] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 590.081331] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 590.082591] ? find_held_lock+0x2c/0x110 [ 590.083479] ? lock_acquire+0x197/0x470 [ 590.084339] ? dev_ioctl+0x2ad/0xd30 [ 590.085147] ? lock_release+0x680/0x680 [ 590.086015] ? avc_has_extended_perms+0x7f1/0xf40 [ 590.087069] ? __mutex_lock+0x4fe/0x10b0 [ 590.087952] ? dev_ioctl+0x2ad/0xd30 [ 590.088763] ? lock_acquire+0x197/0x470 [ 590.089618] ? find_held_lock+0x2c/0x110 [ 590.090493] ? mutex_lock_io_nested+0xf30/0xf30 [ 590.091500] ? dev_load+0x7b/0x250 [ 590.092270] ? lock_downgrade+0x6d0/0x6d0 [ 590.093179] ? inet6_release+0x70/0x70 [ 590.094031] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 590.095157] dev_ioctl+0x2b8/0xd30 [ 590.095936] sock_do_ioctl+0x17d/0x300 [ 590.096785] ? compat_ifr_data_ioctl+0x180/0x180 [ 590.097811] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 590.099054] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 590.100163] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 590.101312] ? generic_block_fiemap+0x60/0x60 [ 590.102283] ? lock_downgrade+0x6d0/0x6d0 [ 590.103172] sock_ioctl+0x3ef/0x710 [ 590.103954] ? dlci_ioctl_set+0x30/0x30 [ 590.104828] ? selinux_file_ioctl+0xb6/0x270 [ 590.105758] ? dlci_ioctl_set+0x30/0x30 [ 590.106618] __x64_sys_ioctl+0x19a/0x210 [ 590.107486] do_syscall_64+0x33/0x40 [ 590.108291] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 590.109396] RIP: 0033:0x7fa66ccb2b19 [ 590.110176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.114117] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 590.115734] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 590.117245] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 590.118774] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 590.120319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 590.121866] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:43:09 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:43:09 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x0, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 590.157021] loop4: detected capacity change from 0 to 41948160 [ 590.162519] FAT-fs (loop4): bogus number of FAT sectors [ 590.163594] FAT-fs (loop4): Can't find a valid FAT filesystem 05:43:21 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 14) 05:43:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:43:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:43:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:21 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:43:21 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x0, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 602.111116] FAULT_INJECTION: forcing a failure. [ 602.111116] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 602.113749] CPU: 1 PID: 5967 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 602.115210] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 602.117347] Call Trace: [ 602.118059] dump_stack+0x107/0x167 [ 602.118843] should_fail.cold+0x5/0xa [ 602.119667] _copy_to_user+0x2e/0x180 [ 602.120487] dev_ethtool+0x2c50/0x4b00 [ 602.121321] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 602.122439] ? ethtool_virtdev_set_link_ksettings+0x180/0x180 [ 602.123673] ? find_held_lock+0x2c/0x110 [ 602.124556] ? lock_acquire+0x197/0x470 [ 602.125412] ? dev_ioctl+0x2ad/0xd30 [ 602.126221] ? lock_release+0x680/0x680 [ 602.127090] ? avc_has_extended_perms+0x7f1/0xf40 [ 602.128131] ? __mutex_lock+0x4fe/0x10b0 [ 602.129009] ? dev_ioctl+0x2ad/0xd30 [ 602.129805] ? lock_acquire+0x197/0x470 [ 602.130658] ? find_held_lock+0x2c/0x110 [ 602.131532] ? mutex_lock_io_nested+0xf30/0xf30 [ 602.132534] ? dev_load+0x7b/0x250 [ 602.133290] ? lock_downgrade+0x6d0/0x6d0 [ 602.134166] ? inet6_release+0x70/0x70 [ 602.134992] ? netdev_name_node_lookup_rcu+0x108/0x150 [ 602.136119] dev_ioctl+0x2b8/0xd30 [ 602.136901] sock_do_ioctl+0x17d/0x300 [ 602.137734] ? compat_ifr_data_ioctl+0x180/0x180 [ 602.138741] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 602.139970] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 602.141094] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 602.142219] ? generic_block_fiemap+0x60/0x60 [ 602.143182] ? lock_downgrade+0x6d0/0x6d0 [ 602.144081] sock_ioctl+0x3ef/0x710 [ 602.144865] ? dlci_ioctl_set+0x30/0x30 [ 602.145733] ? selinux_file_ioctl+0xb6/0x270 [ 602.146674] ? dlci_ioctl_set+0x30/0x30 [ 602.147529] __x64_sys_ioctl+0x19a/0x210 [ 602.148402] do_syscall_64+0x33/0x40 [ 602.149211] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 602.150316] RIP: 0033:0x7fa66ccb2b19 [ 602.151103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.155053] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 602.156688] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 602.158216] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 602.159750] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.161292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.161887] loop4: detected capacity change from 0 to 41948160 [ 602.162816] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:43:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:43:21 executing program 5: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:21 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:43:21 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:21 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 15) 05:43:21 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:43:21 executing program 3: r0 = openat(0xffffffffffffffff, 0x0, 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:21 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x0, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:43:21 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) [ 602.402300] FAULT_INJECTION: forcing a failure. [ 602.402300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 602.403890] CPU: 0 PID: 6000 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 602.404765] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 602.405817] Call Trace: [ 602.406160] dump_stack+0x107/0x167 [ 602.406629] should_fail.cold+0x5/0xa [ 602.407120] _copy_to_user+0x2e/0x180 [ 602.407631] sock_do_ioctl+0x1c3/0x300 [ 602.408129] ? compat_ifr_data_ioctl+0x180/0x180 [ 602.408747] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 602.409489] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 602.410160] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 602.410824] ? generic_block_fiemap+0x60/0x60 [ 602.411394] ? lock_downgrade+0x6d0/0x6d0 [ 602.411931] sock_ioctl+0x3ef/0x710 [ 602.412388] ? dlci_ioctl_set+0x30/0x30 [ 602.412902] ? selinux_file_ioctl+0xb6/0x270 [ 602.413471] ? dlci_ioctl_set+0x30/0x30 [ 602.413978] __x64_sys_ioctl+0x19a/0x210 [ 602.414495] do_syscall_64+0x33/0x40 [ 602.414977] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 602.415631] RIP: 0033:0x7fa66ccb2b19 [ 602.416107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.418464] RSP: 002b:00007fa66a228188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 602.419430] RAX: ffffffffffffffda RBX: 00007fa66cdc5f60 RCX: 00007fa66ccb2b19 [ 602.420349] RDX: 00000000200001c0 RSI: 0000000000008946 RDI: 0000000000000003 [ 602.421264] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.422176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.423087] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 [ 602.435571] loop4: detected capacity change from 0 to 41948160 05:43:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:33 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:33 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) (fail_nth: 16) [ 613.882138] FAULT_INJECTION: forcing a failure. [ 613.882138] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 613.885496] CPU: 1 PID: 6013 Comm: syz-executor.7 Not tainted 5.10.246 #1 [ 613.886958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 613.888710] Call Trace: [ 613.889281] dump_stack+0x107/0x167 [ 613.890052] should_fail.cold+0x5/0xa [ 613.890861] _copy_to_user+0x2e/0x180 [ 613.891677] simple_read_from_buffer+0xcc/0x160 [ 613.892660] proc_fail_nth_read+0x198/0x230 [ 613.893585] ? proc_sessionid_read+0x230/0x230 [ 613.894546] ? security_file_permission+0xb1/0xe0 [ 613.895569] ? proc_sessionid_read+0x230/0x230 [ 613.896550] vfs_read+0x228/0x620 05:43:33 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:33 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10042, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) 05:43:33 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 613.897299] ksys_read+0x12d/0x260 [ 613.898198] ? vfs_write+0xb10/0xb10 [ 613.898997] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 613.900132] ? syscall_enter_from_user_mode+0x1d/0x50 [ 613.901256] do_syscall_64+0x33/0x40 [ 613.902057] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 613.903170] RIP: 0033:0x7fa66cc6569c [ 613.903967] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 613.907941] RSP: 002b:00007fa66a228170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 613.909584] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa66cc6569c 05:43:33 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 613.911109] RDX: 000000000000000f RSI: 00007fa66a2281e0 RDI: 0000000000000004 [ 613.912743] RBP: 00007fa66a2281d0 R08: 0000000000000000 R09: 0000000000000000 [ 613.914263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.915769] R13: 00007ffc94a8a07f R14: 00007fa66a228300 R15: 0000000000022000 05:43:33 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 613.955121] loop4: detected capacity change from 0 to 41948160 05:43:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:43:33 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:43:33 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:33 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:33 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 1) 05:43:45 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x2, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:43:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:43:45 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:45 executing program 0: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:45 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1}, 0x1c) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000100)=0x4) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000180)={0x0, 0x2, 0x1, [0x400, 0x4, 0x7, 0xcbe, 0x346], [0x8, 0x231a, 0x9, 0x81, 0x7, 0x7f, 0x548d, 0x9, 0x7, 0x3a, 0xfffffffffffbfffb, 0x1, 0x6, 0x7, 0x10001, 0x140e, 0x7fffffff, 0x7, 0x10000, 0x8, 0x8, 0x4, 0xcc, 0x1, 0x268000000004, 0x5, 0x1, 0x3ff, 0x6236, 0x6, 0x31, 0x5, 0x7, 0x4, 0x9, 0xfffffffffffffff8, 0x0, 0xf0, 0x100000000, 0x7f, 0x3, 0xffffffffffff0000, 0x8, 0x7, 0x4, 0x339c, 0xb7fc, 0x1c, 0x7, 0xc03, 0x7fffffff, 0x2, 0x9f0, 0x20, 0x7, 0x8000, 0x2, 0xffffffff, 0x10001, 0xffffffffffffffff, 0x2f0f, 0x3, 0x7, 0x5, 0x7f, 0x7, 0x8, 0x5, 0x2, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x8, 0x200, 0x3, 0xffffffffffffffff, 0x101, 0x7, 0x0, 0x0, 0x4, 0x6, 0x5, 0x1ff, 0x6, 0x4, 0x80000001, 0x411, 0x9, 0x3da, 0x1, 0x0, 0x853e, 0x6, 0x3f, 0x8, 0x80000000, 0x0, 0x1966, 0x7fff, 0x1, 0x3ff, 0x20, 0x2, 0x0, 0xfffffffffffffffa, 0x4, 0x0, 0x3f, 0x10001, 0x1, 0x800, 0x1c, 0x4, 0x1, 0xff, 0x2, 0x10000, 0x1f, 0xed76]}) dup(0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x10001}, 0x1c) clock_getres(0x8, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) 05:43:45 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:43:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 626.107768] loop4: detected capacity change from 0 to 41948160 05:43:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 626.153372] FAULT_INJECTION: forcing a failure. [ 626.153372] name failslab, interval 1, probability 0, space 0, times 0 [ 626.155564] CPU: 1 PID: 6058 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 626.156352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 626.157459] Call Trace: [ 626.157774] dump_stack+0x107/0x167 [ 626.158194] should_fail.cold+0x5/0xa [ 626.158645] ? __iomap_dio_rw+0x1ee/0x1110 [ 626.159129] should_failslab+0x5/0x20 [ 626.159567] kmem_cache_alloc_trace+0x55/0x320 [ 626.160098] __iomap_dio_rw+0x1ee/0x1110 [ 626.160575] ? lock_release+0x680/0x680 [ 626.161041] ? __lock_acquire+0xbb1/0x5b00 [ 626.161535] ? iomap_dio_bio_actor+0xef0/0xef0 [ 626.162067] ? down_read+0x10f/0x430 [ 626.162496] ? down_write+0x160/0x160 [ 626.162942] iomap_dio_rw+0x31/0x90 [ 626.163384] ext4_file_read_iter+0x2c7/0x4c0 [ 626.163894] new_sync_read+0x424/0x6f0 [ 626.164347] ? ksys_lseek+0x1b0/0x1b0 [ 626.165022] ? fsnotify_perm.part.0+0x22d/0x620 [ 626.165625] ? security_file_permission+0xb1/0xe0 [ 626.166189] vfs_read+0x4da/0x620 [ 626.166592] ksys_read+0x12d/0x260 [ 626.167003] ? vfs_write+0xb10/0xb10 [ 626.167434] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 626.168040] ? syscall_enter_from_user_mode+0x1d/0x50 [ 626.168639] do_syscall_64+0x33/0x40 [ 626.169083] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 626.169674] RIP: 0033:0x7fe6449f5b19 [ 626.170107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 626.172227] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 626.173140] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 626.173964] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 626.174787] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 626.175613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 626.176436] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:43:45 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:43:45 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4b47, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:43:45 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 1) 05:43:45 executing program 5: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:45 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, 0x0, 0x0, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:43:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) [ 626.302413] loop4: detected capacity change from 0 to 41948160 05:43:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 2) [ 626.362953] FAULT_INJECTION: forcing a failure. [ 626.362953] name failslab, interval 1, probability 0, space 0, times 0 [ 626.365480] CPU: 0 PID: 6082 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 626.366940] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 626.368705] Call Trace: [ 626.369279] dump_stack+0x107/0x167 [ 626.370055] should_fail.cold+0x5/0xa [ 626.370870] ? __iomap_dio_rw+0x1ee/0x1110 [ 626.371768] should_failslab+0x5/0x20 [ 626.372576] kmem_cache_alloc_trace+0x55/0x320 [ 626.373591] __iomap_dio_rw+0x1ee/0x1110 [ 626.374457] ? lock_release+0x680/0x680 [ 626.375311] ? __lock_acquire+0xbb1/0x5b00 [ 626.376211] ? iomap_dio_bio_actor+0xef0/0xef0 [ 626.377219] ? down_read+0x10f/0x430 [ 626.378009] ? down_write+0x160/0x160 [ 626.378829] iomap_dio_rw+0x31/0x90 [ 626.379605] ext4_file_read_iter+0x2c7/0x4c0 [ 626.380544] new_sync_read+0x424/0x6f0 [ 626.381381] ? ksys_lseek+0x1b0/0x1b0 [ 626.382207] ? fsnotify_perm.part.0+0x22d/0x620 [ 626.383203] ? security_file_permission+0xb1/0xe0 [ 626.384238] vfs_read+0x4da/0x620 [ 626.384993] ksys_read+0x12d/0x260 [ 626.385748] ? vfs_write+0xb10/0xb10 [ 626.386544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 626.387660] ? syscall_enter_from_user_mode+0x1d/0x50 [ 626.388762] do_syscall_64+0x33/0x40 [ 626.389568] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 626.390659] RIP: 0033:0x7f8e866d3b19 [ 626.391457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 626.395379] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 626.397012] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 626.398525] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 626.400037] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 626.401556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 626.403072] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 626.462877] FAULT_INJECTION: forcing a failure. [ 626.462877] name failslab, interval 1, probability 0, space 0, times 0 [ 626.465387] CPU: 0 PID: 6088 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 626.466838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 626.468582] Call Trace: [ 626.469165] dump_stack+0x107/0x167 [ 626.469933] should_fail.cold+0x5/0xa [ 626.470747] ? create_object.isra.0+0x3a/0xa30 [ 626.471713] should_failslab+0x5/0x20 [ 626.472513] kmem_cache_alloc+0x5b/0x310 [ 626.473384] create_object.isra.0+0x3a/0xa30 [ 626.474308] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 626.475379] kmem_cache_alloc_trace+0x151/0x320 [ 626.476367] __iomap_dio_rw+0x1ee/0x1110 [ 626.477234] ? lock_release+0x680/0x680 [ 626.478080] ? __lock_acquire+0xbb1/0x5b00 [ 626.478971] ? iomap_dio_bio_actor+0xef0/0xef0 [ 626.479941] ? down_read+0x10f/0x430 [ 626.480725] ? down_write+0x160/0x160 [ 626.481541] iomap_dio_rw+0x31/0x90 [ 626.482308] ext4_file_read_iter+0x2c7/0x4c0 [ 626.483234] new_sync_read+0x424/0x6f0 [ 626.484067] ? ksys_lseek+0x1b0/0x1b0 [ 626.484889] ? fsnotify_perm.part.0+0x22d/0x620 [ 626.485877] ? security_file_permission+0xb1/0xe0 [ 626.486905] vfs_read+0x4da/0x620 [ 626.487648] ksys_read+0x12d/0x260 [ 626.488400] ? vfs_write+0xb10/0xb10 [ 626.489205] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 626.490314] ? syscall_enter_from_user_mode+0x1d/0x50 [ 626.491405] do_syscall_64+0x33/0x40 [ 626.492198] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 626.493301] RIP: 0033:0x7fe6449f5b19 [ 626.494091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 626.497983] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 626.499600] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 626.501132] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 626.502644] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 626.504159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 626.505687] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:43:58 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 3) 05:43:58 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4b49, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:43:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, 0x0, 0x0, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:43:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) [ 638.839071] FAULT_INJECTION: forcing a failure. [ 638.839071] name failslab, interval 1, probability 0, space 0, times 0 [ 638.840494] CPU: 1 PID: 6097 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 638.841333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 638.842339] Call Trace: [ 638.842667] dump_stack+0x107/0x167 [ 638.843124] should_fail.cold+0x5/0xa [ 638.843594] ? create_object.isra.0+0x3a/0xa30 [ 638.844151] should_failslab+0x5/0x20 [ 638.844617] kmem_cache_alloc+0x5b/0x310 [ 638.845129] create_object.isra.0+0x3a/0xa30 [ 638.845672] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 638.846309] kmem_cache_alloc_trace+0x151/0x320 [ 638.846890] __iomap_dio_rw+0x1ee/0x1110 [ 638.847390] ? lock_release+0x680/0x680 [ 638.847879] ? __lock_acquire+0xbb1/0x5b00 [ 638.848396] ? iomap_dio_bio_actor+0xef0/0xef0 [ 638.848968] ? down_read+0x10f/0x430 [ 638.849434] ? down_write+0x160/0x160 [ 638.849905] iomap_dio_rw+0x31/0x90 [ 638.850351] ext4_file_read_iter+0x2c7/0x4c0 [ 638.850892] new_sync_read+0x424/0x6f0 [ 638.851369] ? ksys_lseek+0x1b0/0x1b0 [ 638.851845] ? fsnotify_perm.part.0+0x22d/0x620 [ 638.852239] FAULT_INJECTION: forcing a failure. [ 638.852239] name failslab, interval 1, probability 0, space 0, times 0 [ 638.852433] ? security_file_permission+0xb1/0xe0 [ 638.855367] vfs_read+0x4da/0x620 [ 638.855804] ksys_read+0x12d/0x260 [ 638.856242] ? vfs_write+0xb10/0xb10 [ 638.856700] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 638.857358] ? syscall_enter_from_user_mode+0x1d/0x50 [ 638.857988] do_syscall_64+0x33/0x40 [ 638.858446] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 638.859076] RIP: 0033:0x7f8e866d3b19 [ 638.859532] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 638.861771] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 638.862694] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 638.863554] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 638.864420] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 638.865291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 638.866180] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 638.867070] CPU: 0 PID: 6102 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 638.868531] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 638.870299] Call Trace: [ 638.870861] dump_stack+0x107/0x167 [ 638.871631] should_fail.cold+0x5/0xa [ 638.872440] ? mempool_alloc+0x148/0x360 [ 638.873313] ? mempool_free_pages+0x20/0x20 [ 638.874228] should_failslab+0x5/0x20 [ 638.875035] kmem_cache_alloc+0x5b/0x310 05:43:58 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 2) 05:43:58 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:43:58 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 638.875895] ? mempool_free_pages+0x20/0x20 [ 638.876941] mempool_alloc+0x148/0x360 [ 638.877791] ? mempool_resize+0x7d0/0x7d0 [ 638.878672] ? lock_downgrade+0x6d0/0x6d0 [ 638.879549] ? ext4_map_blocks+0x87c/0x1910 [ 638.880486] bio_alloc_bioset+0x36e/0x600 [ 638.881375] ? bvec_alloc+0x2f0/0x2f0 [ 638.882184] ? iov_iter_npages+0x1fd/0xa70 [ 638.883079] ? ext4_iomap_begin+0x1a0/0x700 [ 638.884000] iomap_dio_bio_actor+0x518/0xef0 [ 638.884948] iomap_dio_actor+0x36f/0x560 [ 638.885826] iomap_apply+0x289/0x810 [ 638.886620] ? iomap_dio_rw+0x90/0x90 [ 638.887428] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 638.888651] ? delete_from_page_cache_batch+0xa30/0xa30 [ 638.889780] ? mark_held_locks+0x9e/0xe0 [ 638.890650] ? filemap_check_errors+0xa5/0x150 [ 638.891626] __iomap_dio_rw+0x6cd/0x1110 [ 638.892483] ? iomap_dio_rw+0x90/0x90 [ 638.893588] ? iomap_dio_bio_actor+0xef0/0xef0 [ 638.894566] ? down_read+0x10f/0x430 [ 638.895351] ? down_write+0x160/0x160 [ 638.896159] iomap_dio_rw+0x31/0x90 [ 638.896931] ext4_file_read_iter+0x2c7/0x4c0 [ 638.897873] new_sync_read+0x424/0x6f0 [ 638.898695] ? ksys_lseek+0x1b0/0x1b0 [ 638.899525] ? fsnotify_perm.part.0+0x22d/0x620 [ 638.900504] ? security_file_permission+0xb1/0xe0 [ 638.901530] vfs_read+0x4da/0x620 [ 638.902265] ksys_read+0x12d/0x260 [ 638.903009] ? vfs_write+0xb10/0xb10 [ 638.903796] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 638.904893] ? syscall_enter_from_user_mode+0x1d/0x50 [ 638.905982] do_syscall_64+0x33/0x40 [ 638.906764] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 638.907843] RIP: 0033:0x7fe6449f5b19 [ 638.908622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 638.912517] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 638.914125] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 638.915633] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 638.917146] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 638.918650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 638.920150] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:43:58 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:43:58 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) [ 638.926788] loop4: detected capacity change from 0 to 41948160 05:43:58 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 3) [ 638.974948] FAULT_INJECTION: forcing a failure. [ 638.974948] name failslab, interval 1, probability 0, space 0, times 0 [ 638.977340] CPU: 0 PID: 6113 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 638.978781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 638.980528] Call Trace: [ 638.981099] dump_stack+0x107/0x167 [ 638.981871] should_fail.cold+0x5/0xa [ 638.982675] ? mempool_alloc+0x148/0x360 [ 638.983532] ? mempool_free_pages+0x20/0x20 [ 638.984438] should_failslab+0x5/0x20 [ 638.985254] kmem_cache_alloc+0x5b/0x310 [ 638.986112] ? mempool_free_pages+0x20/0x20 [ 638.987023] mempool_alloc+0x148/0x360 [ 638.987846] ? mempool_resize+0x7d0/0x7d0 [ 638.988718] ? lock_downgrade+0x6d0/0x6d0 [ 638.989602] ? ext4_map_blocks+0x87c/0x1910 [ 638.990533] bio_alloc_bioset+0x36e/0x600 [ 638.991409] ? bvec_alloc+0x2f0/0x2f0 [ 638.992221] ? iov_iter_npages+0x1fd/0xa70 [ 638.993119] ? ext4_iomap_begin+0x1a0/0x700 [ 638.994033] iomap_dio_bio_actor+0x518/0xef0 [ 638.994976] iomap_dio_actor+0x36f/0x560 [ 638.995874] iomap_apply+0x289/0x810 [ 638.996751] ? iomap_dio_rw+0x90/0x90 [ 638.997574] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 638.998797] ? delete_from_page_cache_batch+0xa30/0xa30 [ 638.999921] ? mark_held_locks+0x9e/0xe0 [ 639.000798] ? filemap_check_errors+0xa5/0x150 [ 639.001780] __iomap_dio_rw+0x6cd/0x1110 [ 639.002643] ? iomap_dio_rw+0x90/0x90 [ 639.003467] ? iomap_dio_bio_actor+0xef0/0xef0 [ 639.004438] ? down_read+0x10f/0x430 [ 639.005237] ? down_write+0x160/0x160 [ 639.006056] iomap_dio_rw+0x31/0x90 [ 639.006827] ext4_file_read_iter+0x2c7/0x4c0 [ 639.007770] new_sync_read+0x424/0x6f0 [ 639.008592] ? ksys_lseek+0x1b0/0x1b0 [ 639.009428] ? fsnotify_perm.part.0+0x22d/0x620 [ 639.010415] ? security_file_permission+0xb1/0xe0 [ 639.011445] vfs_read+0x4da/0x620 [ 639.012185] ksys_read+0x12d/0x260 [ 639.012935] ? vfs_write+0xb10/0xb10 [ 639.013737] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 639.014847] ? syscall_enter_from_user_mode+0x1d/0x50 [ 639.015937] do_syscall_64+0x33/0x40 [ 639.016722] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 639.017808] RIP: 0033:0x7f8e866d3b19 [ 639.018593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 639.022481] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 639.024099] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 639.025616] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 639.027135] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 639.028650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 639.030167] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 652.349138] FAULT_INJECTION: forcing a failure. [ 652.349138] name failslab, interval 1, probability 0, space 0, times 0 [ 652.351623] CPU: 0 PID: 6117 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 652.353064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 652.354811] Call Trace: [ 652.355372] dump_stack+0x107/0x167 [ 652.356150] should_fail.cold+0x5/0xa [ 652.356956] ? create_object.isra.0+0x3a/0xa30 [ 652.357926] should_failslab+0x5/0x20 [ 652.358735] kmem_cache_alloc+0x5b/0x310 [ 652.359593] ? ext4_sb_block_valid+0x382/0x680 [ 652.360561] create_object.isra.0+0x3a/0xa30 [ 652.361495] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 652.362570] kmem_cache_alloc+0x159/0x310 [ 652.363447] ? mempool_free_pages+0x20/0x20 [ 652.364371] mempool_alloc+0x148/0x360 [ 652.365210] ? mempool_resize+0x7d0/0x7d0 [ 652.366102] ? lock_downgrade+0x6d0/0x6d0 [ 652.366977] ? ext4_map_blocks+0x87c/0x1910 [ 652.367915] bio_alloc_bioset+0x36e/0x600 [ 652.368800] ? bvec_alloc+0x2f0/0x2f0 [ 652.369618] ? iov_iter_npages+0x1fd/0xa70 [ 652.370518] ? ext4_iomap_begin+0x1a0/0x700 [ 652.371443] iomap_dio_bio_actor+0x518/0xef0 [ 652.372395] iomap_dio_actor+0x36f/0x560 [ 652.373280] iomap_apply+0x289/0x810 [ 652.374077] ? iomap_dio_rw+0x90/0x90 [ 652.374888] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 652.376110] ? delete_from_page_cache_batch+0xa30/0xa30 [ 652.377249] ? mark_held_locks+0x9e/0xe0 [ 652.378125] ? filemap_check_errors+0xa5/0x150 05:44:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 4) 05:44:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:44:11 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:44:11 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, 0x0, 0x0, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:44:11 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5411, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:44:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:44:11 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 4) 05:44:11 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, 0x0, 0x0, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 652.379113] __iomap_dio_rw+0x6cd/0x1110 [ 652.380236] ? iomap_dio_rw+0x90/0x90 [ 652.381075] ? iomap_dio_bio_actor+0xef0/0xef0 [ 652.382063] ? down_read+0x10f/0x430 [ 652.382854] ? down_write+0x160/0x160 [ 652.383663] iomap_dio_rw+0x31/0x90 [ 652.384435] ext4_file_read_iter+0x2c7/0x4c0 [ 652.385381] new_sync_read+0x424/0x6f0 [ 652.386209] ? ksys_lseek+0x1b0/0x1b0 [ 652.387033] ? fsnotify_perm.part.0+0x22d/0x620 [ 652.388019] ? security_file_permission+0xb1/0xe0 [ 652.389055] vfs_read+0x4da/0x620 [ 652.389830] ksys_read+0x12d/0x260 [ 652.390582] ? vfs_write+0xb10/0xb10 [ 652.391379] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 652.392490] ? syscall_enter_from_user_mode+0x1d/0x50 [ 652.393613] do_syscall_64+0x33/0x40 [ 652.394402] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 652.395484] RIP: 0033:0x7f8e866d3b19 [ 652.396272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 652.400183] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 652.401821] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 652.403340] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 652.404858] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 652.406378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.407906] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 652.422247] FAULT_INJECTION: forcing a failure. [ 652.422247] name failslab, interval 1, probability 0, space 0, times 0 [ 652.424712] CPU: 0 PID: 6124 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 652.426157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 652.427912] Call Trace: [ 652.428472] dump_stack+0x107/0x167 [ 652.429260] should_fail.cold+0x5/0xa [ 652.430071] ? create_object.isra.0+0x3a/0xa30 [ 652.431040] should_failslab+0x5/0x20 [ 652.431848] kmem_cache_alloc+0x5b/0x310 [ 652.432707] ? ext4_sb_block_valid+0x382/0x680 [ 652.433694] create_object.isra.0+0x3a/0xa30 [ 652.434626] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 652.435711] kmem_cache_alloc+0x159/0x310 [ 652.436608] ? mempool_free_pages+0x20/0x20 [ 652.437541] mempool_alloc+0x148/0x360 [ 652.438385] ? mempool_resize+0x7d0/0x7d0 [ 652.439271] ? lock_downgrade+0x6d0/0x6d0 [ 652.440158] ? ext4_map_blocks+0x87c/0x1910 [ 652.441092] bio_alloc_bioset+0x36e/0x600 [ 652.441984] ? bvec_alloc+0x2f0/0x2f0 [ 652.442805] ? iov_iter_npages+0x1fd/0xa70 [ 652.443706] ? ext4_iomap_begin+0x1a0/0x700 [ 652.444638] iomap_dio_bio_actor+0x518/0xef0 [ 652.445597] iomap_dio_actor+0x36f/0x560 [ 652.446467] iomap_apply+0x289/0x810 [ 652.447271] ? iomap_dio_rw+0x90/0x90 [ 652.448100] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 652.449335] ? delete_from_page_cache_batch+0xa30/0xa30 [ 652.450472] ? mark_held_locks+0x9e/0xe0 [ 652.451347] ? filemap_check_errors+0xa5/0x150 [ 652.452331] __iomap_dio_rw+0x6cd/0x1110 [ 652.453191] ? iomap_dio_rw+0x90/0x90 [ 652.454041] ? iomap_dio_bio_actor+0xef0/0xef0 [ 652.455024] ? down_read+0x10f/0x430 [ 652.455812] ? down_write+0x160/0x160 [ 652.456625] iomap_dio_rw+0x31/0x90 [ 652.457410] ext4_file_read_iter+0x2c7/0x4c0 05:44:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) [ 652.458353] new_sync_read+0x424/0x6f0 [ 652.459340] ? ksys_lseek+0x1b0/0x1b0 [ 652.460161] ? fsnotify_perm.part.0+0x22d/0x620 [ 652.461146] ? security_file_permission+0xb1/0xe0 [ 652.462191] vfs_read+0x4da/0x620 [ 652.462929] ksys_read+0x12d/0x260 [ 652.463683] ? vfs_write+0xb10/0xb10 [ 652.464477] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 652.465641] ? syscall_enter_from_user_mode+0x1d/0x50 [ 652.466745] do_syscall_64+0x33/0x40 [ 652.467548] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 652.468641] RIP: 0033:0x7fe6449f5b19 [ 652.469437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 652.473359] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 652.474974] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 652.476488] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 652.478023] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 652.479533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.481063] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 652.503858] loop4: detected capacity change from 0 to 41948160 05:44:11 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) 05:44:11 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x541b, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:44:12 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0x0) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:44:12 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 5) 05:44:12 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, 0x0, 0x0) [ 652.653039] FAULT_INJECTION: forcing a failure. [ 652.653039] name failslab, interval 1, probability 0, space 0, times 0 [ 652.655501] CPU: 0 PID: 6144 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 652.656935] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 652.658691] Call Trace: [ 652.659253] dump_stack+0x107/0x167 [ 652.660029] should_fail.cold+0x5/0xa [ 652.660838] ? mempool_alloc+0x148/0x360 [ 652.661701] ? mempool_free_pages+0x20/0x20 [ 652.662612] should_failslab+0x5/0x20 [ 652.663414] kmem_cache_alloc+0x5b/0x310 [ 652.664273] ? mempool_free_pages+0x20/0x20 [ 652.665186] mempool_alloc+0x148/0x360 [ 652.666021] ? mempool_resize+0x7d0/0x7d0 [ 652.666899] ? mempool_resize+0x7d0/0x7d0 [ 652.667774] ? lock_downgrade+0x6d0/0x6d0 [ 652.668646] ? ext4_map_blocks+0x87c/0x1910 [ 652.669590] bvec_alloc+0xd8/0x2f0 [ 652.670348] bio_alloc_bioset+0x40a/0x600 [ 652.671233] ? bvec_alloc+0x2f0/0x2f0 [ 652.672038] ? iov_iter_npages+0x1fd/0xa70 [ 652.672927] ? ext4_iomap_begin+0x1a0/0x700 [ 652.673864] iomap_dio_bio_actor+0x518/0xef0 [ 652.674814] iomap_dio_actor+0x36f/0x560 [ 652.675677] iomap_apply+0x289/0x810 [ 652.676467] ? iomap_dio_rw+0x90/0x90 [ 652.677280] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 652.678500] ? delete_from_page_cache_batch+0xa30/0xa30 [ 652.679623] ? mark_held_locks+0x9e/0xe0 [ 652.680491] ? filemap_check_errors+0xa5/0x150 [ 652.681467] __iomap_dio_rw+0x6cd/0x1110 [ 652.682336] ? iomap_dio_rw+0x90/0x90 [ 652.683155] ? iomap_dio_bio_actor+0xef0/0xef0 [ 652.684131] ? down_read+0x10f/0x430 [ 652.684915] ? down_write+0x160/0x160 [ 652.685731] iomap_dio_rw+0x31/0x90 [ 652.686499] ext4_file_read_iter+0x2c7/0x4c0 [ 652.687434] new_sync_read+0x424/0x6f0 [ 652.688407] ? ksys_lseek+0x1b0/0x1b0 [ 652.689279] ? fsnotify_perm.part.0+0x22d/0x620 [ 652.690270] ? security_file_permission+0xb1/0xe0 [ 652.691302] vfs_read+0x4da/0x620 [ 652.692049] ksys_read+0x12d/0x260 [ 652.692809] ? vfs_write+0xb10/0xb10 [ 652.693620] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 652.694735] ? syscall_enter_from_user_mode+0x1d/0x50 [ 652.695834] do_syscall_64+0x33/0x40 [ 652.696627] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 652.697722] RIP: 0033:0x7f8e866d3b19 [ 652.698512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 652.702422] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 652.704040] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 652.705557] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 652.707070] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 652.708582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.710101] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 05:44:12 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 5) [ 652.735390] FAULT_INJECTION: forcing a failure. [ 652.735390] name failslab, interval 1, probability 0, space 0, times 0 [ 652.737829] CPU: 0 PID: 6150 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 652.739285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 652.741057] Call Trace: [ 652.741629] dump_stack+0x107/0x167 [ 652.742411] should_fail.cold+0x5/0xa [ 652.743223] ? mempool_alloc+0x148/0x360 [ 652.744086] ? mempool_free_pages+0x20/0x20 [ 652.744998] should_failslab+0x5/0x20 [ 652.745820] kmem_cache_alloc+0x5b/0x310 [ 652.746687] ? mempool_free_pages+0x20/0x20 [ 652.747607] mempool_alloc+0x148/0x360 05:44:12 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5421, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:44:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 652.748443] ? mempool_resize+0x7d0/0x7d0 [ 652.749468] FAULT_INJECTION: forcing a failure. [ 652.749468] name failslab, interval 1, probability 0, space 0, times 0 [ 652.749543] ? mempool_resize+0x7d0/0x7d0 [ 652.752014] ? lock_downgrade+0x6d0/0x6d0 [ 652.752900] ? ext4_map_blocks+0x87c/0x1910 [ 652.753846] bvec_alloc+0xd8/0x2f0 [ 652.754613] bio_alloc_bioset+0x40a/0x600 [ 652.755509] ? bvec_alloc+0x2f0/0x2f0 [ 652.756330] ? iov_iter_npages+0x1fd/0xa70 [ 652.757240] ? ext4_iomap_begin+0x1a0/0x700 [ 652.758170] iomap_dio_bio_actor+0x518/0xef0 [ 652.759127] iomap_dio_actor+0x36f/0x560 [ 652.760005] iomap_apply+0x289/0x810 [ 652.760803] ? iomap_dio_rw+0x90/0x90 [ 652.761631] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 652.762869] ? delete_from_page_cache_batch+0xa30/0xa30 [ 652.764006] ? mark_held_locks+0x9e/0xe0 [ 652.764887] ? filemap_check_errors+0xa5/0x150 [ 652.765883] __iomap_dio_rw+0x6cd/0x1110 [ 652.766749] ? iomap_dio_rw+0x90/0x90 [ 652.767584] ? iomap_dio_bio_actor+0xef0/0xef0 [ 652.768570] ? down_read+0x10f/0x430 [ 652.769372] ? down_write+0x160/0x160 [ 652.770194] iomap_dio_rw+0x31/0x90 [ 652.770979] ext4_file_read_iter+0x2c7/0x4c0 [ 652.771924] new_sync_read+0x424/0x6f0 [ 652.772762] ? ksys_lseek+0x1b0/0x1b0 [ 652.773598] ? fsnotify_perm.part.0+0x22d/0x620 [ 652.774600] ? security_file_permission+0xb1/0xe0 [ 652.775640] vfs_read+0x4da/0x620 [ 652.776390] ksys_read+0x12d/0x260 [ 652.777151] ? vfs_write+0xb10/0xb10 [ 652.777959] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 652.779083] ? syscall_enter_from_user_mode+0x1d/0x50 [ 652.780192] do_syscall_64+0x33/0x40 [ 652.780990] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 652.782092] RIP: 0033:0x7fe6449f5b19 [ 652.782885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 652.786822] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 652.788443] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 652.789977] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 652.791502] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 652.793034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.794555] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 652.796098] CPU: 1 PID: 6152 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 652.797093] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 652.798293] Call Trace: [ 652.798675] dump_stack+0x107/0x167 [ 652.799187] should_fail.cold+0x5/0xa [ 652.799730] ? __iomap_dio_rw+0x1ee/0x1110 [ 652.800321] should_failslab+0x5/0x20 [ 652.800849] kmem_cache_alloc_trace+0x55/0x320 [ 652.801489] __iomap_dio_rw+0x1ee/0x1110 [ 652.802065] ? lock_release+0x680/0x680 [ 652.802619] ? __lock_acquire+0xbb1/0x5b00 [ 652.803199] ? iomap_dio_bio_actor+0xef0/0xef0 [ 652.803837] ? down_read+0x10f/0x430 [ 652.804342] ? down_write+0x160/0x160 [ 652.804868] iomap_dio_rw+0x31/0x90 [ 652.805381] ext4_file_read_iter+0x2c7/0x4c0 [ 652.805992] new_sync_read+0x424/0x6f0 [ 652.806525] ? ksys_lseek+0x1b0/0x1b0 [ 652.807063] ? fsnotify_perm.part.0+0x22d/0x620 [ 652.807698] ? security_file_permission+0xb1/0xe0 [ 652.808359] vfs_read+0x4da/0x620 [ 652.808843] ksys_read+0x12d/0x260 [ 652.809336] ? vfs_write+0xb10/0xb10 [ 652.809845] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 652.810568] ? syscall_enter_from_user_mode+0x1d/0x50 [ 652.811269] do_syscall_64+0x33/0x40 [ 652.811775] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 652.812484] RIP: 0033:0x7fe5e39d4b19 [ 652.812998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 652.815513] RSP: 002b:00007fe5e0f4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 652.816557] RAX: ffffffffffffffda RBX: 00007fe5e3ae7f60 RCX: 00007fe5e39d4b19 [ 652.817551] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 652.818528] RBP: 00007fe5e0f4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 652.819519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.820491] R13: 00007fff79c0c84f R14: 00007fe5e0f4a300 R15: 0000000000022000 05:44:12 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 1) [ 652.855814] FAULT_INJECTION: forcing a failure. [ 652.855814] name failslab, interval 1, probability 0, space 0, times 0 [ 652.857369] CPU: 1 PID: 6156 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 652.858285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 652.859389] Call Trace: [ 652.859745] dump_stack+0x107/0x167 [ 652.860233] should_fail.cold+0x5/0xa [ 652.860753] ? __iomap_dio_rw+0x1ee/0x1110 [ 652.861328] should_failslab+0x5/0x20 [ 652.861841] kmem_cache_alloc_trace+0x55/0x320 [ 652.862447] __iomap_dio_rw+0x1ee/0x1110 [ 652.862994] ? lock_release+0x680/0x680 [ 652.863530] ? __lock_acquire+0xbb1/0x5b00 [ 652.864102] ? iomap_dio_bio_actor+0xef0/0xef0 [ 652.864723] ? down_read+0x10f/0x430 [ 652.865238] ? down_write+0x160/0x160 [ 652.865750] iomap_dio_rw+0x31/0x90 [ 652.866232] ext4_file_read_iter+0x2c7/0x4c0 [ 652.866820] new_sync_read+0x424/0x6f0 [ 652.867341] ? ksys_lseek+0x1b0/0x1b0 [ 652.867858] ? fsnotify_perm.part.0+0x22d/0x620 [ 652.868474] ? security_file_permission+0xb1/0xe0 [ 652.869125] vfs_read+0x4da/0x620 [ 652.869610] ksys_read+0x12d/0x260 [ 652.870088] ? vfs_write+0xb10/0xb10 [ 652.870580] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 652.871267] ? syscall_enter_from_user_mode+0x1d/0x50 [ 652.871953] do_syscall_64+0x33/0x40 [ 652.872441] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 652.873115] RIP: 0033:0x7f4792794b19 [ 652.873623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 652.876121] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 652.877128] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 652.878092] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 652.879037] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 652.879974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.880911] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 05:44:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 1) 05:44:12 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 1) 05:44:12 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5450, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 652.903224] FAULT_INJECTION: forcing a failure. [ 652.903224] name failslab, interval 1, probability 0, space 0, times 0 [ 652.905698] CPU: 0 PID: 6160 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 652.907156] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 652.908930] Call Trace: [ 652.909506] dump_stack+0x107/0x167 [ 652.910284] should_fail.cold+0x5/0xa [ 652.911103] ? __iomap_dio_rw+0x1ee/0x1110 [ 652.912003] should_failslab+0x5/0x20 [ 652.912816] kmem_cache_alloc_trace+0x55/0x320 [ 652.913808] __iomap_dio_rw+0x1ee/0x1110 [ 652.914685] ? lock_release+0x680/0x680 [ 652.915540] ? __lock_acquire+0xbb1/0x5b00 [ 652.916451] ? iomap_dio_bio_actor+0xef0/0xef0 [ 652.917446] ? down_read+0x10f/0x430 [ 652.918242] ? down_write+0x160/0x160 [ 652.919062] iomap_dio_rw+0x31/0x90 [ 652.919844] ext4_file_read_iter+0x2c7/0x4c0 [ 652.920794] new_sync_read+0x424/0x6f0 [ 652.921633] ? ksys_lseek+0x1b0/0x1b0 [ 652.922467] ? fsnotify_perm.part.0+0x22d/0x620 [ 652.923462] ? security_file_permission+0xb1/0xe0 [ 652.924501] vfs_read+0x4da/0x620 [ 652.925267] ksys_read+0x12d/0x260 [ 652.926028] ? vfs_write+0xb10/0xb10 [ 652.926828] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 652.927947] ? syscall_enter_from_user_mode+0x1d/0x50 [ 652.929051] do_syscall_64+0x33/0x40 [ 652.929854] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 652.930950] RIP: 0033:0x7fb97f666b19 [ 652.931741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 652.935683] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 652.937351] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 652.938871] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 652.940394] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 652.941923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.943448] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:44:12 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 2) [ 653.008174] FAULT_INJECTION: forcing a failure. [ 653.008174] name failslab, interval 1, probability 0, space 0, times 0 [ 653.009710] CPU: 1 PID: 6162 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 653.010524] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 653.011513] Call Trace: [ 653.011836] dump_stack+0x107/0x167 [ 653.012275] should_fail.cold+0x5/0xa [ 653.012733] ? create_object.isra.0+0x3a/0xa30 [ 653.013287] should_failslab+0x5/0x20 [ 653.013747] kmem_cache_alloc+0x5b/0x310 [ 653.014234] create_object.isra.0+0x3a/0xa30 [ 653.014755] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 653.015356] kmem_cache_alloc_trace+0x151/0x320 [ 653.015913] __iomap_dio_rw+0x1ee/0x1110 [ 653.016398] ? lock_release+0x680/0x680 [ 653.016871] ? __lock_acquire+0xbb1/0x5b00 [ 653.017379] ? iomap_dio_bio_actor+0xef0/0xef0 [ 653.017926] ? down_read+0x10f/0x430 [ 653.018366] ? down_write+0x160/0x160 [ 653.018825] iomap_dio_rw+0x31/0x90 [ 653.019259] ext4_file_read_iter+0x2c7/0x4c0 [ 653.019786] new_sync_read+0x424/0x6f0 [ 653.020246] ? ksys_lseek+0x1b0/0x1b0 [ 653.020712] ? fsnotify_perm.part.0+0x22d/0x620 [ 653.021271] ? security_file_permission+0xb1/0xe0 [ 653.021850] vfs_read+0x4da/0x620 [ 653.022263] ksys_read+0x12d/0x260 [ 653.022697] ? vfs_write+0xb10/0xb10 [ 653.023141] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 653.023762] ? syscall_enter_from_user_mode+0x1d/0x50 [ 653.024379] do_syscall_64+0x33/0x40 [ 653.024850] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 653.025469] RIP: 0033:0x7f4792794b19 [ 653.025905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 653.028067] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 653.028970] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 653.029820] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 653.030658] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 653.031501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 653.032340] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 05:44:25 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 6) 05:44:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 3) 05:44:25 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5451, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:44:25 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 2) 05:44:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, 0x0, 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:44:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 6) [ 665.782712] FAULT_INJECTION: forcing a failure. [ 665.782712] name failslab, interval 1, probability 0, space 0, times 0 [ 665.784159] CPU: 1 PID: 6171 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 665.785017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 665.786076] Call Trace: [ 665.786442] dump_stack+0x107/0x167 [ 665.786900] should_fail.cold+0x5/0xa [ 665.787382] ? create_object.isra.0+0x3a/0xa30 [ 665.787955] should_failslab+0x5/0x20 [ 665.788435] kmem_cache_alloc+0x5b/0x310 [ 665.788951] create_object.isra.0+0x3a/0xa30 [ 665.789514] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 665.790156] kmem_cache_alloc+0x159/0x310 [ 665.790680] ? mempool_free_pages+0x20/0x20 [ 665.791220] mempool_alloc+0x148/0x360 [ 665.791729] ? mempool_resize+0x7d0/0x7d0 [ 665.792254] ? mempool_resize+0x7d0/0x7d0 [ 665.792781] ? lock_downgrade+0x6d0/0x6d0 [ 665.793306] ? ext4_map_blocks+0x87c/0x1910 [ 665.793866] bvec_alloc+0xd8/0x2f0 [ 665.794317] bio_alloc_bioset+0x40a/0x600 [ 665.794847] ? bvec_alloc+0x2f0/0x2f0 [ 665.795331] ? iov_iter_npages+0x1fd/0xa70 [ 665.795869] ? ext4_iomap_begin+0x1a0/0x700 [ 665.796418] iomap_dio_bio_actor+0x518/0xef0 [ 665.796985] iomap_dio_actor+0x36f/0x560 [ 665.797510] iomap_apply+0x289/0x810 [ 665.797980] ? iomap_dio_rw+0x90/0x90 [ 665.798466] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 665.799185] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 665.799876] ? delete_from_page_cache_batch+0xa30/0xa30 [ 665.800551] ? filemap_check_errors+0xa5/0x150 [ 665.801140] __iomap_dio_rw+0x6cd/0x1110 [ 665.801656] ? iomap_dio_rw+0x90/0x90 [ 665.802144] ? iomap_dio_bio_actor+0xef0/0xef0 [ 665.802718] ? down_read+0x10f/0x430 [ 665.803186] ? down_write+0x160/0x160 [ 665.803666] iomap_dio_rw+0x31/0x90 [ 665.804122] ext4_file_read_iter+0x2c7/0x4c0 [ 665.804686] new_sync_read+0x424/0x6f0 [ 665.805171] ? ksys_lseek+0x1b0/0x1b0 [ 665.805669] ? fsnotify_perm.part.0+0x22d/0x620 [ 665.806263] ? security_file_permission+0xb1/0xe0 [ 665.806873] vfs_read+0x4da/0x620 [ 665.807315] ksys_read+0x12d/0x260 [ 665.807765] ? vfs_write+0xb10/0xb10 [ 665.808234] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 665.808891] ? syscall_enter_from_user_mode+0x1d/0x50 [ 665.809550] do_syscall_64+0x33/0x40 [ 665.810016] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 665.810232] FAULT_INJECTION: forcing a failure. [ 665.810232] name failslab, interval 1, probability 0, space 0, times 0 [ 665.810657] RIP: 0033:0x7f8e866d3b19 [ 665.810668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 665.810674] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 665.810686] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 665.810692] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 665.810710] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 665.819978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 665.820859] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 665.821782] CPU: 0 PID: 6177 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 665.823617] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 665.825757] Call Trace: [ 665.826443] dump_stack+0x107/0x167 [ 665.827379] should_fail.cold+0x5/0xa [ 665.828361] ? mempool_alloc+0x148/0x360 [ 665.829411] ? mempool_free_pages+0x20/0x20 [ 665.829679] FAULT_INJECTION: forcing a failure. [ 665.829679] name failslab, interval 1, probability 0, space 0, times 0 [ 665.830516] should_failslab+0x5/0x20 [ 665.830541] kmem_cache_alloc+0x5b/0x310 [ 665.830568] ? mempool_free_pages+0x20/0x20 [ 665.834991] mempool_alloc+0x148/0x360 [ 665.835995] ? mempool_resize+0x7d0/0x7d0 [ 665.837060] ? lock_downgrade+0x6d0/0x6d0 [ 665.838132] ? ext4_map_blocks+0x87c/0x1910 [ 665.839125] bio_alloc_bioset+0x36e/0x600 [ 665.840007] ? bvec_alloc+0x2f0/0x2f0 [ 665.840825] ? iov_iter_npages+0x1fd/0xa70 [ 665.841731] ? ext4_iomap_begin+0x1a0/0x700 [ 665.842747] iomap_dio_bio_actor+0x518/0xef0 [ 665.843786] iomap_dio_actor+0x36f/0x560 [ 665.844888] iomap_apply+0x289/0x810 [ 665.845907] ? iomap_dio_rw+0x90/0x90 [ 665.846855] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 665.848112] ? delete_from_page_cache_batch+0xa30/0xa30 [ 665.849270] ? mark_held_locks+0x9e/0xe0 [ 665.850174] ? filemap_check_errors+0xa5/0x150 [ 665.851190] __iomap_dio_rw+0x6cd/0x1110 [ 665.852059] ? iomap_dio_rw+0x90/0x90 [ 665.852900] ? iomap_dio_bio_actor+0xef0/0xef0 [ 665.853909] ? down_read+0x10f/0x430 [ 665.854729] ? down_write+0x160/0x160 [ 665.855564] iomap_dio_rw+0x31/0x90 [ 665.856353] ext4_file_read_iter+0x2c7/0x4c0 [ 665.857309] new_sync_read+0x424/0x6f0 [ 665.858164] ? ksys_lseek+0x1b0/0x1b0 [ 665.859021] ? fsnotify_perm.part.0+0x22d/0x620 [ 665.860033] ? security_file_permission+0xb1/0xe0 [ 665.861089] vfs_read+0x4da/0x620 [ 665.861867] ksys_read+0x12d/0x260 [ 665.862649] ? vfs_write+0xb10/0xb10 [ 665.863474] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 665.864608] ? syscall_enter_from_user_mode+0x1d/0x50 [ 665.865734] do_syscall_64+0x33/0x40 [ 665.866555] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 665.867664] RIP: 0033:0x7f4792794b19 [ 665.868470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 665.872474] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 665.874137] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 665.875693] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 665.877244] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 665.878795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 665.880360] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 [ 665.881929] CPU: 1 PID: 6170 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 665.882762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 665.883769] Call Trace: [ 665.884094] dump_stack+0x107/0x167 [ 665.884536] should_fail.cold+0x5/0xa [ 665.885000] ? create_object.isra.0+0x3a/0xa30 [ 665.885558] should_failslab+0x5/0x20 [ 665.886029] kmem_cache_alloc+0x5b/0x310 [ 665.886525] create_object.isra.0+0x3a/0xa30 [ 665.887057] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 665.887681] kmem_cache_alloc_trace+0x151/0x320 [ 665.888245] __iomap_dio_rw+0x1ee/0x1110 [ 665.888745] ? lock_release+0x680/0x680 [ 665.889247] ? __lock_acquire+0xbb1/0x5b00 [ 665.889791] ? iomap_dio_bio_actor+0xef0/0xef0 05:44:25 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 2) 05:44:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0x0) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 665.890360] ? down_read+0x10f/0x430 [ 665.891077] ? down_write+0x160/0x160 [ 665.891542] iomap_dio_rw+0x31/0x90 [ 665.891981] ext4_file_read_iter+0x2c7/0x4c0 [ 665.892665] new_sync_read+0x424/0x6f0 [ 665.893252] ? ksys_lseek+0x1b0/0x1b0 [ 665.893732] ? fsnotify_perm.part.0+0x22d/0x620 [ 665.894297] ? security_file_permission+0xb1/0xe0 [ 665.894888] vfs_read+0x4da/0x620 [ 665.895317] ksys_read+0x12d/0x260 [ 665.895748] ? vfs_write+0xb10/0xb10 [ 665.896201] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 665.896833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 665.897480] do_syscall_64+0x33/0x40 [ 665.897932] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 665.898557] RIP: 0033:0x7fe5e39d4b19 [ 665.899007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 665.901214] RSP: 002b:00007fe5e0f4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 665.902130] RAX: ffffffffffffffda RBX: 00007fe5e3ae7f60 RCX: 00007fe5e39d4b19 [ 665.903218] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 665.904291] RBP: 00007fe5e0f4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 665.905145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 665.906009] R13: 00007fff79c0c84f R14: 00007fe5e0f4a300 R15: 0000000000022000 [ 665.912092] FAULT_INJECTION: forcing a failure. [ 665.912092] name failslab, interval 1, probability 0, space 0, times 0 [ 665.913544] CPU: 1 PID: 6172 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 665.914357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 665.915352] Call Trace: [ 665.915675] dump_stack+0x107/0x167 [ 665.916126] should_fail.cold+0x5/0xa [ 665.916584] ? create_object.isra.0+0x3a/0xa30 [ 665.917128] should_failslab+0x5/0x20 [ 665.917590] kmem_cache_alloc+0x5b/0x310 [ 665.918078] create_object.isra.0+0x3a/0xa30 [ 665.918599] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 665.919207] kmem_cache_alloc+0x159/0x310 [ 665.919705] ? mempool_free_pages+0x20/0x20 [ 665.920215] mempool_alloc+0x148/0x360 [ 665.920680] ? mempool_resize+0x7d0/0x7d0 [ 665.921177] ? mempool_resize+0x7d0/0x7d0 [ 665.921680] ? lock_downgrade+0x6d0/0x6d0 [ 665.922173] ? ext4_map_blocks+0x87c/0x1910 [ 665.922703] bvec_alloc+0xd8/0x2f0 [ 665.923133] bio_alloc_bioset+0x40a/0x600 [ 665.923632] ? bvec_alloc+0x2f0/0x2f0 [ 665.924089] ? iov_iter_npages+0x1fd/0xa70 [ 665.924599] ? ext4_iomap_begin+0x1a0/0x700 [ 665.925116] iomap_dio_bio_actor+0x518/0xef0 [ 665.925675] iomap_dio_actor+0x36f/0x560 [ 665.926167] iomap_apply+0x289/0x810 [ 665.926615] ? iomap_dio_rw+0x90/0x90 [ 665.927070] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 665.927763] ? delete_from_page_cache_batch+0xa30/0xa30 [ 665.928416] ? mark_held_locks+0x9e/0xe0 [ 665.928912] ? filemap_check_errors+0xa5/0x150 [ 665.929469] __iomap_dio_rw+0x6cd/0x1110 [ 665.929950] ? iomap_dio_rw+0x90/0x90 [ 665.930413] ? iomap_dio_bio_actor+0xef0/0xef0 [ 665.930971] ? down_read+0x10f/0x430 [ 665.931411] ? down_write+0x160/0x160 [ 665.931869] iomap_dio_rw+0x31/0x90 [ 665.932306] ext4_file_read_iter+0x2c7/0x4c0 [ 665.932832] new_sync_read+0x424/0x6f0 [ 665.933302] ? ksys_lseek+0x1b0/0x1b0 [ 665.933773] ? fsnotify_perm.part.0+0x22d/0x620 [ 665.934332] ? security_file_permission+0xb1/0xe0 [ 665.934915] vfs_read+0x4da/0x620 [ 665.935339] ksys_read+0x12d/0x260 [ 665.935764] ? vfs_write+0xb10/0xb10 [ 665.936209] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 665.936833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 665.937452] do_syscall_64+0x33/0x40 [ 665.937896] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 665.938503] RIP: 0033:0x7fe6449f5b19 [ 665.938942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 665.941114] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 665.942024] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 665.942864] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 665.943708] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 665.944555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 665.945407] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 665.947005] FAULT_INJECTION: forcing a failure. [ 665.947005] name failslab, interval 1, probability 0, space 0, times 0 [ 665.948391] CPU: 1 PID: 6174 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 665.949192] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 665.950185] Call Trace: [ 665.950510] dump_stack+0x107/0x167 [ 665.950945] should_fail.cold+0x5/0xa [ 665.951398] ? create_object.isra.0+0x3a/0xa30 [ 665.951935] should_failslab+0x5/0x20 [ 665.952380] kmem_cache_alloc+0x5b/0x310 [ 665.952858] create_object.isra.0+0x3a/0xa30 [ 665.953370] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 665.953974] kmem_cache_alloc_trace+0x151/0x320 [ 665.954525] __iomap_dio_rw+0x1ee/0x1110 [ 665.955003] ? lock_release+0x680/0x680 [ 665.955475] ? __lock_acquire+0xbb1/0x5b00 [ 665.955971] ? iomap_dio_bio_actor+0xef0/0xef0 [ 665.956511] ? down_read+0x10f/0x430 [ 665.956944] ? down_write+0x160/0x160 [ 665.957404] iomap_dio_rw+0x31/0x90 [ 665.957850] ext4_file_read_iter+0x2c7/0x4c0 [ 665.958371] new_sync_read+0x424/0x6f0 [ 665.958841] ? ksys_lseek+0x1b0/0x1b0 [ 665.959293] ? fsnotify_perm.part.0+0x22d/0x620 [ 665.959850] ? security_file_permission+0xb1/0xe0 [ 665.960416] vfs_read+0x4da/0x620 [ 665.960831] ksys_read+0x12d/0x260 [ 665.961247] ? vfs_write+0xb10/0xb10 [ 665.961694] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 665.962311] ? syscall_enter_from_user_mode+0x1d/0x50 [ 665.962913] do_syscall_64+0x33/0x40 [ 665.963349] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 665.963952] RIP: 0033:0x7fb97f666b19 [ 665.964386] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 665.966546] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 665.967432] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 665.968262] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 665.969096] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 665.969925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 665.970751] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 665.987762] loop4: detected capacity change from 0 to 41948160 05:44:25 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5452, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:44:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 4) 05:44:25 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 3) 05:44:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0x0) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 666.055285] FAULT_INJECTION: forcing a failure. [ 666.055285] name failslab, interval 1, probability 0, space 0, times 0 [ 666.057778] CPU: 0 PID: 6187 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 666.059288] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 666.061077] Call Trace: [ 666.061684] dump_stack+0x107/0x167 [ 666.062492] should_fail.cold+0x5/0xa [ 666.063339] ? mempool_alloc+0x148/0x360 [ 666.064237] ? mempool_free_pages+0x20/0x20 [ 666.065182] should_failslab+0x5/0x20 [ 666.066026] kmem_cache_alloc+0x5b/0x310 [ 666.066923] ? mempool_free_pages+0x20/0x20 [ 666.067874] mempool_alloc+0x148/0x360 [ 666.068740] ? mempool_resize+0x7d0/0x7d0 [ 666.069659] ? lock_downgrade+0x6d0/0x6d0 [ 666.070562] ? ext4_map_blocks+0x87c/0x1910 [ 666.071521] bio_alloc_bioset+0x36e/0x600 [ 666.072445] ? bvec_alloc+0x2f0/0x2f0 [ 666.073282] ? iov_iter_npages+0x1fd/0xa70 [ 666.074218] ? ext4_iomap_begin+0x1a0/0x700 [ 666.075160] iomap_dio_bio_actor+0x518/0xef0 [ 666.076133] iomap_dio_actor+0x36f/0x560 [ 666.077031] iomap_apply+0x289/0x810 [ 666.077866] ? iomap_dio_rw+0x90/0x90 [ 666.078709] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 666.079964] ? delete_from_page_cache_batch+0xa30/0xa30 [ 666.081119] ? mark_held_locks+0x9e/0xe0 [ 666.082028] ? filemap_check_errors+0xa5/0x150 [ 666.083045] __iomap_dio_rw+0x6cd/0x1110 [ 666.083931] ? iomap_dio_rw+0x90/0x90 [ 666.084782] ? iomap_dio_bio_actor+0xef0/0xef0 [ 666.085805] ? down_read+0x10f/0x430 [ 666.086638] ? down_write+0x160/0x160 [ 666.087478] iomap_dio_rw+0x31/0x90 [ 666.088282] ext4_file_read_iter+0x2c7/0x4c0 [ 666.089247] new_sync_read+0x424/0x6f0 [ 666.090098] ? ksys_lseek+0x1b0/0x1b0 [ 666.090963] ? fsnotify_perm.part.0+0x22d/0x620 [ 666.091982] ? security_file_permission+0xb1/0xe0 [ 666.093042] vfs_read+0x4da/0x620 [ 666.093830] ksys_read+0x12d/0x260 [ 666.094621] ? vfs_write+0xb10/0xb10 [ 666.095440] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 666.096592] ? syscall_enter_from_user_mode+0x1d/0x50 [ 666.097728] do_syscall_64+0x33/0x40 [ 666.098554] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 666.099666] RIP: 0033:0x7fb97f666b19 [ 666.100478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 666.104496] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 666.106158] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 05:44:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 7) [ 666.107720] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 666.109418] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 666.110956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 05:44:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 666.112510] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 666.142183] FAULT_INJECTION: forcing a failure. [ 666.142183] name failslab, interval 1, probability 0, space 0, times 0 [ 666.144775] CPU: 0 PID: 6192 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 666.146267] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 666.148093] Call Trace: [ 666.148729] dump_stack+0x107/0x167 [ 666.149608] should_fail.cold+0x5/0xa [ 666.150459] ? create_object.isra.0+0x3a/0xa30 [ 666.151690] should_failslab+0x5/0x20 [ 666.152717] kmem_cache_alloc+0x5b/0x310 [ 666.153745] ? ext4_sb_block_valid+0x382/0x680 [ 666.154746] create_object.isra.0+0x3a/0xa30 [ 666.155711] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 666.156816] kmem_cache_alloc+0x159/0x310 [ 666.157355] loop4: detected capacity change from 0 to 41948160 [ 666.157733] ? mempool_free_pages+0x20/0x20 [ 666.157755] mempool_alloc+0x148/0x360 [ 666.160267] ? mempool_resize+0x7d0/0x7d0 [ 666.161168] ? lock_downgrade+0x6d0/0x6d0 [ 666.162077] ? ext4_map_blocks+0x87c/0x1910 [ 666.163037] bio_alloc_bioset+0x36e/0x600 [ 666.163958] ? bvec_alloc+0x2f0/0x2f0 [ 666.164790] ? iov_iter_npages+0x1fd/0xa70 [ 666.165725] ? ext4_iomap_begin+0x1a0/0x700 [ 666.166673] iomap_dio_bio_actor+0x518/0xef0 [ 666.167653] iomap_dio_actor+0x36f/0x560 [ 666.168542] iomap_apply+0x289/0x810 [ 666.169353] ? iomap_dio_rw+0x90/0x90 [ 666.170201] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 666.171480] ? delete_from_page_cache_batch+0xa30/0xa30 [ 666.172631] ? mark_held_locks+0x9e/0xe0 [ 666.173542] ? filemap_check_errors+0xa5/0x150 [ 666.174543] __iomap_dio_rw+0x6cd/0x1110 [ 666.175436] ? iomap_dio_rw+0x90/0x90 [ 666.176287] ? iomap_dio_bio_actor+0xef0/0xef0 [ 666.177288] ? down_read+0x10f/0x430 [ 666.178102] ? down_write+0x160/0x160 [ 666.178946] iomap_dio_rw+0x31/0x90 [ 666.179754] ext4_file_read_iter+0x2c7/0x4c0 [ 666.180737] new_sync_read+0x424/0x6f0 [ 666.181643] ? ksys_lseek+0x1b0/0x1b0 [ 666.182491] ? fsnotify_perm.part.0+0x22d/0x620 [ 666.183506] ? security_file_permission+0xb1/0xe0 [ 666.184573] vfs_read+0x4da/0x620 [ 666.185337] ksys_read+0x12d/0x260 [ 666.186110] ? vfs_write+0xb10/0xb10 [ 666.186928] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 666.188060] ? syscall_enter_from_user_mode+0x1d/0x50 [ 666.189201] do_syscall_64+0x33/0x40 [ 666.190015] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 666.191126] RIP: 0033:0x7f4792794b19 [ 666.191931] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 666.195927] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 666.197609] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 666.199167] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 666.200715] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 666.202288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 666.203821] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 [ 666.226267] FAULT_INJECTION: forcing a failure. [ 666.226267] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 666.228264] CPU: 1 PID: 6197 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 666.229042] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 666.230004] Call Trace: [ 666.230311] dump_stack+0x107/0x167 [ 666.230729] should_fail.cold+0x5/0xa [ 666.231168] __alloc_pages_nodemask+0x182/0x600 [ 666.231699] ? add_mm_counter_fast+0x220/0x220 [ 666.232221] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 666.232920] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 666.233528] ? lock_downgrade+0x6d0/0x6d0 [ 666.234002] ? mark_held_locks+0x9e/0xe0 [ 666.234471] alloc_pages_vma+0xbb/0x410 [ 666.234931] handle_mm_fault+0x152f/0x3500 [ 666.235414] ? do_raw_spin_lock+0x121/0x260 [ 666.235911] ? rwlock_bug.part.0+0x90/0x90 [ 666.236394] ? __pmd_alloc+0x630/0x630 [ 666.236860] __get_user_pages+0x6ec/0x1620 [ 666.237352] ? follow_page_mask+0x1900/0x1900 [ 666.237877] ? down_read+0x10f/0x430 [ 666.238310] ? down_write+0x160/0x160 [ 666.238758] get_user_pages_unlocked+0x18a/0x690 [ 666.239328] ? internal_get_user_pages_fast+0xdce/0x2640 [ 666.239956] ? pin_user_pages_locked+0x7b0/0x7b0 [ 666.240507] internal_get_user_pages_fast+0x175f/0x2640 [ 666.241140] ? pin_user_pages_unlocked+0x80/0x80 [ 666.241709] ? trace_hardirqs_on+0x5b/0x180 [ 666.242205] get_user_pages_fast+0x66/0xa0 [ 666.242701] iov_iter_get_pages+0x297/0xf40 [ 666.243196] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 666.243762] ? mempool_resize+0x7d0/0x7d0 [ 666.244254] bio_iov_iter_get_pages+0x22a/0x1200 [ 666.244808] ? bvec_alloc+0x17e/0x2f0 [ 666.245247] ? bio_alloc_bioset+0x2a1/0x600 [ 666.245757] ? bio_add_pc_page+0x100/0x100 [ 666.246249] ? bvec_alloc+0x290/0x2f0 [ 666.246707] ? iov_iter_npages+0x1fd/0xa70 [ 666.247191] ? ext4_iomap_begin+0x1a0/0x700 [ 666.247694] iomap_dio_bio_actor+0x77a/0xef0 [ 666.248207] iomap_dio_actor+0x36f/0x560 [ 666.248678] iomap_apply+0x289/0x810 [ 666.249108] ? iomap_dio_rw+0x90/0x90 [ 666.249556] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 666.250220] ? delete_from_page_cache_batch+0xa30/0xa30 [ 666.250828] ? mark_held_locks+0x9e/0xe0 [ 666.251304] ? filemap_check_errors+0xa5/0x150 [ 666.251830] __iomap_dio_rw+0x6cd/0x1110 [ 666.252294] ? iomap_dio_rw+0x90/0x90 [ 666.252757] ? iomap_dio_bio_actor+0xef0/0xef0 [ 666.253286] ? down_read+0x10f/0x430 [ 666.253721] ? down_write+0x160/0x160 [ 666.254162] iomap_dio_rw+0x31/0x90 [ 666.254582] ext4_file_read_iter+0x2c7/0x4c0 [ 666.255089] new_sync_read+0x424/0x6f0 [ 666.255537] ? ksys_lseek+0x1b0/0x1b0 [ 666.255994] ? fsnotify_perm.part.0+0x22d/0x620 [ 666.256530] ? security_file_permission+0xb1/0xe0 [ 666.257092] vfs_read+0x4da/0x620 [ 666.257502] ksys_read+0x12d/0x260 [ 666.257913] ? vfs_write+0xb10/0xb10 [ 666.258349] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 666.258966] ? syscall_enter_from_user_mode+0x1d/0x50 [ 666.259669] do_syscall_64+0x33/0x40 [ 666.260149] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 666.260739] RIP: 0033:0x7f8e866d3b19 [ 666.261169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 666.263307] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 666.264207] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 666.265038] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 666.265864] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 666.266726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 666.267549] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 05:44:38 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 4) 05:44:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:44:38 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 5) 05:44:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:44:38 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 3) 05:44:39 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 8) 05:44:38 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5460, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:44:38 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 7) [ 679.574070] FAULT_INJECTION: forcing a failure. [ 679.574070] name failslab, interval 1, probability 0, space 0, times 0 [ 679.576478] CPU: 0 PID: 6205 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 679.577877] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.579554] Call Trace: [ 679.580093] dump_stack+0x107/0x167 [ 679.580834] should_fail.cold+0x5/0xa [ 679.581619] ? mempool_alloc+0x148/0x360 [ 679.582442] ? mempool_free_pages+0x20/0x20 [ 679.583316] should_failslab+0x5/0x20 [ 679.584088] kmem_cache_alloc+0x5b/0x310 [ 679.584923] ? mempool_free_pages+0x20/0x20 [ 679.585806] mempool_alloc+0x148/0x360 [ 679.586599] ? mempool_resize+0x7d0/0x7d0 [ 679.587444] ? lock_downgrade+0x6d0/0x6d0 [ 679.588287] ? ext4_map_blocks+0x87c/0x1910 [ 679.589182] bio_alloc_bioset+0x36e/0x600 [ 679.590038] ? bvec_alloc+0x2f0/0x2f0 [ 679.590816] ? iov_iter_npages+0x1fd/0xa70 [ 679.591676] ? ext4_iomap_begin+0x1a0/0x700 [ 679.592561] iomap_dio_bio_actor+0x518/0xef0 [ 679.593470] iomap_dio_actor+0x36f/0x560 [ 679.594310] iomap_apply+0x289/0x810 [ 679.595074] ? iomap_dio_rw+0x90/0x90 [ 679.595849] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 679.596292] FAULT_INJECTION: forcing a failure. [ 679.596292] name failslab, interval 1, probability 0, space 0, times 0 [ 679.597025] ? delete_from_page_cache_batch+0xa30/0xa30 [ 679.597044] ? mark_held_locks+0x9e/0xe0 [ 679.597075] ? filemap_check_errors+0xa5/0x150 [ 679.602319] __iomap_dio_rw+0x6cd/0x1110 [ 679.603326] ? iomap_dio_rw+0x90/0x90 [ 679.604307] ? iomap_dio_bio_actor+0xef0/0xef0 [ 679.605234] ? down_read+0x10f/0x430 [ 679.605990] ? down_write+0x160/0x160 [ 679.606759] iomap_dio_rw+0x31/0x90 [ 679.607492] ext4_file_read_iter+0x2c7/0x4c0 [ 679.608375] new_sync_read+0x424/0x6f0 [ 679.609154] ? ksys_lseek+0x1b0/0x1b0 [ 679.609943] ? fsnotify_perm.part.0+0x22d/0x620 [ 679.610875] ? security_file_permission+0xb1/0xe0 [ 679.611848] vfs_read+0x4da/0x620 [ 679.612546] ksys_read+0x12d/0x260 [ 679.613255] ? vfs_write+0xb10/0xb10 [ 679.614014] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 679.615059] ? syscall_enter_from_user_mode+0x1d/0x50 [ 679.616090] do_syscall_64+0x33/0x40 [ 679.616833] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 679.617872] RIP: 0033:0x7fe5e39d4b19 [ 679.618613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.622307] RSP: 002b:00007fe5e0f4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 679.623812] RAX: ffffffffffffffda RBX: 00007fe5e3ae7f60 RCX: 00007fe5e39d4b19 [ 679.625215] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 679.626637] RBP: 00007fe5e0f4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 679.628038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 679.629443] R13: 00007fff79c0c84f R14: 00007fe5e0f4a300 R15: 0000000000022000 [ 679.630891] CPU: 1 PID: 6214 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 679.632360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.634144] Call Trace: [ 679.634712] dump_stack+0x107/0x167 [ 679.635490] should_fail.cold+0x5/0xa [ 679.636304] ? mempool_alloc+0x148/0x360 [ 679.637166] ? mempool_free_pages+0x20/0x20 [ 679.638094] should_failslab+0x5/0x20 [ 679.638906] kmem_cache_alloc+0x5b/0x310 [ 679.639775] ? mempool_free_pages+0x20/0x20 [ 679.640692] mempool_alloc+0x148/0x360 [ 679.641528] ? mempool_resize+0x7d0/0x7d0 [ 679.641665] FAULT_INJECTION: forcing a failure. [ 679.641665] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.642422] ? mempool_resize+0x7d0/0x7d0 [ 679.645577] ? lock_downgrade+0x6d0/0x6d0 [ 679.646461] ? ext4_map_blocks+0x87c/0x1910 [ 679.647391] bvec_alloc+0xd8/0x2f0 [ 679.648155] bio_alloc_bioset+0x40a/0x600 [ 679.649040] ? bvec_alloc+0x2f0/0x2f0 [ 679.649863] ? iov_iter_npages+0x1fd/0xa70 [ 679.650761] ? ext4_iomap_begin+0x1a0/0x700 [ 679.651685] iomap_dio_bio_actor+0x518/0xef0 [ 679.652643] iomap_dio_actor+0x36f/0x560 [ 679.653514] iomap_apply+0x289/0x810 [ 679.654312] ? iomap_dio_rw+0x90/0x90 [ 679.655126] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 679.656358] ? delete_from_page_cache_batch+0xa30/0xa30 [ 679.657488] ? mark_held_locks+0x9e/0xe0 [ 679.658372] ? filemap_check_errors+0xa5/0x150 [ 679.659351] __iomap_dio_rw+0x6cd/0x1110 [ 679.660213] ? iomap_dio_rw+0x90/0x90 [ 679.661041] ? iomap_dio_bio_actor+0xef0/0xef0 [ 679.662025] ? down_read+0x10f/0x430 [ 679.662815] ? down_write+0x160/0x160 [ 679.663637] iomap_dio_rw+0x31/0x90 [ 679.664410] ext4_file_read_iter+0x2c7/0x4c0 [ 679.665350] new_sync_read+0x424/0x6f0 [ 679.666187] ? ksys_lseek+0x1b0/0x1b0 [ 679.667022] ? fsnotify_perm.part.0+0x22d/0x620 [ 679.668013] ? security_file_permission+0xb1/0xe0 [ 679.669053] vfs_read+0x4da/0x620 [ 679.669806] ksys_read+0x12d/0x260 [ 679.670560] ? vfs_write+0xb10/0xb10 [ 679.671357] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 679.672474] ? syscall_enter_from_user_mode+0x1d/0x50 [ 679.673584] do_syscall_64+0x33/0x40 [ 679.674373] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 679.675467] RIP: 0033:0x7f4792794b19 [ 679.676259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.680169] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 679.681799] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 679.683324] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 679.684839] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 679.686365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 679.687877] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 [ 679.689414] CPU: 0 PID: 6216 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 679.690753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.691313] FAULT_INJECTION: forcing a failure. [ 679.691313] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.692343] Call Trace: [ 679.692364] dump_stack+0x107/0x167 [ 679.692384] should_fail.cold+0x5/0xa [ 679.692417] __alloc_pages_nodemask+0x182/0x600 [ 679.697649] ? add_mm_counter_fast+0x220/0x220 [ 679.698530] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 679.699689] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 679.700701] ? lock_downgrade+0x6d0/0x6d0 [ 679.701493] ? mark_held_locks+0x9e/0xe0 [ 679.702286] alloc_pages_vma+0xbb/0x410 [ 679.703049] handle_mm_fault+0x152f/0x3500 [ 679.703850] ? do_raw_spin_lock+0x121/0x260 [ 679.704664] ? rwlock_bug.part.0+0x90/0x90 [ 679.705462] ? __pmd_alloc+0x630/0x630 [ 679.706228] __get_user_pages+0x6ec/0x1620 [ 679.707025] ? follow_page_mask+0x1900/0x1900 [ 679.707874] ? down_read+0x10f/0x430 [ 679.708578] ? down_write+0x160/0x160 [ 679.709311] get_user_pages_unlocked+0x18a/0x690 [ 679.710218] ? internal_get_user_pages_fast+0xdce/0x2640 [ 679.711244] ? pin_user_pages_locked+0x7b0/0x7b0 [ 679.712153] internal_get_user_pages_fast+0x175f/0x2640 [ 679.713193] ? pin_user_pages_unlocked+0x80/0x80 [ 679.714096] ? trace_hardirqs_on+0x5b/0x180 [ 679.714918] get_user_pages_fast+0x66/0xa0 [ 679.715720] iov_iter_get_pages+0x297/0xf40 [ 679.716538] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 679.717463] ? mempool_resize+0x7d0/0x7d0 [ 679.718264] bio_iov_iter_get_pages+0x22a/0x1200 [ 679.719163] ? bvec_alloc+0x17e/0x2f0 [ 679.719895] ? bio_alloc_bioset+0x2a1/0x600 [ 679.720711] ? bio_add_pc_page+0x100/0x100 [ 679.721503] ? bvec_alloc+0x290/0x2f0 [ 679.722227] ? iov_iter_npages+0x1fd/0xa70 [ 679.723022] ? ext4_iomap_begin+0x1a0/0x700 [ 679.723844] iomap_dio_bio_actor+0x77a/0xef0 [ 679.724696] iomap_dio_actor+0x36f/0x560 [ 679.725462] iomap_apply+0x289/0x810 [ 679.726167] ? iomap_dio_rw+0x90/0x90 [ 679.726882] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 679.727960] ? delete_from_page_cache_batch+0xa30/0xa30 [ 679.728953] ? mark_held_locks+0x9e/0xe0 [ 679.729732] ? filemap_check_errors+0xa5/0x150 [ 679.730590] __iomap_dio_rw+0x6cd/0x1110 [ 679.731346] ? iomap_dio_rw+0x90/0x90 [ 679.732078] ? iomap_dio_bio_actor+0xef0/0xef0 [ 679.732937] ? down_read+0x10f/0x430 [ 679.733629] ? down_write+0x160/0x160 [ 679.734345] iomap_dio_rw+0x31/0x90 [ 679.735033] ext4_file_read_iter+0x2c7/0x4c0 [ 679.735859] new_sync_read+0x424/0x6f0 [ 679.736582] ? ksys_lseek+0x1b0/0x1b0 [ 679.737305] ? fsnotify_perm.part.0+0x22d/0x620 [ 679.738172] ? security_file_permission+0xb1/0xe0 [ 679.739082] vfs_read+0x4da/0x620 [ 679.739728] ksys_read+0x12d/0x260 [ 679.740393] ? vfs_write+0xb10/0xb10 [ 679.741092] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 679.742083] ? syscall_enter_from_user_mode+0x1d/0x50 [ 679.743040] do_syscall_64+0x33/0x40 [ 679.743737] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 679.744680] RIP: 0033:0x7f8e866d3b19 [ 679.745374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.748732] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 679.750140] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 679.751444] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 679.752737] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 679.754033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 679.755335] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 679.756675] CPU: 1 PID: 6211 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 679.758146] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.759915] Call Trace: [ 679.760478] dump_stack+0x107/0x167 [ 679.761264] should_fail.cold+0x5/0xa [ 679.762091] __alloc_pages_nodemask+0x182/0x600 [ 679.763081] ? add_mm_counter_fast+0x220/0x220 [ 679.764057] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 679.765334] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 679.766466] ? lock_downgrade+0x6d0/0x6d0 [ 679.767356] ? mark_held_locks+0x9e/0xe0 [ 679.768225] alloc_pages_vma+0xbb/0x410 [ 679.769075] handle_mm_fault+0x152f/0x3500 [ 679.769981] ? do_raw_spin_lock+0x121/0x260 [ 679.770893] ? rwlock_bug.part.0+0x90/0x90 [ 679.771794] ? __pmd_alloc+0x630/0x630 [ 679.771993] loop4: detected capacity change from 0 to 41948160 [ 679.772643] __get_user_pages+0x6ec/0x1620 [ 679.772676] ? follow_page_mask+0x1900/0x1900 [ 679.775569] ? down_read+0x10f/0x430 [ 679.776359] ? down_write+0x160/0x160 [ 679.777193] get_user_pages_unlocked+0x18a/0x690 [ 679.778221] ? internal_get_user_pages_fast+0xdce/0x2640 [ 679.779374] ? pin_user_pages_locked+0x7b0/0x7b0 [ 679.780400] internal_get_user_pages_fast+0x175f/0x2640 [ 679.781563] ? pin_user_pages_unlocked+0x80/0x80 [ 679.782580] ? trace_hardirqs_on+0x5b/0x180 [ 679.783505] get_user_pages_fast+0x66/0xa0 [ 679.784407] iov_iter_get_pages+0x297/0xf40 [ 679.785332] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 679.786380] ? mempool_resize+0x7d0/0x7d0 [ 679.787272] bio_iov_iter_get_pages+0x22a/0x1200 [ 679.788294] ? bvec_alloc+0x17e/0x2f0 [ 679.789107] ? bio_alloc_bioset+0x2a1/0x600 [ 679.790027] ? bio_add_pc_page+0x100/0x100 [ 679.790922] ? bvec_alloc+0x290/0x2f0 [ 679.791735] ? iov_iter_npages+0x1fd/0xa70 [ 679.792641] ? ext4_iomap_begin+0x1a0/0x700 [ 679.793559] iomap_dio_bio_actor+0x77a/0xef0 [ 679.794520] iomap_dio_actor+0x36f/0x560 [ 679.795392] iomap_apply+0x289/0x810 [ 679.796185] ? iomap_dio_rw+0x90/0x90 [ 679.796998] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 679.798237] ? delete_from_page_cache_batch+0xa30/0xa30 [ 679.799364] ? mark_held_locks+0x9e/0xe0 [ 679.800238] ? filemap_check_errors+0xa5/0x150 [ 679.801210] __iomap_dio_rw+0x6cd/0x1110 [ 679.802079] ? iomap_dio_rw+0x90/0x90 [ 679.802909] ? iomap_dio_bio_actor+0xef0/0xef0 [ 679.803883] ? down_read+0x10f/0x430 [ 679.804671] ? down_write+0x160/0x160 [ 679.805485] iomap_dio_rw+0x31/0x90 [ 679.806266] ext4_file_read_iter+0x2c7/0x4c0 [ 679.807203] new_sync_read+0x424/0x6f0 [ 679.808031] ? ksys_lseek+0x1b0/0x1b0 [ 679.808855] ? fsnotify_perm.part.0+0x22d/0x620 [ 679.809850] ? security_file_permission+0xb1/0xe0 [ 679.810886] vfs_read+0x4da/0x620 [ 679.811629] ksys_read+0x12d/0x260 [ 679.812385] ? vfs_write+0xb10/0xb10 [ 679.813193] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 679.814316] ? syscall_enter_from_user_mode+0x1d/0x50 [ 679.815410] do_syscall_64+0x33/0x40 [ 679.816200] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 679.817282] RIP: 0033:0x7fe6449f5b19 [ 679.818084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.821986] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 679.823612] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 679.825133] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 679.826657] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 679.828175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 679.829702] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 679.844756] FAULT_INJECTION: forcing a failure. [ 679.844756] name failslab, interval 1, probability 0, space 0, times 0 [ 679.847194] CPU: 1 PID: 6212 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 679.848649] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.850434] Call Trace: [ 679.850997] dump_stack+0x107/0x167 [ 679.851780] should_fail.cold+0x5/0xa [ 679.852603] ? create_object.isra.0+0x3a/0xa30 [ 679.853593] should_failslab+0x5/0x20 [ 679.854420] kmem_cache_alloc+0x5b/0x310 [ 679.855287] ? ext4_sb_block_valid+0x382/0x680 [ 679.856271] create_object.isra.0+0x3a/0xa30 [ 679.857212] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 679.858313] kmem_cache_alloc+0x159/0x310 [ 679.859204] ? mempool_free_pages+0x20/0x20 [ 679.860124] mempool_alloc+0x148/0x360 [ 679.860970] ? mempool_resize+0x7d0/0x7d0 [ 679.861867] ? lock_downgrade+0x6d0/0x6d0 [ 679.862760] ? ext4_map_blocks+0x87c/0x1910 [ 679.863698] bio_alloc_bioset+0x36e/0x600 [ 679.864593] ? bvec_alloc+0x2f0/0x2f0 [ 679.865411] ? iov_iter_npages+0x1fd/0xa70 [ 679.866328] ? ext4_iomap_begin+0x1a0/0x700 [ 679.867255] iomap_dio_bio_actor+0x518/0xef0 [ 679.868217] iomap_dio_actor+0x36f/0x560 [ 679.869098] iomap_apply+0x289/0x810 [ 679.869911] ? iomap_dio_rw+0x90/0x90 [ 679.870728] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 679.871978] ? delete_from_page_cache_batch+0xa30/0xa30 [ 679.873113] ? mark_held_locks+0x9e/0xe0 [ 679.874004] ? filemap_check_errors+0xa5/0x150 [ 679.874984] __iomap_dio_rw+0x6cd/0x1110 [ 679.875847] ? iomap_dio_rw+0x90/0x90 [ 679.876675] ? iomap_dio_bio_actor+0xef0/0xef0 [ 679.877663] ? down_read+0x10f/0x430 [ 679.878455] ? down_write+0x160/0x160 [ 679.879286] iomap_dio_rw+0x31/0x90 [ 679.880067] ext4_file_read_iter+0x2c7/0x4c0 [ 679.881015] new_sync_read+0x424/0x6f0 [ 679.881858] ? ksys_lseek+0x1b0/0x1b0 [ 679.882680] ? fsnotify_perm.part.0+0x22d/0x620 [ 679.883678] ? security_file_permission+0xb1/0xe0 [ 679.884717] vfs_read+0x4da/0x620 [ 679.885466] ksys_read+0x12d/0x260 [ 679.886232] ? vfs_write+0xb10/0xb10 [ 679.887039] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 679.888156] ? syscall_enter_from_user_mode+0x1d/0x50 [ 679.889258] do_syscall_64+0x33/0x40 [ 679.890059] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 679.891152] RIP: 0033:0x7fb97f666b19 [ 679.891942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.895866] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 679.897493] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 679.899248] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 679.901032] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 679.902733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 679.904325] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:44:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 679.944056] loop4: detected capacity change from 0 to 41948160 05:44:39 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8901, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:44:39 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:44:39 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 4) 05:44:39 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 9) 05:44:39 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 8) [ 680.024449] FAULT_INJECTION: forcing a failure. [ 680.024449] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 680.027040] CPU: 1 PID: 6228 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 680.028494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.030255] Call Trace: [ 680.030822] dump_stack+0x107/0x167 [ 680.031596] should_fail.cold+0x5/0xa [ 680.032409] __alloc_pages_nodemask+0x182/0x600 [ 680.033395] ? add_mm_counter_fast+0x220/0x220 [ 680.034377] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 680.035653] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 680.036775] ? lock_downgrade+0x6d0/0x6d0 [ 680.037666] ? mark_held_locks+0x9e/0xe0 [ 680.038544] alloc_pages_vma+0xbb/0x410 [ 680.039395] handle_mm_fault+0x152f/0x3500 [ 680.040298] ? do_raw_spin_lock+0x121/0x260 [ 680.041212] ? rwlock_bug.part.0+0x90/0x90 [ 680.042121] ? __pmd_alloc+0x630/0x630 [ 680.042974] __get_user_pages+0x6ec/0x1620 [ 680.043896] ? follow_page_mask+0x1900/0x1900 [ 680.044849] ? down_read+0x10f/0x430 [ 680.045650] ? down_write+0x160/0x160 [ 680.046481] get_user_pages_unlocked+0x18a/0x690 [ 680.047499] ? internal_get_user_pages_fast+0xdce/0x2640 [ 680.048660] ? pin_user_pages_locked+0x7b0/0x7b0 [ 680.049697] internal_get_user_pages_fast+0x175f/0x2640 [ 680.050863] ? pin_user_pages_unlocked+0x80/0x80 [ 680.051879] ? trace_hardirqs_on+0x5b/0x180 [ 680.052799] get_user_pages_fast+0x66/0xa0 [ 680.053710] iov_iter_get_pages+0x297/0xf40 [ 680.054627] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 680.055673] ? mempool_resize+0x7d0/0x7d0 [ 680.056563] bio_iov_iter_get_pages+0x22a/0x1200 [ 680.057587] ? bvec_alloc+0x17e/0x2f0 [ 680.058401] ? bio_alloc_bioset+0x2a1/0x600 [ 680.059319] ? bio_add_pc_page+0x100/0x100 [ 680.060223] ? bvec_alloc+0x290/0x2f0 [ 680.061036] ? iov_iter_npages+0x1fd/0xa70 [ 680.061954] ? ext4_iomap_begin+0x1a0/0x700 [ 680.062884] iomap_dio_bio_actor+0x77a/0xef0 [ 680.063841] iomap_dio_actor+0x36f/0x560 [ 680.064719] iomap_apply+0x289/0x810 [ 680.065510] ? iomap_dio_rw+0x90/0x90 [ 680.066339] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 680.067572] ? delete_from_page_cache_batch+0xa30/0xa30 [ 680.068703] ? mark_held_locks+0x9e/0xe0 [ 680.069587] ? filemap_check_errors+0xa5/0x150 [ 680.070608] __iomap_dio_rw+0x6cd/0x1110 [ 680.071466] ? iomap_dio_rw+0x90/0x90 [ 680.072298] ? iomap_dio_bio_actor+0xef0/0xef0 [ 680.073281] ? down_read+0x10f/0x430 [ 680.074084] ? down_write+0x160/0x160 [ 680.074898] iomap_dio_rw+0x31/0x90 [ 680.075675] ext4_file_read_iter+0x2c7/0x4c0 [ 680.076613] new_sync_read+0x424/0x6f0 [ 680.077432] ? ksys_lseek+0x1b0/0x1b0 [ 680.078238] ? fsnotify_perm.part.0+0x22d/0x620 [ 680.079292] ? security_file_permission+0xb1/0xe0 [ 680.080545] vfs_read+0x4da/0x620 [ 680.081378] ksys_read+0x12d/0x260 [ 680.082250] ? vfs_write+0xb10/0xb10 [ 680.083135] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 680.084360] ? syscall_enter_from_user_mode+0x1d/0x50 [ 680.085563] do_syscall_64+0x33/0x40 [ 680.086483] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 680.087706] RIP: 0033:0x7fe6449f5b19 [ 680.088592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.092683] FAULT_INJECTION: forcing a failure. [ 680.092683] name failslab, interval 1, probability 0, space 0, times 0 [ 680.092844] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 680.096164] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 680.097595] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 680.099052] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 680.100502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.101969] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 680.103454] CPU: 0 PID: 6235 Comm: syz-executor.5 Not tainted 5.10.246 #1 [ 680.104442] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.105640] Call Trace: [ 680.106009] dump_stack+0x107/0x167 [ 680.106519] should_fail.cold+0x5/0xa [ 680.107058] ? create_object.isra.0+0x3a/0xa30 05:44:39 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 6) 05:44:39 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 5) 05:44:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(0x0, 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:44:39 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8902, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 680.107708] should_failslab+0x5/0x20 [ 680.108400] kmem_cache_alloc+0x5b/0x310 [ 680.108956] ? ext4_sb_block_valid+0x382/0x680 [ 680.109600] create_object.isra.0+0x3a/0xa30 [ 680.110218] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 680.110920] kmem_cache_alloc+0x159/0x310 [ 680.111512] ? mempool_free_pages+0x20/0x20 [ 680.112153] mempool_alloc+0x148/0x360 [ 680.112703] ? mempool_resize+0x7d0/0x7d0 [ 680.113322] ? lock_downgrade+0x6d0/0x6d0 [ 680.113970] ? ext4_map_blocks+0x87c/0x1910 [ 680.114651] bio_alloc_bioset+0x36e/0x600 [ 680.115342] ? bvec_alloc+0x2f0/0x2f0 [ 680.115927] ? iov_iter_npages+0x1fd/0xa70 [ 680.116601] ? ext4_iomap_begin+0x1a0/0x700 [ 680.117304] iomap_dio_bio_actor+0x518/0xef0 [ 680.118432] iomap_dio_actor+0x36f/0x560 [ 680.119573] iomap_apply+0x289/0x810 [ 680.120534] FAULT_INJECTION: forcing a failure. [ 680.120534] name failslab, interval 1, probability 0, space 0, times 0 [ 680.120608] ? iomap_dio_rw+0x90/0x90 [ 680.123668] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 680.124902] ? delete_from_page_cache_batch+0xa30/0xa30 [ 680.126029] ? mark_held_locks+0x9e/0xe0 [ 680.126884] ? filemap_check_errors+0xa5/0x150 [ 680.127835] __iomap_dio_rw+0x6cd/0x1110 [ 680.128686] ? iomap_dio_rw+0x90/0x90 [ 680.129497] ? iomap_dio_bio_actor+0xef0/0xef0 [ 680.130469] ? down_read+0x10f/0x430 [ 680.131248] ? down_write+0x160/0x160 [ 680.132040] iomap_dio_rw+0x31/0x90 [ 680.132785] ext4_file_read_iter+0x2c7/0x4c0 [ 680.133713] new_sync_read+0x424/0x6f0 [ 680.134520] ? ksys_lseek+0x1b0/0x1b0 [ 680.135330] ? fsnotify_perm.part.0+0x22d/0x620 [ 680.136306] ? security_file_permission+0xb1/0xe0 [ 680.137311] vfs_read+0x4da/0x620 [ 680.138062] ksys_read+0x12d/0x260 [ 680.138801] ? vfs_write+0xb10/0xb10 [ 680.139586] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 680.140668] ? syscall_enter_from_user_mode+0x1d/0x50 [ 680.141738] do_syscall_64+0x33/0x40 [ 680.142505] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 680.143562] RIP: 0033:0x7fe5e39d4b19 [ 680.144327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.148102] RSP: 002b:00007fe5e0f4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 680.149671] RAX: ffffffffffffffda RBX: 00007fe5e3ae7f60 RCX: 00007fe5e39d4b19 [ 680.151135] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 680.152600] RBP: 00007fe5e0f4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 680.154070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.155537] R13: 00007fff79c0c84f R14: 00007fe5e0f4a300 R15: 0000000000022000 [ 680.157034] CPU: 1 PID: 6238 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 680.158530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.160354] Call Trace: [ 680.160923] dump_stack+0x107/0x167 [ 680.161711] should_fail.cold+0x5/0xa [ 680.162528] ? create_object.isra.0+0x3a/0xa30 [ 680.163498] should_failslab+0x5/0x20 [ 680.164306] kmem_cache_alloc+0x5b/0x310 [ 680.165177] create_object.isra.0+0x3a/0xa30 [ 680.166116] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 680.167198] kmem_cache_alloc+0x159/0x310 [ 680.168082] ? mempool_free_pages+0x20/0x20 [ 680.169004] mempool_alloc+0x148/0x360 [ 680.169844] ? mempool_resize+0x7d0/0x7d0 [ 680.170727] ? mempool_resize+0x7d0/0x7d0 [ 680.171611] ? lock_downgrade+0x6d0/0x6d0 [ 680.172490] ? ext4_map_blocks+0x87c/0x1910 [ 680.173419] bvec_alloc+0xd8/0x2f0 [ 680.174192] bio_alloc_bioset+0x40a/0x600 [ 680.175077] ? bvec_alloc+0x2f0/0x2f0 [ 680.175890] ? iov_iter_npages+0x1fd/0xa70 [ 680.176788] ? ext4_iomap_begin+0x1a0/0x700 [ 680.177721] iomap_dio_bio_actor+0x518/0xef0 [ 680.178679] iomap_dio_actor+0x36f/0x560 [ 680.179550] iomap_apply+0x289/0x810 [ 680.180495] ? iomap_dio_rw+0x90/0x90 [ 680.181329] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 680.182602] ? delete_from_page_cache_batch+0xa30/0xa30 [ 680.183764] ? mark_held_locks+0x9e/0xe0 [ 680.184667] ? filemap_check_errors+0xa5/0x150 [ 680.185679] __iomap_dio_rw+0x6cd/0x1110 [ 680.186564] ? iomap_dio_rw+0x90/0x90 [ 680.187413] ? iomap_dio_bio_actor+0xef0/0xef0 [ 680.188425] ? down_read+0x10f/0x430 [ 680.189235] ? down_write+0x160/0x160 [ 680.190084] iomap_dio_rw+0x31/0x90 [ 680.190880] ext4_file_read_iter+0x2c7/0x4c0 [ 680.191842] new_sync_read+0x424/0x6f0 [ 680.192691] ? ksys_lseek+0x1b0/0x1b0 [ 680.193535] ? fsnotify_perm.part.0+0x22d/0x620 [ 680.194560] ? security_file_permission+0xb1/0xe0 [ 680.195617] vfs_read+0x4da/0x620 [ 680.196379] ksys_read+0x12d/0x260 [ 680.197154] ? vfs_write+0xb10/0xb10 [ 680.197981] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 680.199125] ? syscall_enter_from_user_mode+0x1d/0x50 [ 680.200250] do_syscall_64+0x33/0x40 [ 680.201066] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 680.202202] RIP: 0033:0x7f4792794b19 [ 680.203011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.207037] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 680.208739] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 680.210308] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 680.211860] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 680.213421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.214979] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 [ 680.221010] FAULT_INJECTION: forcing a failure. [ 680.221010] name failslab, interval 1, probability 0, space 0, times 0 [ 680.223470] CPU: 1 PID: 6232 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 680.224956] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.226771] Call Trace: [ 680.227346] dump_stack+0x107/0x167 [ 680.228143] should_fail.cold+0x5/0xa [ 680.228980] ? mempool_alloc+0x148/0x360 [ 680.229876] ? mempool_free_pages+0x20/0x20 [ 680.230812] should_failslab+0x5/0x20 [ 680.231645] kmem_cache_alloc+0x5b/0x310 [ 680.232421] FAULT_INJECTION: forcing a failure. [ 680.232421] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 680.232542] ? mempool_free_pages+0x20/0x20 [ 680.236155] mempool_alloc+0x148/0x360 [ 680.237011] ? mempool_resize+0x7d0/0x7d0 [ 680.237926] ? mempool_resize+0x7d0/0x7d0 [ 680.238829] ? lock_downgrade+0x6d0/0x6d0 [ 680.239732] ? ext4_map_blocks+0x87c/0x1910 [ 680.240685] bvec_alloc+0xd8/0x2f0 [ 680.241464] bio_alloc_bioset+0x40a/0x600 [ 680.242378] ? bvec_alloc+0x2f0/0x2f0 [ 680.243214] ? iov_iter_npages+0x1fd/0xa70 [ 680.244139] ? ext4_iomap_begin+0x1a0/0x700 [ 680.245088] iomap_dio_bio_actor+0x518/0xef0 [ 680.246076] iomap_dio_actor+0x36f/0x560 [ 680.246972] iomap_apply+0x289/0x810 [ 680.247787] ? iomap_dio_rw+0x90/0x90 [ 680.248625] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 680.249900] ? delete_from_page_cache_batch+0xa30/0xa30 [ 680.251063] ? mark_held_locks+0x9e/0xe0 [ 680.251963] ? filemap_check_errors+0xa5/0x150 [ 680.252965] __iomap_dio_rw+0x6cd/0x1110 [ 680.253860] ? iomap_dio_rw+0x90/0x90 [ 680.254712] ? iomap_dio_bio_actor+0xef0/0xef0 [ 680.255719] ? down_read+0x10f/0x430 [ 680.256531] ? down_write+0x160/0x160 [ 680.257371] iomap_dio_rw+0x31/0x90 [ 680.258182] ext4_file_read_iter+0x2c7/0x4c0 [ 680.259148] new_sync_read+0x424/0x6f0 [ 680.260000] ? ksys_lseek+0x1b0/0x1b0 [ 680.260850] ? fsnotify_perm.part.0+0x22d/0x620 [ 680.261878] ? security_file_permission+0xb1/0xe0 [ 680.262941] vfs_read+0x4da/0x620 [ 680.263703] ksys_read+0x12d/0x260 [ 680.264480] ? vfs_write+0xb10/0xb10 [ 680.265296] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 680.266450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 680.267579] do_syscall_64+0x33/0x40 [ 680.268391] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 680.269512] RIP: 0033:0x7fb97f666b19 [ 680.270330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.274374] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 680.276061] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 680.277651] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 680.279232] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 680.280813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.282402] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 680.284025] CPU: 0 PID: 6240 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 680.285609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.287751] Call Trace: [ 680.288415] dump_stack+0x107/0x167 [ 680.289311] should_fail.cold+0x5/0xa [ 680.290264] __alloc_pages_nodemask+0x182/0x600 [ 680.291290] ? add_mm_counter_fast+0x220/0x220 [ 680.292428] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 680.293754] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 680.294840] ? lock_downgrade+0x6d0/0x6d0 [ 680.295692] ? mark_held_locks+0x9e/0xe0 [ 680.296539] alloc_pages_vma+0xbb/0x410 [ 680.297366] handle_mm_fault+0x152f/0x3500 05:44:39 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8903, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 680.298254] ? do_raw_spin_lock+0x121/0x260 [ 680.299284] ? rwlock_bug.part.0+0x90/0x90 [ 680.300160] ? __pmd_alloc+0x630/0x630 [ 680.300989] __get_user_pages+0x6ec/0x1620 [ 680.301883] ? follow_page_mask+0x1900/0x1900 [ 680.302812] ? down_read+0x10f/0x430 [ 680.303579] ? down_write+0x160/0x160 [ 680.304383] get_user_pages_unlocked+0x18a/0x690 [ 680.305365] ? internal_get_user_pages_fast+0xdce/0x2640 [ 680.306499] ? pin_user_pages_locked+0x7b0/0x7b0 [ 680.307495] internal_get_user_pages_fast+0x175f/0x2640 [ 680.308627] ? pin_user_pages_unlocked+0x80/0x80 [ 680.309615] ? trace_hardirqs_on+0x5b/0x180 [ 680.310526] get_user_pages_fast+0x66/0xa0 [ 680.311407] iov_iter_get_pages+0x297/0xf40 [ 680.312318] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 680.313331] ? mempool_resize+0x7d0/0x7d0 [ 680.314210] bio_iov_iter_get_pages+0x22a/0x1200 [ 680.315193] ? bvec_alloc+0x17e/0x2f0 [ 680.315980] ? bio_alloc_bioset+0x2a1/0x600 [ 680.316875] ? bio_add_pc_page+0x100/0x100 [ 680.317756] ? bvec_alloc+0x290/0x2f0 [ 680.318547] ? iov_iter_npages+0x1fd/0xa70 [ 680.319425] ? ext4_iomap_begin+0x1a0/0x700 [ 680.320323] iomap_dio_bio_actor+0x77a/0xef0 [ 680.321250] iomap_dio_actor+0x36f/0x560 [ 680.322118] iomap_apply+0x289/0x810 [ 680.322890] ? iomap_dio_rw+0x90/0x90 [ 680.323682] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 680.324880] ? delete_from_page_cache_batch+0xa30/0xa30 [ 680.325987] ? mark_held_locks+0x9e/0xe0 [ 680.326839] ? filemap_check_errors+0xa5/0x150 [ 680.327788] __iomap_dio_rw+0x6cd/0x1110 [ 680.328626] ? iomap_dio_rw+0x90/0x90 [ 680.329436] ? iomap_dio_bio_actor+0xef0/0xef0 [ 680.330398] ? down_read+0x10f/0x430 [ 680.331168] ? down_write+0x160/0x160 [ 680.331961] iomap_dio_rw+0x31/0x90 [ 680.332718] ext4_file_read_iter+0x2c7/0x4c0 [ 680.333645] new_sync_read+0x424/0x6f0 [ 680.334449] ? ksys_lseek+0x1b0/0x1b0 [ 680.335250] ? fsnotify_perm.part.0+0x22d/0x620 [ 680.336218] ? security_file_permission+0xb1/0xe0 [ 680.337223] vfs_read+0x4da/0x620 [ 680.337955] ksys_read+0x12d/0x260 [ 680.338700] ? vfs_write+0xb10/0xb10 [ 680.339473] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 680.340556] ? syscall_enter_from_user_mode+0x1d/0x50 [ 680.341630] do_syscall_64+0x33/0x40 [ 680.342400] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 680.343456] RIP: 0033:0x7f8e866d3b19 [ 680.344227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.348031] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 680.349612] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 680.351082] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 680.352554] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 680.354033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.355509] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 05:44:39 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 5) 05:44:39 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 9) 05:44:39 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8904, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 680.475606] FAULT_INJECTION: forcing a failure. [ 680.475606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 680.478421] CPU: 0 PID: 6247 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 680.479783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.481604] Call Trace: [ 680.482213] dump_stack+0x107/0x167 [ 680.482944] should_fail.cold+0x5/0xa [ 680.483722] __alloc_pages_nodemask+0x182/0x600 [ 680.484658] ? add_mm_counter_fast+0x220/0x220 [ 680.485590] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 680.486795] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 680.487845] ? lock_downgrade+0x6d0/0x6d0 [ 680.488676] ? mark_held_locks+0x9e/0xe0 [ 680.489495] alloc_pages_vma+0xbb/0x410 [ 680.490301] handle_mm_fault+0x152f/0x3500 [ 680.491177] ? do_raw_spin_lock+0x121/0x260 [ 680.492039] ? rwlock_bug.part.0+0x90/0x90 [ 680.492894] ? __pmd_alloc+0x630/0x630 [ 680.493719] __get_user_pages+0x6ec/0x1620 [ 680.494574] ? follow_page_mask+0x1900/0x1900 [ 680.495470] ? down_read+0x10f/0x430 [ 680.496212] ? down_write+0x160/0x160 [ 680.496992] get_user_pages_unlocked+0x18a/0x690 [ 680.497947] ? internal_get_user_pages_fast+0xdce/0x2640 [ 680.499040] ? pin_user_pages_locked+0x7b0/0x7b0 [ 680.500006] internal_get_user_pages_fast+0x175f/0x2640 [ 680.501108] ? pin_user_pages_unlocked+0x80/0x80 [ 680.502065] ? trace_hardirqs_on+0x5b/0x180 [ 680.502931] get_user_pages_fast+0x66/0xa0 [ 680.503784] iov_iter_get_pages+0x297/0xf40 [ 680.504654] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 680.505637] ? mempool_resize+0x7d0/0x7d0 [ 680.506477] bio_iov_iter_get_pages+0x22a/0x1200 [ 680.507436] ? bvec_alloc+0x17e/0x2f0 [ 680.508199] ? bio_alloc_bioset+0x2a1/0x600 [ 680.509072] ? bio_add_pc_page+0x100/0x100 [ 680.509948] ? bvec_alloc+0x290/0x2f0 [ 680.510725] ? iov_iter_npages+0x1fd/0xa70 [ 680.511575] ? ext4_iomap_begin+0x1a0/0x700 [ 680.512440] iomap_dio_bio_actor+0x77a/0xef0 [ 680.513330] iomap_dio_actor+0x36f/0x560 [ 680.514166] iomap_apply+0x289/0x810 [ 680.514912] ? iomap_dio_rw+0x90/0x90 [ 680.515690] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 680.516849] ? delete_from_page_cache_batch+0xa30/0xa30 [ 680.517918] ? mark_held_locks+0x9e/0xe0 [ 680.518738] ? filemap_check_errors+0xa5/0x150 [ 680.519657] __iomap_dio_rw+0x6cd/0x1110 [ 680.520465] ? iomap_dio_rw+0x90/0x90 [ 680.521240] ? iomap_dio_bio_actor+0xef0/0xef0 [ 680.522169] ? down_read+0x10f/0x430 [ 680.522917] ? down_write+0x160/0x160 [ 680.523683] iomap_dio_rw+0x31/0x90 [ 680.524423] ext4_file_read_iter+0x2c7/0x4c0 [ 680.525310] new_sync_read+0x424/0x6f0 [ 680.526107] ? ksys_lseek+0x1b0/0x1b0 [ 680.526877] ? fsnotify_perm.part.0+0x15c/0x620 [ 680.527820] ? fsnotify_perm.part.0+0x22d/0x620 [ 680.528754] ? security_file_permission+0xb1/0xe0 [ 680.529735] vfs_read+0x4da/0x620 [ 680.530435] ksys_read+0x12d/0x260 [ 680.531156] ? vfs_write+0xb10/0xb10 [ 680.531909] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 680.532955] ? syscall_enter_from_user_mode+0x1d/0x50 [ 680.534006] do_syscall_64+0x33/0x40 [ 680.534745] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 680.535763] RIP: 0033:0x7fe6449f5b19 [ 680.536513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.540197] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 680.541732] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 680.543157] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 680.544575] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 680.546002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 680.547420] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:45:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 10) 05:45:00 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:45:00 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8906, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:45:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 6) 05:45:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 7) 05:45:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:45:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(0x0, 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 10) [ 701.313329] loop4: detected capacity change from 0 to 41948160 [ 701.344745] FAULT_INJECTION: forcing a failure. [ 701.344745] name failslab, interval 1, probability 0, space 0, times 0 [ 701.347295] CPU: 1 PID: 6267 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 701.348750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.350537] Call Trace: [ 701.351096] dump_stack+0x107/0x167 [ 701.351886] should_fail.cold+0x5/0xa [ 701.352713] ? create_object.isra.0+0x3a/0xa30 [ 701.353687] should_failslab+0x5/0x20 [ 701.354520] kmem_cache_alloc+0x5b/0x310 [ 701.355404] create_object.isra.0+0x3a/0xa30 [ 701.356344] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 701.357435] kmem_cache_alloc+0x159/0x310 [ 701.358329] ? mempool_free_pages+0x20/0x20 [ 701.359261] mempool_alloc+0x148/0x360 [ 701.360110] ? mempool_resize+0x7d0/0x7d0 [ 701.360999] ? mempool_resize+0x7d0/0x7d0 [ 701.361889] ? lock_downgrade+0x6d0/0x6d0 [ 701.362812] ? ext4_map_blocks+0x87c/0x1910 [ 701.363801] bvec_alloc+0xd8/0x2f0 [ 701.364582] bio_alloc_bioset+0x40a/0x600 [ 701.365474] ? bvec_alloc+0x2f0/0x2f0 [ 701.366340] ? iov_iter_npages+0x1fd/0xa70 [ 701.367326] ? ext4_iomap_begin+0x1a0/0x700 [ 701.368256] iomap_dio_bio_actor+0x518/0xef0 [ 701.369247] iomap_dio_actor+0x36f/0x560 [ 701.370201] iomap_apply+0x289/0x810 [ 701.370993] ? iomap_dio_rw+0x90/0x90 [ 701.371804] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 701.373027] ? delete_from_page_cache_batch+0xa30/0xa30 [ 701.374162] ? mark_held_locks+0x9e/0xe0 [ 701.375038] ? filemap_check_errors+0xa5/0x150 [ 701.376021] __iomap_dio_rw+0x6cd/0x1110 [ 701.376887] ? iomap_dio_rw+0x90/0x90 [ 701.377711] ? iomap_dio_bio_actor+0xef0/0xef0 [ 701.378689] ? down_read+0x10f/0x430 [ 701.379490] ? down_write+0x160/0x160 [ 701.380309] iomap_dio_rw+0x31/0x90 [ 701.381077] ext4_file_read_iter+0x2c7/0x4c0 [ 701.382013] new_sync_read+0x424/0x6f0 [ 701.382842] ? ksys_lseek+0x1b0/0x1b0 [ 701.383661] ? fsnotify_perm.part.0+0x22d/0x620 [ 701.384661] ? security_file_permission+0xb1/0xe0 [ 701.385693] vfs_read+0x4da/0x620 [ 701.386457] ksys_read+0x12d/0x260 [ 701.387213] ? vfs_write+0xb10/0xb10 [ 701.388006] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 701.389130] ? syscall_enter_from_user_mode+0x1d/0x50 [ 701.390235] do_syscall_64+0x33/0x40 [ 701.391032] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.392136] RIP: 0033:0x7fb97f666b19 [ 701.392976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.396957] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 701.398650] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 701.400185] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 701.401712] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.403243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 701.404766] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 701.415643] FAULT_INJECTION: forcing a failure. [ 701.415643] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 701.418164] CPU: 1 PID: 6260 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 701.419632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.421407] Call Trace: [ 701.421978] dump_stack+0x107/0x167 [ 701.422762] should_fail.cold+0x5/0xa [ 701.423575] __alloc_pages_nodemask+0x182/0x600 [ 701.424566] ? add_mm_counter_fast+0x220/0x220 [ 701.425529] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 701.426834] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 701.427965] ? lock_downgrade+0x6d0/0x6d0 [ 701.428862] ? mark_held_locks+0x9e/0xe0 [ 701.429727] alloc_pages_vma+0xbb/0x410 [ 701.430598] handle_mm_fault+0x152f/0x3500 [ 701.431506] ? do_raw_spin_lock+0x121/0x260 [ 701.432427] ? rwlock_bug.part.0+0x90/0x90 [ 701.433322] ? __pmd_alloc+0x630/0x630 [ 701.434181] __get_user_pages+0x6ec/0x1620 [ 701.435081] ? follow_page_mask+0x1900/0x1900 [ 701.436041] ? down_read+0x10f/0x430 [ 701.436842] ? down_write+0x160/0x160 [ 701.437670] get_user_pages_unlocked+0x18a/0x690 [ 701.438693] ? internal_get_user_pages_fast+0xdce/0x2640 [ 701.439829] ? pin_user_pages_locked+0x7b0/0x7b0 05:45:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(0x0, 0x62) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 701.440853] internal_get_user_pages_fast+0x175f/0x2640 [ 701.442232] ? pin_user_pages_unlocked+0x80/0x80 [ 701.443248] ? trace_hardirqs_on+0x5b/0x180 [ 701.444168] get_user_pages_fast+0x66/0xa0 [ 701.445061] iov_iter_get_pages+0x297/0xf40 [ 701.445994] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 701.447023] ? mempool_resize+0x7d0/0x7d0 [ 701.447918] bio_iov_iter_get_pages+0x22a/0x1200 [ 701.448930] ? bvec_alloc+0x17e/0x2f0 [ 701.449730] ? bio_alloc_bioset+0x2a1/0x600 [ 701.450656] ? bio_add_pc_page+0x100/0x100 [ 701.451555] ? bvec_alloc+0x290/0x2f0 [ 701.452366] ? iov_iter_npages+0x1fd/0xa70 [ 701.453254] ? ext4_iomap_begin+0x1a0/0x700 [ 701.454192] iomap_dio_bio_actor+0x77a/0xef0 [ 701.455154] iomap_dio_actor+0x36f/0x560 [ 701.456028] iomap_apply+0x289/0x810 [ 701.456832] ? iomap_dio_rw+0x90/0x90 [ 701.457644] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 701.458883] ? delete_from_page_cache_batch+0xa30/0xa30 [ 701.460024] ? mark_held_locks+0x9e/0xe0 [ 701.460904] ? filemap_check_errors+0xa5/0x150 [ 701.461885] __iomap_dio_rw+0x6cd/0x1110 [ 701.462745] ? iomap_dio_rw+0x90/0x90 [ 701.463584] ? iomap_dio_bio_actor+0xef0/0xef0 [ 701.464570] ? down_read+0x10f/0x430 [ 701.465364] ? down_write+0x160/0x160 [ 701.466185] iomap_dio_rw+0x31/0x90 [ 701.466972] ext4_file_read_iter+0x2c7/0x4c0 [ 701.467916] new_sync_read+0x424/0x6f0 [ 701.468744] ? ksys_lseek+0x1b0/0x1b0 [ 701.469569] ? fsnotify_perm.part.0+0x22d/0x620 [ 701.470570] ? security_file_permission+0xb1/0xe0 [ 701.471618] vfs_read+0x4da/0x620 [ 701.472365] ksys_read+0x12d/0x260 [ 701.473123] ? vfs_write+0xb10/0xb10 [ 701.473928] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 701.475065] ? syscall_enter_from_user_mode+0x1d/0x50 [ 701.476180] do_syscall_64+0x33/0x40 [ 701.476984] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.478077] RIP: 0033:0x7f4792794b19 [ 701.478870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.482814] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 701.484433] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 701.485972] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 701.487494] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.488545] FAULT_INJECTION: forcing a failure. [ 701.488545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 701.489028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 701.489039] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 [ 701.495086] CPU: 0 PID: 6270 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 701.496633] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.498513] Call Trace: [ 701.499112] dump_stack+0x107/0x167 [ 701.499936] should_fail.cold+0x5/0xa [ 701.500829] __alloc_pages_nodemask+0x182/0x600 [ 701.501898] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 701.503275] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 701.504457] ? lock_downgrade+0x6d0/0x6d0 [ 701.505396] ? mark_held_locks+0x9e/0xe0 [ 701.506344] alloc_pages_vma+0xbb/0x410 [ 701.506376] FAULT_INJECTION: forcing a failure. [ 701.506376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 701.507251] handle_mm_fault+0x152f/0x3500 [ 701.507279] ? do_raw_spin_lock+0x121/0x260 [ 701.507303] ? rwlock_bug.part.0+0x90/0x90 [ 701.512616] ? __pmd_alloc+0x630/0x630 [ 701.513517] __get_user_pages+0x6ec/0x1620 [ 701.514495] ? follow_page_mask+0x1900/0x1900 [ 701.515502] ? down_read+0x10f/0x430 [ 701.516327] ? down_write+0x160/0x160 [ 701.517202] get_user_pages_unlocked+0x18a/0x690 [ 701.518286] ? internal_get_user_pages_fast+0xdce/0x2640 [ 701.519509] ? pin_user_pages_locked+0x7b0/0x7b0 [ 701.520581] internal_get_user_pages_fast+0x175f/0x2640 [ 701.521827] ? pin_user_pages_unlocked+0x80/0x80 [ 701.522922] ? trace_hardirqs_on+0x5b/0x180 [ 701.523906] get_user_pages_fast+0x66/0xa0 [ 701.524868] iov_iter_get_pages+0x297/0xf40 [ 701.525847] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 701.526966] ? mempool_resize+0x7d0/0x7d0 [ 701.527923] bio_iov_iter_get_pages+0x22a/0x1200 [ 701.529006] ? bvec_alloc+0x17e/0x2f0 [ 701.529887] ? bio_alloc_bioset+0x2a1/0x600 [ 701.530876] ? bio_add_pc_page+0x100/0x100 [ 701.531841] ? bvec_alloc+0x290/0x2f0 [ 701.532708] ? iov_iter_npages+0x1fd/0xa70 [ 701.533661] ? ext4_iomap_begin+0x1a0/0x700 [ 701.534660] iomap_dio_bio_actor+0x77a/0xef0 [ 701.535678] iomap_dio_actor+0x36f/0x560 [ 701.536608] iomap_apply+0x289/0x810 [ 701.537453] ? iomap_dio_rw+0x90/0x90 [ 701.538339] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 701.539674] ? delete_from_page_cache_batch+0xa30/0xa30 [ 701.540884] ? mark_held_locks+0x9e/0xe0 [ 701.541815] ? filemap_check_errors+0xa5/0x150 [ 701.542882] __iomap_dio_rw+0x6cd/0x1110 [ 701.543797] ? iomap_dio_rw+0x90/0x90 [ 701.544679] ? iomap_dio_bio_actor+0xef0/0xef0 [ 701.545715] ? down_read+0x10f/0x430 [ 701.546571] ? down_write+0x160/0x160 [ 701.547445] iomap_dio_rw+0x31/0x90 [ 701.548272] ext4_file_read_iter+0x2c7/0x4c0 [ 701.549279] new_sync_read+0x424/0x6f0 [ 701.550189] ? ksys_lseek+0x1b0/0x1b0 [ 701.551069] ? fsnotify_perm.part.0+0x22d/0x620 [ 701.552127] ? security_file_permission+0xb1/0xe0 [ 701.553233] vfs_read+0x4da/0x620 [ 701.554044] ksys_read+0x12d/0x260 [ 701.554846] ? vfs_write+0xb10/0xb10 [ 701.555696] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 701.556887] ? syscall_enter_from_user_mode+0x1d/0x50 [ 701.558061] do_syscall_64+0x33/0x40 [ 701.558903] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.560061] RIP: 0033:0x7f8e866d3b19 [ 701.560914] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.565055] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 701.566783] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 701.568367] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 701.569983] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.571577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.573175] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 701.574839] CPU: 1 PID: 6272 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 701.576301] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.578072] Call Trace: [ 701.578627] dump_stack+0x107/0x167 [ 701.579408] should_fail.cold+0x5/0xa [ 701.580230] __alloc_pages_nodemask+0x182/0x600 [ 701.581226] ? add_mm_counter_fast+0x220/0x220 [ 701.582201] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 701.583503] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 701.584623] ? lock_downgrade+0x6d0/0x6d0 [ 701.585505] ? mark_held_locks+0x9e/0xe0 [ 701.586394] alloc_pages_vma+0xbb/0x410 [ 701.587260] handle_mm_fault+0x152f/0x3500 [ 701.588172] ? do_raw_spin_lock+0x121/0x260 [ 701.589085] ? rwlock_bug.part.0+0x90/0x90 [ 701.589996] ? __pmd_alloc+0x630/0x630 [ 701.590862] __get_user_pages+0x6ec/0x1620 [ 701.591774] ? follow_page_mask+0x1900/0x1900 [ 701.592744] ? down_read+0x10f/0x430 [ 701.593533] ? down_write+0x160/0x160 [ 701.594367] get_user_pages_unlocked+0x18a/0x690 [ 701.595378] ? internal_get_user_pages_fast+0xdce/0x2640 [ 701.596534] ? pin_user_pages_locked+0x7b0/0x7b0 [ 701.597563] internal_get_user_pages_fast+0x175f/0x2640 [ 701.598733] ? pin_user_pages_unlocked+0x80/0x80 [ 701.599752] ? trace_hardirqs_on+0x5b/0x180 [ 701.600679] get_user_pages_fast+0x66/0xa0 [ 701.601577] iov_iter_get_pages+0x297/0xf40 [ 701.602511] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 701.603564] ? mempool_resize+0x7d0/0x7d0 [ 701.604460] bio_iov_iter_get_pages+0x22a/0x1200 [ 701.605475] ? bvec_alloc+0x17e/0x2f0 [ 701.606298] ? bio_alloc_bioset+0x2a1/0x600 [ 701.607215] ? bio_add_pc_page+0x100/0x100 [ 701.608136] ? bvec_alloc+0x290/0x2f0 [ 701.608948] ? iov_iter_npages+0x1fd/0xa70 [ 701.609842] ? ext4_iomap_begin+0x1a0/0x700 [ 701.610768] iomap_dio_bio_actor+0x77a/0xef0 [ 701.611726] iomap_dio_actor+0x36f/0x560 [ 701.612599] iomap_apply+0x289/0x810 [ 701.613390] ? iomap_dio_rw+0x90/0x90 [ 701.614200] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 701.615444] ? delete_from_page_cache_batch+0xa30/0xa30 [ 701.616572] ? mark_held_locks+0x9e/0xe0 [ 701.617456] ? filemap_check_errors+0xa5/0x150 [ 701.618435] __iomap_dio_rw+0x6cd/0x1110 [ 701.619298] ? iomap_dio_rw+0x90/0x90 [ 701.620133] ? iomap_dio_bio_actor+0xef0/0xef0 [ 701.621124] ? down_read+0x10f/0x430 [ 701.621927] ? down_write+0x160/0x160 [ 701.622748] iomap_dio_rw+0x31/0x90 [ 701.623538] ext4_file_read_iter+0x2c7/0x4c0 [ 701.624492] new_sync_read+0x424/0x6f0 [ 701.625327] ? ksys_lseek+0x1b0/0x1b0 [ 701.626157] ? fsnotify_perm.part.0+0x22d/0x620 [ 701.627169] ? security_file_permission+0xb1/0xe0 [ 701.628203] vfs_read+0x4da/0x620 [ 701.628950] ksys_read+0x12d/0x260 [ 701.629704] ? vfs_write+0xb10/0xb10 [ 701.630514] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 701.631635] ? syscall_enter_from_user_mode+0x1d/0x50 [ 701.632746] do_syscall_64+0x33/0x40 [ 701.633539] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.634627] RIP: 0033:0x7fe6449f5b19 [ 701.635426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.639379] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 701.641005] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 701.642534] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 701.644075] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.645600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.647149] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:45:01 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8907, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:45:01 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 7) 05:45:01 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 701.822328] FAULT_INJECTION: forcing a failure. [ 701.822328] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 701.825049] CPU: 0 PID: 6276 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 701.826589] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 701.828442] Call Trace: [ 701.829045] dump_stack+0x107/0x167 [ 701.829880] should_fail.cold+0x5/0xa [ 701.830760] __alloc_pages_nodemask+0x182/0x600 [ 701.831801] ? add_mm_counter_fast+0x220/0x220 [ 701.832847] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 701.834217] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 701.835408] ? lock_downgrade+0x6d0/0x6d0 [ 701.836342] ? mark_held_locks+0x9e/0xe0 [ 701.837275] alloc_pages_vma+0xbb/0x410 [ 701.838178] handle_mm_fault+0x152f/0x3500 [ 701.839141] ? do_raw_spin_lock+0x121/0x260 [ 701.840122] ? rwlock_bug.part.0+0x90/0x90 [ 701.841078] ? __pmd_alloc+0x630/0x630 [ 701.842003] __get_user_pages+0x6ec/0x1620 [ 701.842983] ? follow_page_mask+0x1900/0x1900 [ 701.844009] ? down_read+0x10f/0x430 [ 701.844857] ? down_write+0x160/0x160 [ 701.845726] get_user_pages_unlocked+0x18a/0x690 [ 701.846817] ? internal_get_user_pages_fast+0xdce/0x2640 [ 701.848033] ? pin_user_pages_locked+0x7b0/0x7b0 [ 701.848412] loop4: detected capacity change from 0 to 41948160 [ 701.849128] internal_get_user_pages_fast+0x175f/0x2640 [ 701.849191] ? pin_user_pages_unlocked+0x80/0x80 [ 701.852743] ? trace_hardirqs_on+0x5b/0x180 [ 701.853718] get_user_pages_fast+0x66/0xa0 [ 701.854699] iov_iter_get_pages+0x297/0xf40 [ 701.855679] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 701.856789] ? mempool_resize+0x7d0/0x7d0 [ 701.857746] bio_iov_iter_get_pages+0x22a/0x1200 [ 701.858856] ? bvec_alloc+0x17e/0x2f0 [ 701.859734] ? bio_alloc_bioset+0x2a1/0x600 [ 701.860706] ? bio_add_pc_page+0x100/0x100 [ 701.861656] ? bvec_alloc+0x290/0x2f0 [ 701.862534] ? iov_iter_npages+0x1fd/0xa70 [ 701.863485] ? ext4_iomap_begin+0x1a0/0x700 [ 701.864460] iomap_dio_bio_actor+0x77a/0xef0 [ 701.865476] iomap_dio_actor+0x36f/0x560 [ 701.866416] iomap_apply+0x289/0x810 [ 701.867277] ? iomap_dio_rw+0x90/0x90 [ 701.868150] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 701.869446] ? delete_from_page_cache_batch+0xa30/0xa30 [ 701.870673] ? mark_held_locks+0x9e/0xe0 [ 701.871605] ? filemap_check_errors+0xa5/0x150 [ 701.872651] __iomap_dio_rw+0x6cd/0x1110 [ 701.873574] ? iomap_dio_rw+0x90/0x90 [ 701.874486] ? iomap_dio_bio_actor+0xef0/0xef0 [ 701.875538] ? down_read+0x10f/0x430 [ 701.876388] ? down_write+0x160/0x160 [ 701.877263] iomap_dio_rw+0x31/0x90 [ 701.878105] ext4_file_read_iter+0x2c7/0x4c0 [ 701.879112] new_sync_read+0x424/0x6f0 [ 701.879992] ? ksys_lseek+0x1b0/0x1b0 [ 701.880879] ? fsnotify_perm.part.0+0x22d/0x620 [ 701.881954] ? security_file_permission+0xb1/0xe0 [ 701.883058] vfs_read+0x4da/0x620 [ 701.883856] ksys_read+0x12d/0x260 [ 701.884675] ? vfs_write+0xb10/0xb10 [ 701.885524] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 701.886744] ? syscall_enter_from_user_mode+0x1d/0x50 [ 701.887911] do_syscall_64+0x33/0x40 [ 701.888763] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 701.889941] RIP: 0033:0x7fb97f666b19 [ 701.890794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.894969] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 701.896715] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 701.898360] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 701.899980] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.901596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 701.903224] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:45:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 8) [ 714.110236] FAULT_INJECTION: forcing a failure. [ 714.110236] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 714.112816] CPU: 0 PID: 6287 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 714.114283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 714.116061] Call Trace: [ 714.116626] dump_stack+0x107/0x167 [ 714.117403] should_fail.cold+0x5/0xa [ 714.118236] __alloc_pages_nodemask+0x182/0x600 [ 714.119228] ? add_mm_counter_fast+0x220/0x220 [ 714.120215] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 714.121505] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 714.122643] ? lock_downgrade+0x6d0/0x6d0 [ 714.123526] ? mark_held_locks+0x9e/0xe0 [ 714.124414] alloc_pages_vma+0xbb/0x410 [ 714.124938] FAULT_INJECTION: forcing a failure. [ 714.124938] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 714.125281] handle_mm_fault+0x152f/0x3500 [ 714.125303] ? do_raw_spin_lock+0x121/0x260 [ 714.129736] ? rwlock_bug.part.0+0x90/0x90 [ 714.130702] ? __pmd_alloc+0x630/0x630 [ 714.131552] __get_user_pages+0x6ec/0x1620 [ 714.132474] ? follow_page_mask+0x1900/0x1900 [ 714.133426] ? down_read+0x10f/0x430 [ 714.134223] ? down_write+0x160/0x160 [ 714.135054] get_user_pages_unlocked+0x18a/0x690 [ 714.136067] ? internal_get_user_pages_fast+0xdce/0x2640 [ 714.137217] ? pin_user_pages_locked+0x7b0/0x7b0 [ 714.138238] internal_get_user_pages_fast+0x175f/0x2640 [ 714.139410] ? pin_user_pages_unlocked+0x80/0x80 [ 714.140416] ? trace_hardirqs_on+0x5b/0x180 [ 714.141335] get_user_pages_fast+0x66/0xa0 [ 714.142249] iov_iter_get_pages+0x297/0xf40 [ 714.143182] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 714.144228] ? mempool_resize+0x7d0/0x7d0 [ 714.145127] bio_iov_iter_get_pages+0x22a/0x1200 [ 714.146151] ? bvec_alloc+0x17e/0x2f0 [ 714.146974] ? bio_alloc_bioset+0x2a1/0x600 [ 714.147884] ? bio_add_pc_page+0x100/0x100 [ 714.148778] ? bvec_alloc+0x290/0x2f0 [ 714.149584] ? iov_iter_npages+0x1fd/0xa70 [ 714.150491] ? ext4_iomap_begin+0x1a0/0x700 [ 714.151423] iomap_dio_bio_actor+0x77a/0xef0 [ 714.152373] iomap_dio_actor+0x36f/0x560 [ 714.153244] iomap_apply+0x289/0x810 [ 714.154044] ? iomap_dio_rw+0x90/0x90 [ 714.154877] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 714.156112] ? delete_from_page_cache_batch+0xa30/0xa30 [ 714.157245] ? mark_held_locks+0x9e/0xe0 [ 714.158130] ? filemap_check_errors+0xa5/0x150 [ 714.159126] __iomap_dio_rw+0x6cd/0x1110 [ 714.159994] ? iomap_dio_rw+0x90/0x90 [ 714.160827] ? iomap_dio_bio_actor+0xef0/0xef0 [ 714.161802] ? down_read+0x10f/0x430 [ 714.162602] ? down_write+0x160/0x160 [ 714.163425] iomap_dio_rw+0x31/0x90 [ 714.164208] ext4_file_read_iter+0x2c7/0x4c0 [ 714.165146] new_sync_read+0x424/0x6f0 [ 714.165964] ? ksys_lseek+0x1b0/0x1b0 [ 714.166811] ? fsnotify_perm.part.0+0x22d/0x620 [ 714.167790] ? security_file_permission+0xb1/0xe0 [ 714.168816] vfs_read+0x4da/0x620 [ 714.169561] ksys_read+0x12d/0x260 [ 714.170324] ? vfs_write+0xb10/0xb10 [ 714.171123] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 714.172235] ? syscall_enter_from_user_mode+0x1d/0x50 [ 714.173330] do_syscall_64+0x33/0x40 [ 714.174130] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 714.175215] RIP: 0033:0x7fb97f666b19 [ 714.176003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.179929] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 714.181538] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 714.183047] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 714.184559] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.186066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 714.187599] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 714.189145] CPU: 1 PID: 6292 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 714.190720] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 714.192604] Call Trace: [ 714.193210] dump_stack+0x107/0x167 [ 714.194052] should_fail.cold+0x5/0xa [ 714.194921] __alloc_pages_nodemask+0x182/0x600 [ 714.195357] FAULT_INJECTION: forcing a failure. [ 714.195357] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 714.195976] ? add_mm_counter_fast+0x220/0x220 [ 714.196000] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 714.196027] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 714.201987] ? lock_downgrade+0x6d0/0x6d0 [ 714.202929] ? mark_held_locks+0x9e/0xe0 [ 714.203846] alloc_pages_vma+0xbb/0x410 [ 714.204766] handle_mm_fault+0x152f/0x3500 [ 714.205733] ? do_raw_spin_lock+0x121/0x260 [ 714.206734] ? rwlock_bug.part.0+0x90/0x90 [ 714.207708] ? __pmd_alloc+0x630/0x630 [ 714.208611] __get_user_pages+0x6ec/0x1620 [ 714.209582] ? follow_page_mask+0x1900/0x1900 [ 714.210635] ? down_read+0x10f/0x430 [ 714.211483] ? down_write+0x160/0x160 [ 714.212356] get_user_pages_unlocked+0x18a/0x690 [ 714.213433] ? internal_get_user_pages_fast+0xdce/0x2640 [ 714.214681] ? pin_user_pages_locked+0x7b0/0x7b0 [ 714.215782] internal_get_user_pages_fast+0x175f/0x2640 [ 714.217017] ? pin_user_pages_unlocked+0x80/0x80 [ 714.218102] ? trace_hardirqs_on+0x5b/0x180 [ 714.219078] get_user_pages_fast+0x66/0xa0 [ 714.220043] iov_iter_get_pages+0x297/0xf40 [ 714.221027] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 714.222154] ? mempool_resize+0x7d0/0x7d0 [ 714.223101] bio_iov_iter_get_pages+0x22a/0x1200 [ 714.224181] ? bvec_alloc+0x17e/0x2f0 [ 714.225060] ? bio_alloc_bioset+0x2a1/0x600 [ 714.226048] ? bio_add_pc_page+0x100/0x100 [ 714.227005] ? bvec_alloc+0x290/0x2f0 [ 714.227869] ? iov_iter_npages+0x1fd/0xa70 [ 714.228827] ? ext4_iomap_begin+0x1a0/0x700 [ 714.229813] iomap_dio_bio_actor+0x77a/0xef0 [ 714.230834] iomap_dio_actor+0x36f/0x560 [ 714.231766] iomap_apply+0x289/0x810 [ 714.232616] ? iomap_dio_rw+0x90/0x90 [ 714.233486] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 714.234813] ? delete_from_page_cache_batch+0xa30/0xa30 [ 714.236026] ? mark_held_locks+0x9e/0xe0 [ 714.236977] ? filemap_check_errors+0xa5/0x150 [ 714.238016] __iomap_dio_rw+0x6cd/0x1110 [ 714.238945] ? iomap_dio_rw+0x90/0x90 [ 714.239824] ? iomap_dio_bio_actor+0xef0/0xef0 [ 714.240860] ? down_read+0x10f/0x430 [ 714.241699] ? down_write+0x160/0x160 [ 714.242577] iomap_dio_rw+0x31/0x90 [ 714.243407] ext4_file_read_iter+0x2c7/0x4c0 [ 714.244407] new_sync_read+0x424/0x6f0 [ 714.245292] ? ksys_lseek+0x1b0/0x1b0 [ 714.246188] ? fsnotify_perm.part.0+0x22d/0x620 [ 714.247252] ? security_file_permission+0xb1/0xe0 [ 714.248373] vfs_read+0x4da/0x620 [ 714.249162] ksys_read+0x12d/0x260 [ 714.249979] ? vfs_write+0xb10/0xb10 [ 714.250836] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 714.252015] ? syscall_enter_from_user_mode+0x1d/0x50 [ 714.253197] do_syscall_64+0x33/0x40 [ 714.254045] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 714.255209] RIP: 0033:0x7f8e866d3b19 [ 714.256052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.260218] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 714.261933] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 714.263548] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 714.265151] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.266764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 714.268376] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 714.270014] CPU: 0 PID: 6288 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 714.271477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 714.273252] Call Trace: [ 714.273810] dump_stack+0x107/0x167 [ 714.274601] should_fail.cold+0x5/0xa [ 714.275415] __alloc_pages_nodemask+0x182/0x600 [ 714.276414] ? add_mm_counter_fast+0x220/0x220 05:45:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:45:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 8) 05:45:13 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x890b, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:45:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 11) 05:45:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 11) 05:45:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:13 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x100000) [ 714.277400] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 714.278907] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 714.279264] loop4: detected capacity change from 0 to 41948160 [ 714.280021] ? lock_downgrade+0x6d0/0x6d0 [ 714.280038] ? mark_held_locks+0x9e/0xe0 [ 714.280064] alloc_pages_vma+0xbb/0x410 [ 714.280091] handle_mm_fault+0x152f/0x3500 [ 714.284789] ? do_raw_spin_lock+0x121/0x260 [ 714.285703] ? rwlock_bug.part.0+0x90/0x90 [ 714.286617] ? __pmd_alloc+0x630/0x630 [ 714.287470] __get_user_pages+0x6ec/0x1620 [ 714.288394] ? follow_page_mask+0x1900/0x1900 [ 714.289370] ? down_read+0x10f/0x430 [ 714.290175] ? down_write+0x160/0x160 [ 714.291000] get_user_pages_unlocked+0x18a/0x690 [ 714.292008] ? internal_get_user_pages_fast+0xdce/0x2640 [ 714.293156] ? pin_user_pages_locked+0x7b0/0x7b0 [ 714.294185] internal_get_user_pages_fast+0x175f/0x2640 [ 714.295360] ? pin_user_pages_unlocked+0x80/0x80 [ 714.296374] ? trace_hardirqs_on+0x5b/0x180 [ 714.297305] get_user_pages_fast+0x66/0xa0 [ 714.298229] iov_iter_get_pages+0x297/0xf40 [ 714.299149] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 714.300200] ? mempool_resize+0x7d0/0x7d0 [ 714.301099] bio_iov_iter_get_pages+0x22a/0x1200 [ 714.302122] ? bvec_alloc+0x17e/0x2f0 [ 714.302931] ? bio_alloc_bioset+0x2a1/0x600 [ 714.303876] ? bio_add_pc_page+0x100/0x100 [ 714.304784] ? bvec_alloc+0x290/0x2f0 [ 714.305597] ? iov_iter_npages+0x1fd/0xa70 [ 714.306515] ? ext4_iomap_begin+0x1a0/0x700 [ 714.307442] iomap_dio_bio_actor+0x77a/0xef0 [ 714.308397] iomap_dio_actor+0x36f/0x560 [ 714.309273] iomap_apply+0x289/0x810 [ 714.310078] ? iomap_dio_rw+0x90/0x90 [ 714.310910] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 714.312131] ? delete_from_page_cache_batch+0xa30/0xa30 [ 714.313260] ? mark_held_locks+0x9e/0xe0 [ 714.314142] ? filemap_check_errors+0xa5/0x150 [ 714.315116] __iomap_dio_rw+0x6cd/0x1110 [ 714.315984] ? iomap_dio_rw+0x90/0x90 [ 714.316813] ? iomap_dio_bio_actor+0xef0/0xef0 [ 714.317798] ? down_read+0x10f/0x430 [ 714.318604] ? down_write+0x160/0x160 [ 714.319423] iomap_dio_rw+0x31/0x90 [ 714.320204] ext4_file_read_iter+0x2c7/0x4c0 [ 714.321148] new_sync_read+0x424/0x6f0 [ 714.321977] ? ksys_lseek+0x1b0/0x1b0 [ 714.322831] ? fsnotify_perm.part.0+0x22d/0x620 [ 714.323830] ? security_file_permission+0xb1/0xe0 [ 714.324867] vfs_read+0x4da/0x620 [ 714.325611] ksys_read+0x12d/0x260 [ 714.326380] ? vfs_write+0xb10/0xb10 [ 714.327176] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 714.328297] ? syscall_enter_from_user_mode+0x1d/0x50 [ 714.329405] do_syscall_64+0x33/0x40 [ 714.330205] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 714.331293] RIP: 0033:0x7fe6449f5b19 [ 714.332087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.336029] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 714.337657] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 714.339375] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 714.340894] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.342416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 714.343934] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:45:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) [ 714.392056] FAULT_INJECTION: forcing a failure. [ 714.392056] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 714.394735] CPU: 0 PID: 6303 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 714.396194] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 714.397948] Call Trace: [ 714.398523] dump_stack+0x107/0x167 [ 714.399312] should_fail.cold+0x5/0xa [ 714.400124] __alloc_pages_nodemask+0x182/0x600 [ 714.401121] ? add_mm_counter_fast+0x220/0x220 [ 714.402104] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 714.403393] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 714.404498] ? lock_downgrade+0x6d0/0x6d0 [ 714.405380] ? mark_held_locks+0x9e/0xe0 [ 714.406261] alloc_pages_vma+0xbb/0x410 [ 714.407107] handle_mm_fault+0x152f/0x3500 [ 714.408014] ? do_raw_spin_lock+0x121/0x260 [ 714.408943] ? rwlock_bug.part.0+0x90/0x90 [ 714.409841] ? __pmd_alloc+0x630/0x630 [ 714.410702] __get_user_pages+0x6ec/0x1620 [ 714.411631] ? follow_page_mask+0x1900/0x1900 [ 714.412586] ? down_read+0x10f/0x430 [ 714.413385] ? down_write+0x160/0x160 [ 714.414217] get_user_pages_unlocked+0x18a/0x690 [ 714.415223] ? internal_get_user_pages_fast+0xdce/0x2640 [ 714.416378] ? pin_user_pages_locked+0x7b0/0x7b0 [ 714.417405] internal_get_user_pages_fast+0x175f/0x2640 [ 714.418585] ? pin_user_pages_unlocked+0x80/0x80 [ 714.419598] ? trace_hardirqs_on+0x5b/0x180 [ 714.419894] loop4: detected capacity change from 0 to 41948160 [ 714.420528] get_user_pages_fast+0x66/0xa0 [ 714.420551] iov_iter_get_pages+0x297/0xf40 [ 714.420580] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 714.424683] ? mempool_resize+0x7d0/0x7d0 [ 714.425596] bio_iov_iter_get_pages+0x22a/0x1200 [ 714.426636] ? bvec_alloc+0x17e/0x2f0 [ 714.427452] ? bio_alloc_bioset+0x2a1/0x600 [ 714.428364] ? bio_add_pc_page+0x100/0x100 [ 714.429264] ? bvec_alloc+0x290/0x2f0 [ 714.430085] ? iov_iter_npages+0x1fd/0xa70 [ 714.430990] ? ext4_iomap_begin+0x1a0/0x700 [ 714.431905] iomap_dio_bio_actor+0x77a/0xef0 [ 714.432861] iomap_dio_actor+0x36f/0x560 [ 714.433733] iomap_apply+0x289/0x810 [ 714.434527] ? iomap_dio_rw+0x90/0x90 [ 714.435346] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 714.436580] ? delete_from_page_cache_batch+0xa30/0xa30 [ 714.437701] ? mark_held_locks+0x9e/0xe0 [ 714.438589] ? filemap_check_errors+0xa5/0x150 [ 714.439565] __iomap_dio_rw+0x6cd/0x1110 [ 714.440424] ? iomap_dio_rw+0x90/0x90 [ 714.441258] ? iomap_dio_bio_actor+0xef0/0xef0 [ 714.442256] ? down_read+0x10f/0x430 [ 714.443056] ? down_write+0x160/0x160 [ 714.443883] iomap_dio_rw+0x31/0x90 [ 714.444667] ext4_file_read_iter+0x2c7/0x4c0 [ 714.445613] new_sync_read+0x424/0x6f0 [ 714.446448] ? ksys_lseek+0x1b0/0x1b0 [ 714.447287] ? fsnotify_perm.part.0+0x22d/0x620 [ 714.448272] ? security_file_permission+0xb1/0xe0 [ 714.449305] vfs_read+0x4da/0x620 [ 714.450065] ksys_read+0x12d/0x260 [ 714.450818] ? vfs_write+0xb10/0xb10 [ 714.451628] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 714.452735] ? syscall_enter_from_user_mode+0x1d/0x50 [ 714.453843] do_syscall_64+0x33/0x40 [ 714.454660] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 714.455746] RIP: 0033:0x7f4792794b19 [ 714.456537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.460489] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 714.462109] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 714.463627] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 714.465172] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.466684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 714.468228] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 05:45:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 9) 05:45:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:27 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 12) [ 727.978625] FAULT_INJECTION: forcing a failure. [ 727.978625] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 727.980158] CPU: 1 PID: 6315 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 727.981015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 727.982059] Call Trace: [ 727.982411] dump_stack+0x107/0x167 [ 727.982880] should_fail.cold+0x5/0xa [ 727.983369] __alloc_pages_nodemask+0x182/0x600 [ 727.983957] ? add_mm_counter_fast+0x220/0x220 [ 727.984528] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 727.985282] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 727.985944] ? lock_downgrade+0x6d0/0x6d0 [ 727.986475] ? mark_held_locks+0x9e/0xe0 [ 727.986997] alloc_pages_vma+0xbb/0x410 [ 727.987497] handle_mm_fault+0x152f/0x3500 [ 727.988028] ? do_raw_spin_lock+0x121/0x260 [ 727.988567] ? rwlock_bug.part.0+0x90/0x90 [ 727.989098] ? __pmd_alloc+0x630/0x630 [ 727.989593] __get_user_pages+0x6ec/0x1620 [ 727.990135] ? follow_page_mask+0x1900/0x1900 [ 727.990708] ? down_read+0x10f/0x430 [ 727.991173] ? down_write+0x160/0x160 [ 727.991472] FAULT_INJECTION: forcing a failure. [ 727.991472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 727.991653] get_user_pages_unlocked+0x18a/0x690 [ 727.994727] ? internal_get_user_pages_fast+0xdce/0x2640 [ 727.995404] ? pin_user_pages_locked+0x7b0/0x7b0 [ 727.995998] internal_get_user_pages_fast+0x175f/0x2640 [ 727.996687] ? pin_user_pages_unlocked+0x80/0x80 [ 727.997284] ? trace_hardirqs_on+0x5b/0x180 [ 727.997819] get_user_pages_fast+0x66/0xa0 [ 727.998370] iov_iter_get_pages+0x297/0xf40 [ 727.998909] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 727.999525] ? mempool_resize+0x7d0/0x7d0 [ 728.000049] bio_iov_iter_get_pages+0x22a/0x1200 [ 728.000646] ? bvec_alloc+0x17e/0x2f0 [ 728.001122] ? bio_alloc_bioset+0x2a1/0x600 [ 728.001659] ? bio_add_pc_page+0x100/0x100 [ 728.002186] ? bvec_alloc+0x290/0x2f0 [ 728.002668] ? iov_iter_npages+0x1fd/0xa70 [ 728.003198] ? ext4_iomap_begin+0x1a0/0x700 [ 728.003742] iomap_dio_bio_actor+0x77a/0xef0 [ 728.004300] iomap_dio_actor+0x36f/0x560 [ 728.004812] iomap_apply+0x289/0x810 [ 728.005283] ? iomap_dio_rw+0x90/0x90 [ 728.005758] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 728.006493] ? delete_from_page_cache_batch+0xa30/0xa30 [ 728.007163] ? mark_held_locks+0x9e/0xe0 [ 728.007675] ? filemap_check_errors+0xa5/0x150 [ 728.008256] __iomap_dio_rw+0x6cd/0x1110 [ 728.008771] ? iomap_dio_rw+0x90/0x90 [ 728.009257] ? iomap_dio_bio_actor+0xef0/0xef0 [ 728.009821] ? down_read+0x10f/0x430 [ 728.010289] ? down_write+0x160/0x160 [ 728.010762] iomap_dio_rw+0x31/0x90 [ 728.011208] ext4_file_read_iter+0x2c7/0x4c0 [ 728.011750] new_sync_read+0x424/0x6f0 [ 728.012233] ? ksys_lseek+0x1b0/0x1b0 [ 728.012714] ? fsnotify_perm.part.0+0x22d/0x620 [ 728.013298] ? security_file_permission+0xb1/0xe0 [ 728.013904] vfs_read+0x4da/0x620 [ 728.014346] ksys_read+0x12d/0x260 [ 728.014785] ? vfs_write+0xb10/0xb10 [ 728.015246] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 728.015891] ? syscall_enter_from_user_mode+0x1d/0x50 [ 728.016523] do_syscall_64+0x33/0x40 [ 728.016982] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 728.017617] RIP: 0033:0x7fb97f666b19 [ 728.018072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.020340] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 728.021277] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 728.022150] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 728.023041] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.023914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 728.024787] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 728.025700] CPU: 0 PID: 6316 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 728.027179] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 728.028899] FAULT_INJECTION: forcing a failure. [ 728.028899] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 728.028946] Call Trace: [ 728.030925] dump_stack+0x107/0x167 [ 728.031702] should_fail.cold+0x5/0xa [ 728.032514] __alloc_pages_nodemask+0x182/0x600 [ 728.033502] ? add_mm_counter_fast+0x220/0x220 [ 728.034481] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 728.035762] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 728.036870] ? lock_downgrade+0x6d0/0x6d0 [ 728.037746] ? mark_held_locks+0x9e/0xe0 [ 728.038622] alloc_pages_vma+0xbb/0x410 [ 728.039470] handle_mm_fault+0x152f/0x3500 [ 728.040373] ? do_raw_spin_lock+0x121/0x260 [ 728.041285] ? rwlock_bug.part.0+0x90/0x90 [ 728.042186] ? __pmd_alloc+0x630/0x630 [ 728.043048] __get_user_pages+0x6ec/0x1620 [ 728.043959] ? follow_page_mask+0x1900/0x1900 [ 728.044910] ? down_read+0x10f/0x430 [ 728.045696] ? down_write+0x160/0x160 [ 728.046526] get_user_pages_unlocked+0x18a/0x690 [ 728.047531] ? internal_get_user_pages_fast+0xdce/0x2640 [ 728.048798] ? pin_user_pages_locked+0x7b0/0x7b0 [ 728.049954] internal_get_user_pages_fast+0x175f/0x2640 [ 728.051285] ? pin_user_pages_unlocked+0x80/0x80 [ 728.052437] ? trace_hardirqs_on+0x5b/0x180 [ 728.053484] get_user_pages_fast+0x66/0xa0 [ 728.054513] iov_iter_get_pages+0x297/0xf40 [ 728.055560] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 728.056742] ? mempool_resize+0x7d0/0x7d0 [ 728.057762] bio_iov_iter_get_pages+0x22a/0x1200 [ 728.058921] ? bvec_alloc+0x17e/0x2f0 [ 728.059848] ? bio_alloc_bioset+0x2a1/0x600 [ 728.060887] ? bio_add_pc_page+0x100/0x100 [ 728.061910] ? bvec_alloc+0x290/0x2f0 [ 728.062839] ? iov_iter_npages+0x1fd/0xa70 [ 728.063856] ? ext4_iomap_begin+0x1a0/0x700 [ 728.064906] iomap_dio_bio_actor+0x77a/0xef0 [ 728.066004] iomap_dio_actor+0x36f/0x560 [ 728.066999] iomap_apply+0x289/0x810 [ 728.067895] ? iomap_dio_rw+0x90/0x90 [ 728.068812] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 728.070199] ? delete_from_page_cache_batch+0xa30/0xa30 [ 728.071492] ? mark_held_locks+0x9e/0xe0 [ 728.072480] ? filemap_check_errors+0xa5/0x150 [ 728.073581] __iomap_dio_rw+0x6cd/0x1110 [ 728.074568] ? iomap_dio_rw+0x90/0x90 [ 728.075503] ? iomap_dio_bio_actor+0xef0/0xef0 [ 728.076610] ? down_read+0x10f/0x430 [ 728.077505] ? down_write+0x160/0x160 [ 728.078443] iomap_dio_rw+0x31/0x90 [ 728.079321] ext4_file_read_iter+0x2c7/0x4c0 [ 728.080387] new_sync_read+0x424/0x6f0 [ 728.081325] ? ksys_lseek+0x1b0/0x1b0 [ 728.082275] ? fsnotify_perm.part.0+0x22d/0x620 [ 728.083408] ? security_file_permission+0xb1/0xe0 [ 728.084579] vfs_read+0x4da/0x620 [ 728.085414] ksys_read+0x12d/0x260 [ 728.086269] ? vfs_write+0xb10/0xb10 [ 728.087167] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 728.088415] ? syscall_enter_from_user_mode+0x1d/0x50 [ 728.089645] do_syscall_64+0x33/0x40 [ 728.090542] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 728.091759] RIP: 0033:0x7fe6449f5b19 [ 728.092648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.097082] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 728.098906] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 728.100606] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 728.102319] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.104008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.105696] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 728.107415] CPU: 1 PID: 6323 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 728.108235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 728.109209] Call Trace: [ 728.109521] dump_stack+0x107/0x167 [ 728.109953] should_fail.cold+0x5/0xa [ 728.110414] __alloc_pages_nodemask+0x182/0x600 [ 728.110966] ? add_mm_counter_fast+0x220/0x220 [ 728.111504] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 728.112221] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 728.112852] ? lock_downgrade+0x6d0/0x6d0 [ 728.113350] ? mark_held_locks+0x9e/0xe0 [ 728.113832] alloc_pages_vma+0xbb/0x410 [ 728.114310] handle_mm_fault+0x152f/0x3500 [ 728.114808] ? do_raw_spin_lock+0x121/0x260 [ 728.115319] ? rwlock_bug.part.0+0x90/0x90 [ 728.115816] ? __pmd_alloc+0x630/0x630 [ 728.116291] __get_user_pages+0x6ec/0x1620 [ 728.116798] ? follow_page_mask+0x1900/0x1900 [ 728.117327] ? down_read+0x10f/0x430 [ 728.117764] ? down_write+0x160/0x160 [ 728.118228] get_user_pages_unlocked+0x18a/0x690 [ 728.118795] ? internal_get_user_pages_fast+0xdce/0x2640 [ 728.119435] ? pin_user_pages_locked+0x7b0/0x7b0 [ 728.119996] internal_get_user_pages_fast+0x175f/0x2640 [ 728.120642] ? pin_user_pages_unlocked+0x80/0x80 05:45:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4007) 05:45:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 12) 05:45:27 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x890c, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:45:27 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:45:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 9) [ 728.121202] ? trace_hardirqs_on+0x5b/0x180 [ 728.121913] get_user_pages_fast+0x66/0xa0 [ 728.122449] iov_iter_get_pages+0x297/0xf40 [ 728.122957] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 728.123529] ? mempool_resize+0x7d0/0x7d0 [ 728.124027] bio_iov_iter_get_pages+0x22a/0x1200 [ 728.124585] ? bvec_alloc+0x17e/0x2f0 [ 728.125038] ? bio_alloc_bioset+0x2a1/0x600 [ 728.125542] ? bio_add_pc_page+0x100/0x100 [ 728.126044] ? bvec_alloc+0x290/0x2f0 [ 728.126502] ? iov_iter_npages+0x1fd/0xa70 [ 728.127005] ? ext4_iomap_begin+0x1a0/0x700 [ 728.127517] iomap_dio_bio_actor+0x77a/0xef0 [ 728.128046] iomap_dio_actor+0x36f/0x560 [ 728.128535] iomap_apply+0x289/0x810 [ 728.128972] ? iomap_dio_rw+0x90/0x90 [ 728.129420] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 728.130113] ? delete_from_page_cache_batch+0xa30/0xa30 [ 728.130748] ? mark_held_locks+0x9e/0xe0 [ 728.131231] ? filemap_check_errors+0xa5/0x150 [ 728.131773] __iomap_dio_rw+0x6cd/0x1110 [ 728.132247] ? iomap_dio_rw+0x90/0x90 [ 728.132706] ? iomap_dio_bio_actor+0xef0/0xef0 [ 728.133254] ? down_read+0x10f/0x430 [ 728.133695] ? down_write+0x160/0x160 [ 728.134151] iomap_dio_rw+0x31/0x90 [ 728.134593] ext4_file_read_iter+0x2c7/0x4c0 [ 728.135111] new_sync_read+0x424/0x6f0 [ 728.135569] ? ksys_lseek+0x1b0/0x1b0 [ 728.136027] ? fsnotify_perm.part.0+0x22d/0x620 [ 728.136569] ? security_file_permission+0xb1/0xe0 [ 728.137141] vfs_read+0x4da/0x620 [ 728.137551] ksys_read+0x12d/0x260 [ 728.137965] ? vfs_write+0xb10/0xb10 [ 728.138412] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 728.139026] ? syscall_enter_from_user_mode+0x1d/0x50 [ 728.139629] do_syscall_64+0x33/0x40 [ 728.140064] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 728.140663] RIP: 0033:0x7f8e866d3b19 [ 728.141099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.143251] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 728.144136] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 728.144961] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 728.145797] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.146631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.147459] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 728.149354] FAULT_INJECTION: forcing a failure. [ 728.149354] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 728.150799] CPU: 1 PID: 6325 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 728.151603] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 728.152572] Call Trace: [ 728.152877] dump_stack+0x107/0x167 [ 728.153301] should_fail.cold+0x5/0xa [ 728.153749] __alloc_pages_nodemask+0x182/0x600 [ 728.154299] ? add_mm_counter_fast+0x220/0x220 [ 728.154835] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 728.155538] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 728.156148] ? lock_downgrade+0x6d0/0x6d0 [ 728.156635] ? mark_held_locks+0x9e/0xe0 [ 728.157114] alloc_pages_vma+0xbb/0x410 [ 728.157578] handle_mm_fault+0x152f/0x3500 [ 728.158072] ? do_raw_spin_lock+0x121/0x260 [ 728.158586] ? rwlock_bug.part.0+0x90/0x90 [ 728.159086] ? __pmd_alloc+0x630/0x630 [ 728.159554] __get_user_pages+0x6ec/0x1620 [ 728.160055] ? follow_page_mask+0x1900/0x1900 [ 728.160579] ? down_read+0x10f/0x430 [ 728.161011] ? down_write+0x160/0x160 [ 728.161466] get_user_pages_unlocked+0x18a/0x690 [ 728.162019] ? internal_get_user_pages_fast+0xdce/0x2640 [ 728.162668] ? pin_user_pages_locked+0x7b0/0x7b0 [ 728.163235] internal_get_user_pages_fast+0x175f/0x2640 [ 728.163884] ? pin_user_pages_unlocked+0x80/0x80 [ 728.164439] ? trace_hardirqs_on+0x5b/0x180 [ 728.164941] get_user_pages_fast+0x66/0xa0 [ 728.165442] iov_iter_get_pages+0x297/0xf40 [ 728.165945] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 728.166528] ? mempool_resize+0x7d0/0x7d0 [ 728.167020] bio_iov_iter_get_pages+0x22a/0x1200 [ 728.167579] ? bvec_alloc+0x17e/0x2f0 [ 728.168026] ? bio_alloc_bioset+0x2a1/0x600 [ 728.168529] ? bio_add_pc_page+0x100/0x100 [ 728.169022] ? bvec_alloc+0x290/0x2f0 [ 728.169465] ? iov_iter_npages+0x1fd/0xa70 [ 728.169960] ? ext4_iomap_begin+0x1a0/0x700 [ 728.170475] iomap_dio_bio_actor+0x77a/0xef0 [ 728.170996] iomap_dio_actor+0x36f/0x560 [ 728.171470] iomap_apply+0x289/0x810 [ 728.171899] ? iomap_dio_rw+0x90/0x90 [ 728.172344] ? trace_event_raw_event_iomap_class+0x560/0x560 05:45:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b400f) 05:45:27 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8910, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 728.173017] ? delete_from_page_cache_batch+0xa30/0xa30 [ 728.173852] ? mark_held_locks+0x9e/0xe0 [ 728.174340] ? filemap_check_errors+0xa5/0x150 [ 728.174875] __iomap_dio_rw+0x6cd/0x1110 [ 728.175345] ? iomap_dio_rw+0x90/0x90 [ 728.175799] ? iomap_dio_bio_actor+0xef0/0xef0 [ 728.176335] ? down_read+0x10f/0x430 [ 728.176767] ? down_write+0x160/0x160 [ 728.177214] iomap_dio_rw+0x31/0x90 [ 728.177641] ext4_file_read_iter+0x2c7/0x4c0 [ 728.178153] new_sync_read+0x424/0x6f0 [ 728.178616] ? ksys_lseek+0x1b0/0x1b0 [ 728.179064] ? fsnotify_perm.part.0+0x22d/0x620 [ 728.179606] ? security_file_permission+0xb1/0xe0 [ 728.180171] vfs_read+0x4da/0x620 [ 728.180575] ksys_read+0x12d/0x260 [ 728.180995] ? vfs_write+0xb10/0xb10 [ 728.181431] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 728.182039] ? syscall_enter_from_user_mode+0x1d/0x50 [ 728.182652] do_syscall_64+0x33/0x40 [ 728.183093] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 728.183684] RIP: 0033:0x7f4792794b19 [ 728.184116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.186262] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 728.187147] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 728.187973] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 728.188802] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.189629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 728.190462] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 [ 728.194653] loop4: detected capacity change from 0 to 41948160 05:45:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 10) [ 728.263777] FAULT_INJECTION: forcing a failure. [ 728.263777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 728.265271] CPU: 1 PID: 6336 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 728.266061] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 728.267039] Call Trace: [ 728.267352] dump_stack+0x107/0x167 [ 728.267772] should_fail.cold+0x5/0xa [ 728.268218] __alloc_pages_nodemask+0x182/0x600 [ 728.268758] ? add_mm_counter_fast+0x220/0x220 [ 728.269294] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 728.269991] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 728.270608] ? lock_downgrade+0x6d0/0x6d0 [ 728.271086] ? mark_held_locks+0x9e/0xe0 [ 728.271561] alloc_pages_vma+0xbb/0x410 [ 728.272025] handle_mm_fault+0x152f/0x3500 [ 728.272518] ? do_raw_spin_lock+0x121/0x260 [ 728.273016] ? rwlock_bug.part.0+0x90/0x90 [ 728.273502] ? __pmd_alloc+0x630/0x630 [ 728.273969] __get_user_pages+0x6ec/0x1620 [ 728.274473] ? follow_page_mask+0x1900/0x1900 [ 728.274997] ? down_read+0x10f/0x430 [ 728.275428] ? down_write+0x160/0x160 [ 728.275878] get_user_pages_unlocked+0x18a/0x690 [ 728.276428] ? internal_get_user_pages_fast+0xdce/0x2640 [ 728.277064] ? pin_user_pages_locked+0x7b0/0x7b0 [ 728.277619] internal_get_user_pages_fast+0x175f/0x2640 [ 728.278265] ? pin_user_pages_unlocked+0x80/0x80 [ 728.278825] ? trace_hardirqs_on+0x5b/0x180 [ 728.279337] get_user_pages_fast+0x66/0xa0 [ 728.279836] iov_iter_get_pages+0x297/0xf40 [ 728.280338] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 728.280905] ? mempool_resize+0x7d0/0x7d0 [ 728.281394] bio_iov_iter_get_pages+0x22a/0x1200 [ 728.281946] ? bvec_alloc+0x17e/0x2f0 [ 728.282404] ? bio_alloc_bioset+0x2a1/0x600 [ 728.282902] ? bio_add_pc_page+0x100/0x100 [ 728.283388] ? bvec_alloc+0x290/0x2f0 [ 728.283833] ? iov_iter_npages+0x1fd/0xa70 [ 728.284326] ? ext4_iomap_begin+0x1a0/0x700 [ 728.284831] iomap_dio_bio_actor+0x77a/0xef0 [ 728.285350] iomap_dio_actor+0x36f/0x560 [ 728.285828] iomap_apply+0x289/0x810 [ 728.286268] ? iomap_dio_rw+0x90/0x90 [ 728.286712] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 728.287384] ? delete_from_page_cache_batch+0xa30/0xa30 [ 728.288004] ? mark_held_locks+0x9e/0xe0 [ 728.288479] ? filemap_check_errors+0xa5/0x150 [ 728.289009] __iomap_dio_rw+0x6cd/0x1110 [ 728.289480] ? iomap_dio_rw+0x90/0x90 [ 728.289933] ? iomap_dio_bio_actor+0xef0/0xef0 [ 728.290475] ? down_read+0x10f/0x430 [ 728.290901] ? down_write+0x160/0x160 [ 728.291349] iomap_dio_rw+0x31/0x90 [ 728.291772] ext4_file_read_iter+0x2c7/0x4c0 [ 728.292281] new_sync_read+0x424/0x6f0 [ 728.292740] ? ksys_lseek+0x1b0/0x1b0 [ 728.293197] ? fsnotify_perm.part.0+0x22d/0x620 [ 728.293744] ? security_file_permission+0xb1/0xe0 [ 728.294316] vfs_read+0x4da/0x620 [ 728.294723] ksys_read+0x12d/0x260 [ 728.295133] ? vfs_write+0xb10/0xb10 [ 728.295565] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 728.296175] ? syscall_enter_from_user_mode+0x1d/0x50 [ 728.296775] do_syscall_64+0x33/0x40 [ 728.297206] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 728.297799] RIP: 0033:0x7fb97f666b19 [ 728.298236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.300361] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 728.301243] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 728.302068] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 728.302896] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.303718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.304542] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 728.307776] loop4: detected capacity change from 0 to 41948160 05:45:27 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 13) 05:45:27 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 10) 05:45:27 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8911, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:45:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:27 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4076) [ 728.358751] loop4: detected capacity change from 0 to 41948160 05:45:27 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 11) [ 728.406135] FAULT_INJECTION: forcing a failure. [ 728.406135] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 728.408613] CPU: 0 PID: 6347 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 728.409997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 728.411675] Call Trace: [ 728.412220] dump_stack+0x107/0x167 [ 728.412958] should_fail.cold+0x5/0xa [ 728.413733] __alloc_pages_nodemask+0x182/0x600 [ 728.414680] ? add_mm_counter_fast+0x220/0x220 [ 728.415613] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 728.416827] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 728.417880] ? lock_downgrade+0x6d0/0x6d0 [ 728.418722] ? mark_held_locks+0x9e/0xe0 [ 728.419551] alloc_pages_vma+0xbb/0x410 [ 728.420362] handle_mm_fault+0x152f/0x3500 [ 728.421214] ? do_raw_spin_lock+0x121/0x260 [ 728.422085] ? rwlock_bug.part.0+0x90/0x90 [ 728.422944] ? __pmd_alloc+0x630/0x630 [ 728.423756] __get_user_pages+0x6ec/0x1620 [ 728.424619] ? follow_page_mask+0x1900/0x1900 [ 728.425522] ? down_read+0x10f/0x430 [ 728.426271] ? down_write+0x160/0x160 [ 728.427048] get_user_pages_unlocked+0x18a/0x690 [ 728.428007] ? internal_get_user_pages_fast+0xdce/0x2640 [ 728.429101] ? pin_user_pages_locked+0x7b0/0x7b0 [ 728.430072] internal_get_user_pages_fast+0x175f/0x2640 [ 728.431205] ? pin_user_pages_unlocked+0x80/0x80 [ 728.432161] ? trace_hardirqs_on+0x5b/0x180 [ 728.433042] get_user_pages_fast+0x66/0xa0 [ 728.433896] iov_iter_get_pages+0x297/0xf40 [ 728.434775] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 728.435770] ? mempool_resize+0x7d0/0x7d0 [ 728.436618] bio_iov_iter_get_pages+0x22a/0x1200 [ 728.437583] ? bvec_alloc+0x17e/0x2f0 [ 728.438367] ? bio_alloc_bioset+0x2a1/0x600 [ 728.439231] ? bio_add_pc_page+0x100/0x100 [ 728.440089] ? bvec_alloc+0x290/0x2f0 [ 728.440859] ? iov_iter_npages+0x1fd/0xa70 [ 728.441709] ? ext4_iomap_begin+0x1a0/0x700 [ 728.442593] iomap_dio_bio_actor+0x77a/0xef0 [ 728.443501] iomap_dio_actor+0x36f/0x560 [ 728.444330] iomap_apply+0x289/0x810 [ 728.445079] ? iomap_dio_rw+0x90/0x90 [ 728.445854] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 728.447033] ? delete_from_page_cache_batch+0xa30/0xa30 [ 728.448111] ? mark_held_locks+0x9e/0xe0 [ 728.448953] ? filemap_check_errors+0xa5/0x150 [ 728.449878] __iomap_dio_rw+0x6cd/0x1110 [ 728.450698] ? iomap_dio_rw+0x90/0x90 [ 728.451483] ? iomap_dio_bio_actor+0xef0/0xef0 [ 728.452417] ? down_read+0x10f/0x430 [ 728.453174] ? down_write+0x160/0x160 [ 728.453943] iomap_dio_rw+0x31/0x90 [ 728.454697] ext4_file_read_iter+0x2c7/0x4c0 [ 728.455592] new_sync_read+0x424/0x6f0 [ 728.456382] ? ksys_lseek+0x1b0/0x1b0 [ 728.457165] ? fsnotify_perm.part.0+0x22d/0x620 [ 728.458112] ? security_file_permission+0xb1/0xe0 [ 728.459113] vfs_read+0x4da/0x620 [ 728.459820] ksys_read+0x12d/0x260 [ 728.460550] ? vfs_write+0xb10/0xb10 [ 728.461305] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 728.462380] ? syscall_enter_from_user_mode+0x1d/0x50 [ 728.463418] do_syscall_64+0x33/0x40 [ 728.464167] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 728.465196] RIP: 0033:0x7f4792794b19 [ 728.465943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.469647] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 728.471203] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 728.472656] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 728.474094] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.475540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.476979] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 [ 728.485122] FAULT_INJECTION: forcing a failure. [ 728.485122] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 728.487660] CPU: 0 PID: 6350 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 728.489247] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 728.490954] Call Trace: [ 728.491494] dump_stack+0x107/0x167 [ 728.492231] should_fail.cold+0x5/0xa [ 728.493010] __alloc_pages_nodemask+0x182/0x600 [ 728.493950] ? add_mm_counter_fast+0x220/0x220 [ 728.494911] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 728.496132] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 728.497193] ? lock_downgrade+0x6d0/0x6d0 [ 728.498039] ? mark_held_locks+0x9e/0xe0 [ 728.498882] alloc_pages_vma+0xbb/0x410 [ 728.499689] handle_mm_fault+0x152f/0x3500 [ 728.500543] ? do_raw_spin_lock+0x121/0x260 [ 728.501426] ? rwlock_bug.part.0+0x90/0x90 [ 728.502290] ? __pmd_alloc+0x630/0x630 [ 728.503102] __get_user_pages+0x6ec/0x1620 [ 728.503973] ? follow_page_mask+0x1900/0x1900 [ 728.504881] ? down_read+0x10f/0x430 [ 728.505637] ? down_write+0x160/0x160 [ 728.506430] get_user_pages_unlocked+0x18a/0x690 [ 728.507390] ? internal_get_user_pages_fast+0xdce/0x2640 [ 728.508495] ? pin_user_pages_locked+0x7b0/0x7b0 [ 728.509476] internal_get_user_pages_fast+0x175f/0x2640 [ 728.510602] ? pin_user_pages_unlocked+0x80/0x80 [ 728.511570] ? trace_hardirqs_on+0x5b/0x180 [ 728.512451] get_user_pages_fast+0x66/0xa0 [ 728.513306] iov_iter_get_pages+0x297/0xf40 [ 728.514195] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 728.515207] ? mempool_resize+0x7d0/0x7d0 [ 728.516062] bio_iov_iter_get_pages+0x22a/0x1200 [ 728.517030] ? bvec_alloc+0x17e/0x2f0 [ 728.517805] ? bio_alloc_bioset+0x2a1/0x600 [ 728.518693] ? bio_add_pc_page+0x100/0x100 [ 728.519556] ? bvec_alloc+0x290/0x2f0 [ 728.520343] ? iov_iter_npages+0x1fd/0xa70 [ 728.521197] ? ext4_iomap_begin+0x1a0/0x700 [ 728.522092] iomap_dio_bio_actor+0x77a/0xef0 [ 728.523014] iomap_dio_actor+0x36f/0x560 [ 728.523842] iomap_apply+0x289/0x810 [ 728.524597] ? iomap_dio_rw+0x90/0x90 [ 728.525372] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 728.526551] ? delete_from_page_cache_batch+0xa30/0xa30 [ 728.527624] ? mark_held_locks+0x9e/0xe0 [ 728.528454] ? filemap_check_errors+0xa5/0x150 [ 728.529384] __iomap_dio_rw+0x6cd/0x1110 [ 728.530211] ? iomap_dio_rw+0x90/0x90 [ 728.531013] ? iomap_dio_bio_actor+0xef0/0xef0 [ 728.531947] ? down_read+0x10f/0x430 [ 728.532700] ? down_write+0x160/0x160 [ 728.533485] iomap_dio_rw+0x31/0x90 [ 728.534237] ext4_file_read_iter+0x2c7/0x4c0 [ 728.535141] new_sync_read+0x424/0x6f0 [ 728.535932] ? ksys_lseek+0x1b0/0x1b0 [ 728.536716] ? fsnotify_perm.part.0+0x22d/0x620 [ 728.537660] ? security_file_permission+0xb1/0xe0 [ 728.538658] vfs_read+0x4da/0x620 [ 728.539375] ksys_read+0x12d/0x260 [ 728.540099] ? vfs_write+0xb10/0xb10 [ 728.540860] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 728.541939] ? syscall_enter_from_user_mode+0x1d/0x50 [ 728.542990] do_syscall_64+0x33/0x40 [ 728.543743] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 728.544791] RIP: 0033:0x7fb97f666b19 [ 728.545546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.549275] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 728.550980] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 728.552488] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 728.553991] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.555534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.557046] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 728.561868] FAULT_INJECTION: forcing a failure. [ 728.561868] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 728.563259] CPU: 1 PID: 6348 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 728.564042] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 728.564985] Call Trace: [ 728.565298] dump_stack+0x107/0x167 [ 728.565720] should_fail.cold+0x5/0xa [ 728.566173] __alloc_pages_nodemask+0x182/0x600 [ 728.566726] ? add_mm_counter_fast+0x220/0x220 [ 728.567257] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 728.567961] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 728.568579] ? lock_downgrade+0x6d0/0x6d0 [ 728.569057] ? mark_held_locks+0x9e/0xe0 [ 728.569530] alloc_pages_vma+0xbb/0x410 [ 728.569994] handle_mm_fault+0x152f/0x3500 [ 728.570489] ? do_raw_spin_lock+0x121/0x260 [ 728.570990] ? rwlock_bug.part.0+0x90/0x90 [ 728.571477] ? __pmd_alloc+0x630/0x630 [ 728.571942] __get_user_pages+0x6ec/0x1620 [ 728.572629] ? follow_page_mask+0x1900/0x1900 [ 728.573157] ? down_read+0x10f/0x430 [ 728.573585] ? down_write+0x160/0x160 [ 728.574031] get_user_pages_unlocked+0x18a/0x690 [ 728.574592] ? internal_get_user_pages_fast+0xdce/0x2640 [ 728.575217] ? pin_user_pages_locked+0x7b0/0x7b0 [ 728.575794] internal_get_user_pages_fast+0x175f/0x2640 [ 728.576424] ? pin_user_pages_unlocked+0x80/0x80 [ 728.576980] ? trace_hardirqs_on+0x5b/0x180 [ 728.577483] get_user_pages_fast+0x66/0xa0 [ 728.577978] iov_iter_get_pages+0x297/0xf40 [ 728.578485] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 728.579054] ? mempool_resize+0x7d0/0x7d0 [ 728.579540] bio_iov_iter_get_pages+0x22a/0x1200 [ 728.580094] ? bvec_alloc+0x17e/0x2f0 [ 728.580536] ? bio_alloc_bioset+0x2a1/0x600 [ 728.581036] ? bio_add_pc_page+0x100/0x100 [ 728.581528] ? bvec_alloc+0x290/0x2f0 [ 728.581968] ? iov_iter_npages+0x1fd/0xa70 [ 728.582474] ? ext4_iomap_begin+0x1a0/0x700 [ 728.582981] iomap_dio_bio_actor+0x77a/0xef0 [ 728.583499] iomap_dio_actor+0x36f/0x560 [ 728.583975] iomap_apply+0x289/0x810 [ 728.584405] ? iomap_dio_rw+0x90/0x90 [ 728.584851] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 728.585520] ? delete_from_page_cache_batch+0xa30/0xa30 [ 728.586136] ? mark_held_locks+0x9e/0xe0 [ 728.586620] ? filemap_check_errors+0xa5/0x150 [ 728.587159] __iomap_dio_rw+0x6cd/0x1110 [ 728.587629] ? iomap_dio_rw+0x90/0x90 [ 728.588078] ? iomap_dio_bio_actor+0xef0/0xef0 [ 728.588612] ? down_read+0x10f/0x430 [ 728.589038] ? trace_hardirqs_on+0x5b/0x180 [ 728.589534] ? down_write+0x160/0x160 [ 728.589973] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 728.590613] iomap_dio_rw+0x31/0x90 [ 728.591046] ext4_file_read_iter+0x2c7/0x4c0 [ 728.591559] new_sync_read+0x424/0x6f0 [ 728.592011] ? ksys_lseek+0x1b0/0x1b0 [ 728.592467] ? fsnotify_perm.part.0+0x22d/0x620 [ 728.593008] ? security_file_permission+0xb1/0xe0 [ 728.593571] vfs_read+0x4da/0x620 [ 728.593976] ksys_read+0x12d/0x260 [ 728.594394] ? vfs_write+0xb10/0xb10 [ 728.594828] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 728.595435] ? syscall_enter_from_user_mode+0x1d/0x50 [ 728.596034] do_syscall_64+0x33/0x40 [ 728.596463] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 728.597052] RIP: 0033:0x7f8e866d3b19 [ 728.597486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 728.599616] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 728.600496] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 728.601317] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 728.602136] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 728.602965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 728.603784] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 05:45:40 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 13) 05:45:40 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8912, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 740.952302] FAULT_INJECTION: forcing a failure. [ 740.952302] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.954062] CPU: 1 PID: 6361 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 740.955062] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 740.956256] Call Trace: [ 740.956646] dump_stack+0x107/0x167 [ 740.957174] should_fail.cold+0x5/0xa [ 740.957734] __alloc_pages_nodemask+0x182/0x600 [ 740.958414] ? add_mm_counter_fast+0x220/0x220 [ 740.959070] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 740.959925] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 740.960678] ? lock_downgrade+0x6d0/0x6d0 [ 740.961283] ? mark_held_locks+0x9e/0xe0 [ 740.961871] alloc_pages_vma+0xbb/0x410 [ 740.962454] handle_mm_fault+0x152f/0x3500 [ 740.963064] ? do_raw_spin_lock+0x121/0x260 05:45:40 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 14) 05:45:40 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, 0x0, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:45:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:40 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1da688) 05:45:40 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 11) 05:45:40 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 12) [ 740.963681] ? rwlock_bug.part.0+0x90/0x90 [ 740.964490] ? __pmd_alloc+0x630/0x630 [ 740.965080] __get_user_pages+0x6ec/0x1620 [ 740.965693] ? follow_page_mask+0x1900/0x1900 [ 740.966339] ? down_read+0x10f/0x430 [ 740.966878] ? down_write+0x160/0x160 [ 740.967430] get_user_pages_unlocked+0x18a/0x690 [ 740.968111] ? internal_get_user_pages_fast+0xdce/0x2640 [ 740.968890] ? pin_user_pages_locked+0x7b0/0x7b0 [ 740.969584] internal_get_user_pages_fast+0x175f/0x2640 [ 740.970365] ? pin_user_pages_unlocked+0x80/0x80 [ 740.971053] ? trace_hardirqs_on+0x5b/0x180 [ 740.971675] get_user_pages_fast+0x66/0xa0 [ 740.972281] iov_iter_get_pages+0x297/0xf40 [ 740.972899] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 740.973620] ? mempool_resize+0x7d0/0x7d0 [ 740.974220] bio_iov_iter_get_pages+0x22a/0x1200 [ 740.974906] ? bvec_alloc+0x17e/0x2f0 [ 740.975456] ? bio_alloc_bioset+0x2a1/0x600 [ 740.976077] ? bio_add_pc_page+0x100/0x100 [ 740.976688] ? bvec_alloc+0x290/0x2f0 [ 740.977233] ? iov_iter_npages+0x1fd/0xa70 [ 740.977845] ? ext4_iomap_begin+0x1a0/0x700 [ 740.978480] iomap_dio_bio_actor+0x77a/0xef0 [ 740.979122] iomap_dio_actor+0x36f/0x560 [ 740.979710] iomap_apply+0x289/0x810 [ 740.980242] ? iomap_dio_rw+0x90/0x90 [ 740.980792] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 740.981632] ? delete_from_page_cache_batch+0xa30/0xa30 [ 740.982396] ? mark_held_locks+0x9e/0xe0 [ 740.982997] ? filemap_check_errors+0xa5/0x150 [ 740.983658] __iomap_dio_rw+0x6cd/0x1110 [ 740.984241] ? iomap_dio_rw+0x90/0x90 [ 740.984796] ? iomap_dio_bio_actor+0xef0/0xef0 [ 740.985449] ? down_read+0x10f/0x430 [ 740.985978] ? down_write+0x160/0x160 [ 740.986530] iomap_dio_rw+0x31/0x90 [ 740.986559] FAULT_INJECTION: forcing a failure. [ 740.986559] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 740.987068] ext4_file_read_iter+0x2c7/0x4c0 [ 740.990142] new_sync_read+0x424/0x6f0 [ 740.990708] ? ksys_lseek+0x1b0/0x1b0 [ 740.991255] ? fsnotify_perm.part.0+0x22d/0x620 [ 740.991918] ? security_file_permission+0xb1/0xe0 [ 740.992615] vfs_read+0x4da/0x620 [ 740.993123] ksys_read+0x12d/0x260 [ 740.993625] ? vfs_write+0xb10/0xb10 [ 740.994154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 740.994908] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.995641] do_syscall_64+0x33/0x40 [ 740.996169] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 740.996895] RIP: 0033:0x7fe6449f5b19 [ 740.997421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 741.000023] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 741.001100] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 741.002112] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 741.003143] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.004158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 741.005173] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 741.006219] CPU: 0 PID: 6364 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 741.007688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 741.009450] Call Trace: [ 741.010015] dump_stack+0x107/0x167 [ 741.010822] should_fail.cold+0x5/0xa [ 741.011643] __alloc_pages_nodemask+0x182/0x600 [ 741.012631] ? add_mm_counter_fast+0x220/0x220 [ 741.013603] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 741.014894] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 741.016016] ? lock_downgrade+0x6d0/0x6d0 [ 741.016892] ? mark_held_locks+0x9e/0xe0 [ 741.017761] alloc_pages_vma+0xbb/0x410 [ 741.018625] handle_mm_fault+0x152f/0x3500 [ 741.019525] ? do_raw_spin_lock+0x121/0x260 [ 741.020440] ? rwlock_bug.part.0+0x90/0x90 [ 741.021339] ? __pmd_alloc+0x630/0x630 [ 741.022199] __get_user_pages+0x6ec/0x1620 [ 741.023121] ? follow_page_mask+0x1900/0x1900 [ 741.024079] ? down_read+0x10f/0x430 [ 741.024874] ? down_write+0x160/0x160 [ 741.025696] get_user_pages_unlocked+0x18a/0x690 [ 741.026713] ? internal_get_user_pages_fast+0xdce/0x2640 [ 741.027873] ? pin_user_pages_locked+0x7b0/0x7b0 [ 741.028894] internal_get_user_pages_fast+0x175f/0x2640 [ 741.030060] ? pin_user_pages_unlocked+0x80/0x80 [ 741.031079] ? trace_hardirqs_on+0x5b/0x180 [ 741.032000] get_user_pages_fast+0x66/0xa0 [ 741.032902] iov_iter_get_pages+0x297/0xf40 [ 741.033823] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 741.034871] ? mempool_resize+0x7d0/0x7d0 [ 741.035765] bio_iov_iter_get_pages+0x22a/0x1200 [ 741.036776] ? bvec_alloc+0x17e/0x2f0 [ 741.037590] ? bio_alloc_bioset+0x2a1/0x600 [ 741.038510] ? bio_add_pc_page+0x100/0x100 [ 741.039414] ? bvec_alloc+0x290/0x2f0 [ 741.040225] ? iov_iter_npages+0x1fd/0xa70 [ 741.041123] ? ext4_iomap_begin+0x1a0/0x700 [ 741.042052] iomap_dio_bio_actor+0x77a/0xef0 [ 741.043016] iomap_dio_actor+0x36f/0x560 [ 741.043889] iomap_apply+0x289/0x810 [ 741.044683] ? iomap_dio_rw+0x90/0x90 [ 741.045493] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 741.046733] ? delete_from_page_cache_batch+0xa30/0xa30 [ 741.047857] ? mark_held_locks+0x9e/0xe0 [ 741.048738] ? filemap_check_errors+0xa5/0x150 [ 741.049718] __iomap_dio_rw+0x6cd/0x1110 [ 741.050586] ? iomap_dio_rw+0x90/0x90 [ 741.051413] ? iomap_dio_bio_actor+0xef0/0xef0 [ 741.052389] ? down_read+0x10f/0x430 [ 741.053177] ? down_write+0x160/0x160 [ 741.053999] iomap_dio_rw+0x31/0x90 [ 741.054782] ext4_file_read_iter+0x2c7/0x4c0 [ 741.055724] new_sync_read+0x424/0x6f0 [ 741.056555] ? ksys_lseek+0x1b0/0x1b0 [ 741.057381] ? fsnotify_perm.part.0+0x22d/0x620 [ 741.058372] ? security_file_permission+0xb1/0xe0 [ 741.059417] vfs_read+0x4da/0x620 [ 741.060161] ksys_read+0x12d/0x260 [ 741.061059] ? vfs_write+0xb10/0xb10 [ 741.061960] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 741.063081] ? syscall_enter_from_user_mode+0x1d/0x50 [ 741.063719] FAULT_INJECTION: forcing a failure. [ 741.063719] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 741.064174] do_syscall_64+0x33/0x40 [ 741.064199] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 741.067642] RIP: 0033:0x7f8e866d3b19 [ 741.068430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 741.072325] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 741.073944] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 741.075474] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 741.076984] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.078501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 741.080011] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 741.081546] CPU: 1 PID: 6366 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 741.082544] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 741.083683] Call Trace: [ 741.084052] dump_stack+0x107/0x167 [ 741.084549] should_fail.cold+0x5/0xa [ 741.085079] __alloc_pages_nodemask+0x182/0x600 [ 741.085728] ? add_mm_counter_fast+0x220/0x220 [ 741.086373] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 741.087217] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 741.087934] ? lock_downgrade+0x6d0/0x6d0 [ 741.088016] loop4: detected capacity change from 0 to 41948160 [ 741.088517] ? mark_held_locks+0x9e/0xe0 [ 741.088535] alloc_pages_vma+0xbb/0x410 [ 741.088559] handle_mm_fault+0x152f/0x3500 05:45:40 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8913, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 741.091474] ? do_raw_spin_lock+0x121/0x260 [ 741.092207] ? rwlock_bug.part.0+0x90/0x90 [ 741.092782] ? __pmd_alloc+0x630/0x630 [ 741.093325] __get_user_pages+0x6ec/0x1620 [ 741.093908] ? follow_page_mask+0x1900/0x1900 [ 741.094543] ? down_read+0x10f/0x430 [ 741.095046] ? down_write+0x160/0x160 [ 741.095573] get_user_pages_unlocked+0x18a/0x690 [ 741.096223] ? internal_get_user_pages_fast+0xdce/0x2640 [ 741.096965] ? pin_user_pages_locked+0x7b0/0x7b0 [ 741.097625] internal_get_user_pages_fast+0x175f/0x2640 [ 741.098383] ? pin_user_pages_unlocked+0x80/0x80 [ 741.099037] ? trace_hardirqs_on+0x5b/0x180 [ 741.099631] get_user_pages_fast+0x66/0xa0 [ 741.100219] iov_iter_get_pages+0x297/0xf40 [ 741.100815] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 741.101487] ? mempool_resize+0x7d0/0x7d0 [ 741.102062] bio_iov_iter_get_pages+0x22a/0x1200 [ 741.102722] ? bvec_alloc+0x17e/0x2f0 [ 741.103243] ? bio_alloc_bioset+0x2a1/0x600 [ 741.103845] ? bio_add_pc_page+0x100/0x100 [ 741.104425] ? bvec_alloc+0x290/0x2f0 [ 741.104940] ? iov_iter_npages+0x1fd/0xa70 [ 741.105510] ? ext4_iomap_begin+0x1a0/0x700 [ 741.106102] iomap_dio_bio_actor+0x77a/0xef0 [ 741.106714] iomap_dio_actor+0x36f/0x560 [ 741.107282] iomap_apply+0x289/0x810 [ 741.107797] ? iomap_dio_rw+0x90/0x90 [ 741.108329] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 741.109117] ? delete_from_page_cache_batch+0xa30/0xa30 [ 741.109857] ? mark_held_locks+0x9e/0xe0 [ 741.110421] ? filemap_check_errors+0xa5/0x150 [ 741.111042] __iomap_dio_rw+0x6cd/0x1110 [ 741.111600] ? iomap_dio_rw+0x90/0x90 [ 741.112122] ? iomap_dio_bio_actor+0xef0/0xef0 [ 741.112752] ? down_read+0x10f/0x430 [ 741.113254] ? down_write+0x160/0x160 [ 741.113773] iomap_dio_rw+0x31/0x90 [ 741.114272] ext4_file_read_iter+0x2c7/0x4c0 [ 741.114892] new_sync_read+0x424/0x6f0 [ 741.115423] ? ksys_lseek+0x1b0/0x1b0 [ 741.115956] ? fsnotify_perm.part.0+0x22d/0x620 [ 741.116591] ? security_file_permission+0xb1/0xe0 [ 741.117258] vfs_read+0x4da/0x620 [ 741.117737] ksys_read+0x12d/0x260 [ 741.118229] ? vfs_write+0xb10/0xb10 [ 741.118760] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 741.119468] ? syscall_enter_from_user_mode+0x1d/0x50 [ 741.120171] do_syscall_64+0x33/0x40 [ 741.120676] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 741.121380] RIP: 0033:0x7fb97f666b19 [ 741.121885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 741.122090] FAULT_INJECTION: forcing a failure. [ 741.122090] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 741.124384] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 741.124399] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 741.124408] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 741.124415] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.124437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 741.131771] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 741.132762] CPU: 0 PID: 6368 Comm: syz-executor.3 Not tainted 5.10.246 #1 [ 741.134221] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 741.136144] Call Trace: [ 741.136707] dump_stack+0x107/0x167 [ 741.137483] should_fail.cold+0x5/0xa [ 741.138293] __alloc_pages_nodemask+0x182/0x600 [ 741.139287] ? add_mm_counter_fast+0x220/0x220 [ 741.140255] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 741.141539] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 741.142660] ? lock_downgrade+0x6d0/0x6d0 [ 741.143551] ? mark_held_locks+0x9e/0xe0 [ 741.144427] alloc_pages_vma+0xbb/0x410 [ 741.145293] handle_mm_fault+0x152f/0x3500 [ 741.146191] ? do_raw_spin_lock+0x121/0x260 [ 741.147132] ? rwlock_bug.part.0+0x90/0x90 [ 741.148030] ? __pmd_alloc+0x630/0x630 [ 741.148896] __get_user_pages+0x6ec/0x1620 [ 741.149815] ? follow_page_mask+0x1900/0x1900 [ 741.150790] ? down_read+0x10f/0x430 [ 741.151586] ? down_write+0x160/0x160 [ 741.152410] get_user_pages_unlocked+0x18a/0x690 [ 741.153421] ? internal_get_user_pages_fast+0xdce/0x2640 [ 741.154593] ? pin_user_pages_locked+0x7b0/0x7b0 [ 741.155616] internal_get_user_pages_fast+0x175f/0x2640 [ 741.156789] ? pin_user_pages_unlocked+0x80/0x80 [ 741.157803] ? trace_hardirqs_on+0x5b/0x180 [ 741.158737] get_user_pages_fast+0x66/0xa0 [ 741.159640] iov_iter_get_pages+0x297/0xf40 [ 741.160562] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 741.161613] ? mempool_resize+0x7d0/0x7d0 [ 741.162515] bio_iov_iter_get_pages+0x22a/0x1200 [ 741.163536] ? bvec_alloc+0x17e/0x2f0 [ 741.164352] ? bio_alloc_bioset+0x2a1/0x600 [ 741.165269] ? bio_add_pc_page+0x100/0x100 [ 741.166172] ? bvec_alloc+0x290/0x2f0 [ 741.167001] ? iov_iter_npages+0x1fd/0xa70 [ 741.167904] ? ext4_iomap_begin+0x1a0/0x700 [ 741.168836] iomap_dio_bio_actor+0x77a/0xef0 [ 741.169790] iomap_dio_actor+0x36f/0x560 [ 741.170670] iomap_apply+0x289/0x810 [ 741.171467] ? iomap_dio_rw+0x90/0x90 [ 741.172282] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 741.173516] ? delete_from_page_cache_batch+0xa30/0xa30 [ 741.174656] ? mark_held_locks+0x9e/0xe0 [ 741.175536] ? filemap_check_errors+0xa5/0x150 [ 741.176520] __iomap_dio_rw+0x6cd/0x1110 [ 741.177380] ? iomap_dio_rw+0x90/0x90 [ 741.178211] ? iomap_dio_bio_actor+0xef0/0xef0 [ 741.179200] ? down_read+0x10f/0x430 [ 741.179997] ? down_write+0x160/0x160 [ 741.180814] iomap_dio_rw+0x31/0x90 [ 741.181593] ext4_file_read_iter+0x2c7/0x4c0 [ 741.182545] new_sync_read+0x424/0x6f0 [ 741.183378] ? ksys_lseek+0x1b0/0x1b0 [ 741.184208] ? fsnotify_perm.part.0+0x22d/0x620 [ 741.185205] ? security_file_permission+0xb1/0xe0 [ 741.186241] vfs_read+0x4da/0x620 [ 741.187002] ksys_read+0x12d/0x260 [ 741.187765] ? vfs_write+0xb10/0xb10 [ 741.188561] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 741.189678] ? syscall_enter_from_user_mode+0x1d/0x50 [ 741.190790] do_syscall_64+0x33/0x40 [ 741.191584] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 741.192676] RIP: 0033:0x7f4792794b19 [ 741.193471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 741.197409] RSP: 002b:00007f478fd0a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 741.199047] RAX: ffffffffffffffda RBX: 00007f47928a7f60 RCX: 00007f4792794b19 [ 741.200565] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 741.202087] RBP: 00007f478fd0a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.203613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 741.205134] R13: 00007ffd428899df R14: 00007f478fd0a300 R15: 0000000000022000 05:45:40 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x201b4000) 05:45:40 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 14) 05:45:40 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 13) 05:45:40 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0xfa04) 05:45:40 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r1}}, 0x9) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x50000, 0x1bf) read(r0, &(0x7f0000000000), 0x1b4000) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) 05:45:40 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8914, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:45:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:40 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, 0x0, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 741.328207] FAULT_INJECTION: forcing a failure. [ 741.328207] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 741.330816] CPU: 0 PID: 6384 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 741.332259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 741.334021] Call Trace: [ 741.334595] dump_stack+0x107/0x167 [ 741.335372] should_fail.cold+0x5/0xa [ 741.336184] __alloc_pages_nodemask+0x182/0x600 [ 741.337170] ? add_mm_counter_fast+0x220/0x220 [ 741.338140] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 741.339425] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 741.340534] ? lock_downgrade+0x6d0/0x6d0 [ 741.341407] ? mark_held_locks+0x9e/0xe0 [ 741.342285] alloc_pages_vma+0xbb/0x410 [ 741.343134] handle_mm_fault+0x152f/0x3500 [ 741.344027] ? do_raw_spin_lock+0x121/0x260 [ 741.344937] ? rwlock_bug.part.0+0x90/0x90 [ 741.345839] ? __pmd_alloc+0x630/0x630 [ 741.346697] __get_user_pages+0x6ec/0x1620 [ 741.347613] ? follow_page_mask+0x1900/0x1900 [ 741.348557] ? down_read+0x10f/0x430 [ 741.349352] ? down_write+0x160/0x160 [ 741.350174] get_user_pages_unlocked+0x18a/0x690 [ 741.351192] ? internal_get_user_pages_fast+0xdce/0x2640 [ 741.352356] ? pin_user_pages_locked+0x7b0/0x7b0 [ 741.353384] internal_get_user_pages_fast+0x175f/0x2640 [ 741.354566] ? pin_user_pages_unlocked+0x80/0x80 [ 741.355578] ? trace_hardirqs_on+0x5b/0x180 [ 741.356506] get_user_pages_fast+0x66/0xa0 [ 741.357423] iov_iter_get_pages+0x297/0xf40 [ 741.358352] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 741.359396] ? mempool_resize+0x7d0/0x7d0 [ 741.360294] bio_iov_iter_get_pages+0x22a/0x1200 [ 741.361440] ? bvec_alloc+0x17e/0x2f0 [ 741.362268] ? bio_alloc_bioset+0x2a1/0x600 [ 741.363203] ? bio_add_pc_page+0x100/0x100 [ 741.364118] ? bvec_alloc+0x290/0x2f0 [ 741.364934] ? iov_iter_npages+0x1fd/0xa70 [ 741.365846] ? ext4_iomap_begin+0x1a0/0x700 [ 741.366773] iomap_dio_bio_actor+0x77a/0xef0 [ 741.367733] iomap_dio_actor+0x36f/0x560 [ 741.368610] iomap_apply+0x289/0x810 [ 741.369408] ? iomap_dio_rw+0x90/0x90 [ 741.370227] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 741.371475] ? delete_from_page_cache_batch+0xa30/0xa30 [ 741.372613] ? mark_held_locks+0x9e/0xe0 [ 741.373485] ? filemap_check_errors+0xa5/0x150 [ 741.374476] __iomap_dio_rw+0x6cd/0x1110 [ 741.375353] ? iomap_dio_rw+0x90/0x90 [ 741.376193] ? iomap_dio_bio_actor+0xef0/0xef0 [ 741.377167] ? down_read+0x10f/0x430 [ 741.377969] ? down_write+0x160/0x160 [ 741.378793] iomap_dio_rw+0x31/0x90 [ 741.379580] ext4_file_read_iter+0x2c7/0x4c0 [ 741.380518] new_sync_read+0x424/0x6f0 [ 741.381356] ? ksys_lseek+0x1b0/0x1b0 [ 741.382182] ? fsnotify_perm.part.0+0x22d/0x620 [ 741.383188] ? security_file_permission+0xb1/0xe0 [ 741.384219] vfs_read+0x4da/0x620 [ 741.384974] ksys_read+0x12d/0x260 [ 741.385726] ? vfs_write+0xb10/0xb10 [ 741.386536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 741.387661] ? syscall_enter_from_user_mode+0x1d/0x50 [ 741.388765] do_syscall_64+0x33/0x40 [ 741.389561] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 741.390666] RIP: 0033:0x7fb97f666b19 [ 741.391467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 741.395384] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 741.396998] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 741.398517] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 741.400031] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.401544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 741.403064] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 741.407027] FAULT_INJECTION: forcing a failure. [ 741.407027] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 741.409828] CPU: 0 PID: 6385 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 741.411286] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 741.413040] Call Trace: [ 741.413597] dump_stack+0x107/0x167 [ 741.414377] should_fail.cold+0x5/0xa [ 741.415195] __alloc_pages_nodemask+0x182/0x600 [ 741.416292] ? add_mm_counter_fast+0x220/0x220 [ 741.417260] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 741.418544] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 741.419656] ? lock_downgrade+0x6d0/0x6d0 [ 741.420529] ? mark_held_locks+0x9e/0xe0 [ 741.421394] alloc_pages_vma+0xbb/0x410 [ 741.422243] handle_mm_fault+0x152f/0x3500 [ 741.423145] ? do_raw_spin_lock+0x121/0x260 [ 741.424054] ? rwlock_bug.part.0+0x90/0x90 [ 741.424945] ? __pmd_alloc+0x630/0x630 [ 741.425796] __get_user_pages+0x6ec/0x1620 [ 741.426728] ? follow_page_mask+0x1900/0x1900 [ 741.427676] ? down_read+0x10f/0x430 [ 741.428476] ? down_write+0x160/0x160 [ 741.429294] get_user_pages_unlocked+0x18a/0x690 [ 741.430299] ? internal_get_user_pages_fast+0xdce/0x2640 [ 741.431479] ? pin_user_pages_locked+0x7b0/0x7b0 [ 741.432498] internal_get_user_pages_fast+0x175f/0x2640 [ 741.433670] ? pin_user_pages_unlocked+0x80/0x80 [ 741.434678] ? trace_hardirqs_on+0x5b/0x180 [ 741.435611] get_user_pages_fast+0x66/0xa0 [ 741.436511] iov_iter_get_pages+0x297/0xf40 [ 741.437430] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 741.438475] ? mempool_resize+0x7d0/0x7d0 [ 741.439362] bio_iov_iter_get_pages+0x22a/0x1200 [ 741.440369] ? bvec_alloc+0x17e/0x2f0 [ 741.441185] ? bio_alloc_bioset+0x2a1/0x600 [ 741.442097] ? bio_add_pc_page+0x100/0x100 [ 741.443009] ? bvec_alloc+0x290/0x2f0 [ 741.443816] ? iov_iter_npages+0x1fd/0xa70 [ 741.444709] ? ext4_iomap_begin+0x1a0/0x700 [ 741.445636] iomap_dio_bio_actor+0x77a/0xef0 [ 741.446599] iomap_dio_actor+0x36f/0x560 [ 741.447472] iomap_apply+0x289/0x810 [ 741.448264] ? iomap_dio_rw+0x90/0x90 [ 741.449081] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 741.450302] ? delete_from_page_cache_batch+0xa30/0xa30 [ 741.451449] ? mark_held_locks+0x9e/0xe0 [ 741.452320] ? filemap_check_errors+0xa5/0x150 [ 741.453313] __iomap_dio_rw+0x6cd/0x1110 [ 741.454181] ? iomap_dio_rw+0x90/0x90 [ 741.455022] ? iomap_dio_bio_actor+0xef0/0xef0 [ 741.455997] ? down_read+0x10f/0x430 [ 741.456788] ? down_write+0x160/0x160 [ 741.457600] iomap_dio_rw+0x31/0x90 [ 741.458377] ext4_file_read_iter+0x2c7/0x4c0 [ 741.459320] new_sync_read+0x424/0x6f0 [ 741.460152] ? ksys_lseek+0x1b0/0x1b0 [ 741.460986] ? fsnotify_perm.part.0+0x22d/0x620 [ 741.461982] ? security_file_permission+0xb1/0xe0 [ 741.463016] vfs_read+0x4da/0x620 [ 741.463755] ksys_read+0x12d/0x260 [ 741.464526] ? vfs_write+0xb10/0xb10 [ 741.465322] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 741.466450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 741.467543] do_syscall_64+0x33/0x40 [ 741.468340] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 741.469430] RIP: 0033:0x7fe6449f5b19 [ 741.470222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 741.474110] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 741.475722] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 741.477226] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 741.478736] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.480243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 741.481747] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:45:40 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 12) 05:45:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 15) 05:45:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x800800, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_mmap}, {@debug={'debug', 0x3d, 0x401}}, {@version_L}, {@cache_fscache}, {@cache_mmap}, {@cachetag={'cachetag', 0x3d, '^'}}, {@cache_none}, {@version_u}], [{@fsname={'fsname', 0x3d, ')]@('}}, {@smackfshat={'smackfshat', 0x3d, '/^.#'}}]}}) read(r0, &(0x7f0000000000), 0x1b4000) syz_io_uring_setup(0x3766, &(0x7f00000001c0)={0x0, 0x47f7, 0x18, 0x1, 0x193}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000280)) syz_io_uring_submit(r1, 0x0, &(0x7f0000000300)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x70b, &(0x7f00000002c0)=[r0], 0x1, 0x0, 0x1}, 0x4) 05:45:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:45:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, 0x0, 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 15) 05:45:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, 0x0, 0x0) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:45:53 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8916, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:45:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 14) [ 754.116278] FAULT_INJECTION: forcing a failure. [ 754.116278] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.117964] CPU: 0 PID: 6405 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 754.118916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.120063] Call Trace: [ 754.120434] dump_stack+0x107/0x167 [ 754.120954] should_fail.cold+0x5/0xa [ 754.121487] __alloc_pages_nodemask+0x182/0x600 [ 754.122131] ? add_mm_counter_fast+0x220/0x220 [ 754.122779] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 754.123622] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 754.124351] ? lock_downgrade+0x6d0/0x6d0 [ 754.124924] ? mark_held_locks+0x9e/0xe0 [ 754.125489] alloc_pages_vma+0xbb/0x410 [ 754.126215] handle_mm_fault+0x152f/0x3500 [ 754.126886] ? do_raw_spin_lock+0x121/0x260 [ 754.127477] ? rwlock_bug.part.0+0x90/0x90 [ 754.128054] ? __pmd_alloc+0x630/0x630 [ 754.128613] __get_user_pages+0x6ec/0x1620 [ 754.129202] ? follow_page_mask+0x1900/0x1900 [ 754.129761] loop4: detected capacity change from 0 to 41948160 [ 754.129825] ? down_read+0x10f/0x430 [ 754.131632] ? down_write+0x160/0x160 [ 754.132166] get_user_pages_unlocked+0x18a/0x690 [ 754.132816] ? internal_get_user_pages_fast+0xdce/0x2640 [ 754.133570] ? pin_user_pages_locked+0x7b0/0x7b0 [ 754.134231] internal_get_user_pages_fast+0x175f/0x2640 [ 754.134448] FAULT_INJECTION: forcing a failure. [ 754.134448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.134999] ? pin_user_pages_unlocked+0x80/0x80 [ 754.138089] ? trace_hardirqs_on+0x5b/0x180 [ 754.138709] get_user_pages_fast+0x66/0xa0 [ 754.139290] iov_iter_get_pages+0x297/0xf40 [ 754.139891] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 754.140570] ? mempool_resize+0x7d0/0x7d0 [ 754.141154] bio_iov_iter_get_pages+0x22a/0x1200 [ 754.141809] ? bvec_alloc+0x17e/0x2f0 [ 754.142336] ? bio_alloc_bioset+0x2a1/0x600 [ 754.142942] ? bio_add_pc_page+0x100/0x100 [ 754.143518] ? bvec_alloc+0x290/0x2f0 [ 754.144054] ? iov_iter_npages+0x1fd/0xa70 [ 754.144645] ? ext4_iomap_begin+0x1a0/0x700 [ 754.145247] iomap_dio_bio_actor+0x77a/0xef0 [ 754.145869] iomap_dio_actor+0x36f/0x560 [ 754.146428] iomap_apply+0x289/0x810 [ 754.146958] ? iomap_dio_rw+0x90/0x90 [ 754.147483] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 754.148276] ? delete_from_page_cache_batch+0xa30/0xa30 [ 754.149001] ? mark_held_locks+0x9e/0xe0 [ 754.149571] ? filemap_check_errors+0xa5/0x150 [ 754.150195] __iomap_dio_rw+0x6cd/0x1110 [ 754.150764] ? iomap_dio_rw+0x90/0x90 [ 754.151298] ? iomap_dio_bio_actor+0xef0/0xef0 [ 754.151926] ? down_read+0x10f/0x430 [ 754.152428] ? down_write+0x160/0x160 [ 754.152956] iomap_dio_rw+0x31/0x90 [ 754.153454] ext4_file_read_iter+0x2c7/0x4c0 [ 754.154063] new_sync_read+0x424/0x6f0 [ 754.154602] ? ksys_lseek+0x1b0/0x1b0 [ 754.155134] ? fsnotify_perm.part.0+0x22d/0x620 [ 754.155776] ? security_file_permission+0xb1/0xe0 [ 754.156435] vfs_read+0x4da/0x620 [ 754.156913] ksys_read+0x12d/0x260 [ 754.157396] ? vfs_write+0xb10/0xb10 [ 754.157922] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 754.158650] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.159355] do_syscall_64+0x33/0x40 [ 754.159871] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.160577] RIP: 0033:0x7fe6449f5b19 [ 754.161090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 754.163622] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 754.164671] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 754.165647] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 754.166631] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.167611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 754.168596] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 754.169597] CPU: 1 PID: 6415 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 754.171121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.172893] Call Trace: [ 754.173461] dump_stack+0x107/0x167 [ 754.174239] should_fail.cold+0x5/0xa [ 754.175064] __alloc_pages_nodemask+0x182/0x600 [ 754.176056] ? add_mm_counter_fast+0x220/0x220 [ 754.177034] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 754.178315] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 754.179438] ? lock_downgrade+0x6d0/0x6d0 [ 754.180316] ? mark_held_locks+0x9e/0xe0 [ 754.181189] alloc_pages_vma+0xbb/0x410 [ 754.182117] handle_mm_fault+0x152f/0x3500 [ 754.183033] ? do_raw_spin_lock+0x121/0x260 [ 754.183949] ? rwlock_bug.part.0+0x90/0x90 [ 754.184847] ? __pmd_alloc+0x630/0x630 [ 754.185706] __get_user_pages+0x6ec/0x1620 [ 754.186630] ? follow_page_mask+0x1900/0x1900 [ 754.187585] ? down_read+0x10f/0x430 [ 754.188379] ? down_write+0x160/0x160 [ 754.189202] get_user_pages_unlocked+0x18a/0x690 [ 754.190213] ? internal_get_user_pages_fast+0xdce/0x2640 [ 754.191380] ? pin_user_pages_locked+0x7b0/0x7b0 [ 754.192404] internal_get_user_pages_fast+0x175f/0x2640 [ 754.193570] ? pin_user_pages_unlocked+0x80/0x80 [ 754.194593] ? trace_hardirqs_on+0x5b/0x180 [ 754.195528] get_user_pages_fast+0x66/0xa0 [ 754.196432] iov_iter_get_pages+0x297/0xf40 [ 754.197360] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 754.198405] ? mempool_resize+0x7d0/0x7d0 [ 754.199314] bio_iov_iter_get_pages+0x22a/0x1200 [ 754.200333] ? bvec_alloc+0x17e/0x2f0 [ 754.201146] ? bio_alloc_bioset+0x2a1/0x600 [ 754.202065] ? bio_add_pc_page+0x100/0x100 [ 754.202977] ? bvec_alloc+0x290/0x2f0 [ 754.203791] ? iov_iter_npages+0x1fd/0xa70 [ 754.204693] ? ext4_iomap_begin+0x1a0/0x700 [ 754.205623] iomap_dio_bio_actor+0x77a/0xef0 [ 754.206585] iomap_dio_actor+0x36f/0x560 [ 754.207459] iomap_apply+0x289/0x810 [ 754.208255] ? iomap_dio_rw+0x90/0x90 [ 754.209068] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 754.210301] ? delete_from_page_cache_batch+0xa30/0xa30 [ 754.211446] ? mark_held_locks+0x9e/0xe0 [ 754.212332] ? filemap_check_errors+0xa5/0x150 [ 754.213318] __iomap_dio_rw+0x6cd/0x1110 [ 754.214185] ? iomap_dio_rw+0x90/0x90 [ 754.215034] ? iomap_dio_bio_actor+0xef0/0xef0 [ 754.216018] ? down_read+0x10f/0x430 [ 754.216814] ? down_write+0x160/0x160 [ 754.217636] iomap_dio_rw+0x31/0x90 [ 754.218417] ext4_file_read_iter+0x2c7/0x4c0 [ 754.219375] new_sync_read+0x424/0x6f0 [ 754.220216] ? ksys_lseek+0x1b0/0x1b0 [ 754.221048] ? fsnotify_perm.part.0+0x22d/0x620 [ 754.222044] ? security_file_permission+0xb1/0xe0 [ 754.223089] vfs_read+0x4da/0x620 [ 754.223839] ksys_read+0x12d/0x260 [ 754.224603] ? vfs_write+0xb10/0xb10 [ 754.225402] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 754.226525] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.227649] do_syscall_64+0x33/0x40 [ 754.228446] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.229545] RIP: 0033:0x7fb97f666b19 [ 754.230339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 754.234280] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 754.235910] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 754.237435] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 754.238969] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.240498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 754.242033] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 754.247579] FAULT_INJECTION: forcing a failure. [ 754.247579] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.250524] CPU: 1 PID: 6411 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 754.252120] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.253896] Call Trace: [ 754.254461] dump_stack+0x107/0x167 [ 754.255257] should_fail.cold+0x5/0xa [ 754.256075] __alloc_pages_nodemask+0x182/0x600 [ 754.257336] ? add_mm_counter_fast+0x220/0x220 [ 754.258408] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 754.259858] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 754.261041] ? lock_downgrade+0x6d0/0x6d0 [ 754.261926] ? mark_held_locks+0x9e/0xe0 [ 754.262819] alloc_pages_vma+0xbb/0x410 [ 754.263675] handle_mm_fault+0x152f/0x3500 [ 754.264592] ? do_raw_spin_lock+0x121/0x260 [ 754.265514] ? rwlock_bug.part.0+0x90/0x90 [ 754.266429] ? __pmd_alloc+0x630/0x630 [ 754.267297] __get_user_pages+0x6ec/0x1620 [ 754.268438] ? follow_page_mask+0x1900/0x1900 [ 754.269402] ? down_read+0x10f/0x430 [ 754.270197] ? down_write+0x160/0x160 [ 754.271034] get_user_pages_unlocked+0x18a/0x690 [ 754.272050] ? internal_get_user_pages_fast+0xdce/0x2640 [ 754.273211] ? pin_user_pages_locked+0x7b0/0x7b0 [ 754.274237] internal_get_user_pages_fast+0x175f/0x2640 [ 754.275417] ? pin_user_pages_unlocked+0x80/0x80 [ 754.276430] ? trace_hardirqs_on+0x5b/0x180 [ 754.277358] get_user_pages_fast+0x66/0xa0 [ 754.278265] iov_iter_get_pages+0x297/0xf40 [ 754.279200] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 754.280249] ? mempool_resize+0x7d0/0x7d0 [ 754.281152] bio_iov_iter_get_pages+0x22a/0x1200 [ 754.282384] ? bvec_alloc+0x17e/0x2f0 [ 754.283414] ? bio_alloc_bioset+0x2a1/0x600 [ 754.284341] ? bio_add_pc_page+0x100/0x100 [ 754.285242] ? bvec_alloc+0x290/0x2f0 [ 754.286054] ? iov_iter_npages+0x1fd/0xa70 [ 754.286999] ? ext4_iomap_begin+0x1a0/0x700 [ 754.287929] iomap_dio_bio_actor+0x77a/0xef0 [ 754.288892] iomap_dio_actor+0x36f/0x560 [ 754.289763] iomap_apply+0x289/0x810 [ 754.290558] ? iomap_dio_rw+0x90/0x90 [ 754.291422] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 754.292659] ? delete_from_page_cache_batch+0xa30/0xa30 [ 754.293796] ? mark_held_locks+0x9e/0xe0 [ 754.294719] ? filemap_check_errors+0xa5/0x150 [ 754.295942] __iomap_dio_rw+0x6cd/0x1110 [ 754.296967] ? iomap_dio_rw+0x90/0x90 [ 754.297798] ? iomap_dio_bio_actor+0xef0/0xef0 [ 754.298797] ? down_read+0x10f/0x430 [ 754.299588] ? down_write+0x160/0x160 [ 754.300410] iomap_dio_rw+0x31/0x90 [ 754.301189] ext4_file_read_iter+0x2c7/0x4c0 [ 754.302128] new_sync_read+0x424/0x6f0 [ 754.302972] ? ksys_lseek+0x1b0/0x1b0 [ 754.303800] ? fsnotify_perm.part.0+0x22d/0x620 [ 754.304793] ? security_file_permission+0xb1/0xe0 [ 754.305839] vfs_read+0x4da/0x620 [ 754.306600] ksys_read+0x12d/0x260 [ 754.307365] ? vfs_write+0xb10/0xb10 [ 754.308168] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 05:45:53 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8918, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 754.309287] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.310583] do_syscall_64+0x33/0x40 [ 754.311386] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.312469] RIP: 0033:0x7f8e866d3b19 [ 754.313262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 754.317194] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 754.318834] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 754.320367] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 754.321891] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.323415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 754.324931] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 05:45:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x100000) 05:45:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:53 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 16) 05:45:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:45:53 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 15) 05:45:53 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 16) 05:45:53 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x13c000) [ 754.449305] FAULT_INJECTION: forcing a failure. [ 754.449305] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.450885] CPU: 0 PID: 6434 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 754.451702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.452695] Call Trace: [ 754.453021] dump_stack+0x107/0x167 [ 754.453463] should_fail.cold+0x5/0xa [ 754.453925] __alloc_pages_nodemask+0x182/0x600 [ 754.454486] ? add_mm_counter_fast+0x220/0x220 [ 754.455045] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 754.455768] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 754.456397] ? lock_downgrade+0x6d0/0x6d0 [ 754.456904] ? mark_held_locks+0x9e/0xe0 [ 754.457399] alloc_pages_vma+0xbb/0x410 [ 754.457890] handle_mm_fault+0x152f/0x3500 [ 754.458395] ? do_raw_spin_lock+0x121/0x260 [ 754.458920] ? rwlock_bug.part.0+0x90/0x90 [ 754.459423] ? __pmd_alloc+0x630/0x630 [ 754.459905] __get_user_pages+0x6ec/0x1620 [ 754.460415] ? follow_page_mask+0x1900/0x1900 [ 754.460951] ? down_read+0x10f/0x430 [ 754.461399] ? down_write+0x160/0x160 [ 754.461864] get_user_pages_unlocked+0x18a/0x690 [ 754.462431] ? internal_get_user_pages_fast+0xdce/0x2640 [ 754.463093] ? pin_user_pages_locked+0x7b0/0x7b0 [ 754.463668] internal_get_user_pages_fast+0x175f/0x2640 [ 754.464317] ? pin_user_pages_unlocked+0x80/0x80 [ 754.464883] ? trace_hardirqs_on+0x5b/0x180 [ 754.465400] get_user_pages_fast+0x66/0xa0 [ 754.465910] iov_iter_get_pages+0x297/0xf40 [ 754.466425] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 754.467019] ? mempool_resize+0x7d0/0x7d0 [ 754.467522] bio_iov_iter_get_pages+0x22a/0x1200 [ 754.468088] ? bvec_alloc+0x17e/0x2f0 [ 754.468545] ? bio_alloc_bioset+0x2a1/0x600 [ 754.469062] ? bio_add_pc_page+0x100/0x100 [ 754.469567] ? bvec_alloc+0x290/0x2f0 [ 754.470023] ? iov_iter_npages+0x1fd/0xa70 [ 754.470530] ? ext4_iomap_begin+0x1a0/0x700 [ 754.471056] iomap_dio_bio_actor+0x77a/0xef0 [ 754.471589] iomap_dio_actor+0x36f/0x560 [ 754.472079] iomap_apply+0x289/0x810 [ 754.472526] ? iomap_dio_rw+0x90/0x90 [ 754.472983] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 754.473673] ? delete_from_page_cache_batch+0xa30/0xa30 [ 754.474306] ? mark_held_locks+0x9e/0xe0 [ 754.474807] ? filemap_check_errors+0xa5/0x150 [ 754.475351] __iomap_dio_rw+0x6cd/0x1110 [ 754.475834] ? iomap_dio_rw+0x90/0x90 [ 754.476296] ? iomap_dio_bio_actor+0xef0/0xef0 [ 754.476845] ? down_read+0x10f/0x430 [ 754.477288] ? down_write+0x160/0x160 [ 754.477750] iomap_dio_rw+0x31/0x90 [ 754.478181] ext4_file_read_iter+0x2c7/0x4c0 [ 754.478712] new_sync_read+0x424/0x6f0 [ 754.479177] ? ksys_lseek+0x1b0/0x1b0 [ 754.479640] ? fsnotify_perm.part.0+0x22d/0x620 [ 754.480192] ? security_file_permission+0xb1/0xe0 [ 754.480765] vfs_read+0x4da/0x620 [ 754.481183] ksys_read+0x12d/0x260 [ 754.481609] ? vfs_write+0xb10/0xb10 [ 754.482052] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 754.482681] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.483294] do_syscall_64+0x33/0x40 [ 754.483735] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.484346] RIP: 0033:0x7f8e866d3b19 [ 754.484790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 754.486969] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 754.487865] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 754.488707] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 754.489548] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.490387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 754.491239] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 05:45:53 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x891d, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 754.501141] FAULT_INJECTION: forcing a failure. [ 754.501141] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.502597] CPU: 0 PID: 6433 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 754.503395] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.504390] Call Trace: [ 754.504708] dump_stack+0x107/0x167 [ 754.505133] should_fail.cold+0x5/0xa [ 754.505580] __alloc_pages_nodemask+0x182/0x600 [ 754.506125] ? add_mm_counter_fast+0x220/0x220 [ 754.506664] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 754.507362] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 754.507976] ? lock_downgrade+0x6d0/0x6d0 [ 754.508457] ? mark_held_locks+0x9e/0xe0 [ 754.508932] alloc_pages_vma+0xbb/0x410 [ 754.509400] handle_mm_fault+0x152f/0x3500 [ 754.509891] ? do_raw_spin_lock+0x121/0x260 [ 754.510394] ? rwlock_bug.part.0+0x90/0x90 [ 754.510894] ? __pmd_alloc+0x630/0x630 [ 754.511360] __get_user_pages+0x6ec/0x1620 [ 754.511861] ? follow_page_mask+0x1900/0x1900 [ 754.512381] ? down_read+0x10f/0x430 [ 754.512817] ? down_write+0x160/0x160 [ 754.513266] get_user_pages_unlocked+0x18a/0x690 [ 754.513818] ? internal_get_user_pages_fast+0xdce/0x2640 [ 754.514448] ? pin_user_pages_locked+0x7b0/0x7b0 [ 754.515018] internal_get_user_pages_fast+0x175f/0x2640 [ 754.515659] ? pin_user_pages_unlocked+0x80/0x80 [ 754.516212] ? trace_hardirqs_on+0x5b/0x180 [ 754.516720] get_user_pages_fast+0x66/0xa0 [ 754.517214] iov_iter_get_pages+0x297/0xf40 [ 754.517718] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 754.518282] ? mempool_resize+0x7d0/0x7d0 [ 754.518781] bio_iov_iter_get_pages+0x22a/0x1200 [ 754.519336] ? bvec_alloc+0x17e/0x2f0 [ 754.519784] ? bio_alloc_bioset+0x2a1/0x600 [ 754.520282] ? bio_add_pc_page+0x100/0x100 [ 754.520767] ? bvec_alloc+0x290/0x2f0 [ 754.521204] ? iov_iter_npages+0x1fd/0xa70 [ 754.521693] ? ext4_iomap_begin+0x1a0/0x700 [ 754.522240] iomap_dio_bio_actor+0x77a/0xef0 [ 754.522951] iomap_dio_actor+0x36f/0x560 [ 754.523426] iomap_apply+0x289/0x810 [ 754.523854] ? iomap_dio_rw+0x90/0x90 [ 754.524300] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 754.524973] ? delete_from_page_cache_batch+0xa30/0xa30 [ 754.525592] ? mark_held_locks+0x9e/0xe0 [ 754.526077] ? filemap_check_errors+0xa5/0x150 [ 754.526620] __iomap_dio_rw+0x6cd/0x1110 [ 754.527089] ? iomap_dio_rw+0x90/0x90 [ 754.527538] ? iomap_dio_bio_actor+0xef0/0xef0 [ 754.528070] ? down_read+0x10f/0x430 [ 754.528500] ? down_write+0x160/0x160 [ 754.528944] iomap_dio_rw+0x31/0x90 [ 754.529368] ext4_file_read_iter+0x2c7/0x4c0 [ 754.529875] new_sync_read+0x424/0x6f0 [ 754.530328] ? ksys_lseek+0x1b0/0x1b0 [ 754.530783] ? fsnotify_perm.part.0+0x22d/0x620 [ 754.531321] ? security_file_permission+0xb1/0xe0 [ 754.531887] vfs_read+0x4da/0x620 [ 754.532298] ksys_read+0x12d/0x260 [ 754.532711] ? vfs_write+0xb10/0xb10 [ 754.533147] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 754.533758] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.534355] do_syscall_64+0x33/0x40 [ 754.534791] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.535379] RIP: 0033:0x7fe6449f5b19 [ 754.535808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 754.537922] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 754.538801] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 754.539625] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 754.540442] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.541257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 754.542070] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:45:53 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1a7344, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) lseek(r0, 0x2, 0x4) syncfs(r0) 05:45:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:53 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x891e, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:45:54 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(r1, 0x1000, 0x0) 05:45:54 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 754.591211] loop4: detected capacity change from 0 to 41948160 [ 754.611112] FAULT_INJECTION: forcing a failure. [ 754.611112] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.612578] CPU: 0 PID: 6449 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 754.613359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 754.614325] Call Trace: [ 754.614648] dump_stack+0x107/0x167 [ 754.615071] should_fail.cold+0x5/0xa [ 754.615516] __alloc_pages_nodemask+0x182/0x600 [ 754.616056] ? add_mm_counter_fast+0x220/0x220 [ 754.616585] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 754.617288] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 754.617903] ? lock_downgrade+0x6d0/0x6d0 [ 754.618379] ? mark_held_locks+0x9e/0xe0 [ 754.618868] alloc_pages_vma+0xbb/0x410 [ 754.619331] handle_mm_fault+0x152f/0x3500 [ 754.619820] ? do_raw_spin_lock+0x121/0x260 [ 754.620319] ? rwlock_bug.part.0+0x90/0x90 [ 754.620808] ? __pmd_alloc+0x630/0x630 [ 754.621275] __get_user_pages+0x6ec/0x1620 [ 754.621767] ? follow_page_mask+0x1900/0x1900 [ 754.622283] ? down_read+0x10f/0x430 [ 754.622719] ? down_write+0x160/0x160 [ 754.623165] get_user_pages_unlocked+0x18a/0x690 [ 754.623713] ? internal_get_user_pages_fast+0xdce/0x2640 [ 754.624341] ? pin_user_pages_locked+0x7b0/0x7b0 [ 754.624898] internal_get_user_pages_fast+0x175f/0x2640 [ 754.625528] ? pin_user_pages_unlocked+0x80/0x80 [ 754.626075] ? trace_hardirqs_on+0x5b/0x180 [ 754.626585] get_user_pages_fast+0x66/0xa0 [ 754.627079] iov_iter_get_pages+0x297/0xf40 [ 754.627578] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 754.628140] ? mempool_resize+0x7d0/0x7d0 [ 754.628627] bio_iov_iter_get_pages+0x22a/0x1200 [ 754.629174] ? bvec_alloc+0x17e/0x2f0 [ 754.629618] ? bio_alloc_bioset+0x2a1/0x600 [ 754.630116] ? bio_add_pc_page+0x100/0x100 [ 754.630611] ? bvec_alloc+0x290/0x2f0 [ 754.631052] ? iov_iter_npages+0x1fd/0xa70 [ 754.631540] ? ext4_iomap_begin+0x1a0/0x700 [ 754.632039] iomap_dio_bio_actor+0x77a/0xef0 [ 754.632561] iomap_dio_actor+0x36f/0x560 [ 754.633033] iomap_apply+0x289/0x810 [ 754.633469] ? iomap_dio_rw+0x90/0x90 [ 754.633914] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 754.634592] ? delete_from_page_cache_batch+0xa30/0xa30 [ 754.635202] ? mark_held_locks+0x9e/0xe0 [ 754.635679] ? filemap_check_errors+0xa5/0x150 [ 754.636212] __iomap_dio_rw+0x6cd/0x1110 [ 754.636684] ? iomap_dio_rw+0x90/0x90 [ 754.637136] ? iomap_dio_bio_actor+0xef0/0xef0 [ 754.637671] ? down_read+0x10f/0x430 [ 754.638098] ? down_write+0x160/0x160 [ 754.638542] iomap_dio_rw+0x31/0x90 [ 754.638975] ext4_file_read_iter+0x2c7/0x4c0 [ 754.639486] new_sync_read+0x424/0x6f0 [ 754.639932] ? ksys_lseek+0x1b0/0x1b0 [ 754.640387] ? fsnotify_perm.part.0+0x22d/0x620 [ 754.640927] ? security_file_permission+0xb1/0xe0 [ 754.641491] vfs_read+0x4da/0x620 [ 754.641895] ksys_read+0x12d/0x260 [ 754.642302] ? vfs_write+0xb10/0xb10 [ 754.642746] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 754.643352] ? syscall_enter_from_user_mode+0x1d/0x50 [ 754.643948] do_syscall_64+0x33/0x40 [ 754.644377] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 754.644969] RIP: 0033:0x7fb97f666b19 [ 754.645397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 754.647527] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 754.648399] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 754.649220] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 754.650043] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 754.650868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 754.651684] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:45:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4007) 05:45:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:45:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b400f) 05:45:54 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:45:54 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x891f, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 754.774732] loop4: detected capacity change from 0 to 41948160 [ 768.428956] FAULT_INJECTION: forcing a failure. [ 768.428956] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 768.430525] CPU: 1 PID: 6472 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 768.431434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 768.432734] Call Trace: [ 768.433085] dump_stack+0x107/0x167 [ 768.433606] should_fail.cold+0x5/0xa [ 768.434117] __alloc_pages_nodemask+0x182/0x600 [ 768.434758] ? add_mm_counter_fast+0x220/0x220 [ 768.435363] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 768.436152] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 768.436833] ? lock_downgrade+0x6d0/0x6d0 [ 768.437367] ? mark_held_locks+0x9e/0xe0 [ 768.437898] alloc_pages_vma+0xbb/0x410 [ 768.438420] handle_mm_fault+0x152f/0x3500 [ 768.438979] ? do_raw_spin_lock+0x121/0x260 [ 768.439552] ? rwlock_bug.part.0+0x90/0x90 [ 768.440111] ? __pmd_alloc+0x630/0x630 [ 768.440641] __get_user_pages+0x6ec/0x1620 [ 768.441224] ? follow_page_mask+0x1900/0x1900 [ 768.441838] ? down_read+0x10f/0x430 [ 768.442345] ? down_write+0x160/0x160 [ 768.442872] get_user_pages_unlocked+0x18a/0x690 [ 768.443518] ? internal_get_user_pages_fast+0xdce/0x2640 [ 768.444230] ? pin_user_pages_locked+0x7b0/0x7b0 [ 768.444877] internal_get_user_pages_fast+0x175f/0x2640 [ 768.445586] ? pin_user_pages_unlocked+0x80/0x80 [ 768.446214] ? trace_hardirqs_on+0x5b/0x180 [ 768.446805] get_user_pages_fast+0x66/0xa0 [ 768.447372] iov_iter_get_pages+0x297/0xf40 [ 768.447945] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 768.448599] ? mempool_resize+0x7d0/0x7d0 [ 768.449154] bio_iov_iter_get_pages+0x22a/0x1200 [ 768.449793] ? bvec_alloc+0x17e/0x2f0 [ 768.450306] ? bio_alloc_bioset+0x2a1/0x600 [ 768.450871] ? bio_add_pc_page+0x100/0x100 [ 768.451426] ? bvec_alloc+0x290/0x2f0 [ 768.451930] ? iov_iter_npages+0x1fd/0xa70 [ 768.452487] ? ext4_iomap_begin+0x1a0/0x700 [ 768.453068] iomap_dio_bio_actor+0x77a/0xef0 [ 768.453668] iomap_dio_actor+0x36f/0x560 [ 768.454211] iomap_apply+0x289/0x810 [ 768.454706] ? iomap_dio_rw+0x90/0x90 [ 768.455206] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 768.455952] ? delete_from_page_cache_batch+0xa30/0xa30 [ 768.456673] ? mark_held_locks+0x9e/0xe0 [ 768.457216] ? filemap_check_errors+0xa5/0x150 [ 768.457816] __iomap_dio_rw+0x6cd/0x1110 [ 768.458350] ? iomap_dio_rw+0x90/0x90 [ 768.458877] ? iomap_dio_bio_actor+0xef0/0xef0 [ 768.459474] ? down_read+0x10f/0x430 [ 768.459953] ? down_write+0x160/0x160 [ 768.460457] iomap_dio_rw+0x31/0x90 [ 768.460943] ext4_file_read_iter+0x2c7/0x4c0 [ 768.461526] new_sync_read+0x424/0x6f0 [ 768.462045] ? ksys_lseek+0x1b0/0x1b0 [ 768.462556] ? fsnotify_perm.part.0+0x22d/0x620 [ 768.463176] ? security_file_permission+0xb1/0xe0 [ 768.463809] vfs_read+0x4da/0x620 [ 768.464266] ksys_read+0x12d/0x260 [ 768.464742] ? vfs_write+0xb10/0xb10 [ 768.465231] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 768.465929] ? syscall_enter_from_user_mode+0x1d/0x50 [ 768.466764] do_syscall_64+0x33/0x40 [ 768.467265] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 768.467942] RIP: 0033:0x7fe6449f5b19 [ 768.468428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 768.470844] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 768.471983] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 768.473020] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 768.473996] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 768.474911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 768.475821] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:46:07 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 17) 05:46:07 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 16) 05:46:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:46:07 executing program 5: sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0xac, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8}, {0x11}}, {0x8}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x5081}, 0x800) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:46:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, 0x0, 0x0) 05:46:07 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8920, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:46:07 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 17) 05:46:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b403c) [ 768.485176] FAULT_INJECTION: forcing a failure. [ 768.485176] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 768.486829] CPU: 1 PID: 6474 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 768.487709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 768.488793] Call Trace: [ 768.488969] FAULT_INJECTION: forcing a failure. [ 768.488969] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 768.489145] dump_stack+0x107/0x167 [ 768.492229] should_fail.cold+0x5/0xa [ 768.492728] __alloc_pages_nodemask+0x182/0x600 [ 768.493331] ? add_mm_counter_fast+0x220/0x220 [ 768.493920] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 768.494695] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 768.495371] ? lock_downgrade+0x6d0/0x6d0 [ 768.495923] ? mark_held_locks+0x9e/0xe0 [ 768.496444] alloc_pages_vma+0xbb/0x410 [ 768.496957] handle_mm_fault+0x152f/0x3500 [ 768.497496] ? do_raw_spin_lock+0x121/0x260 [ 768.498050] ? rwlock_bug.part.0+0x90/0x90 [ 768.498597] ? __pmd_alloc+0x630/0x630 [ 768.499119] __get_user_pages+0x6ec/0x1620 [ 768.499667] ? follow_page_mask+0x1900/0x1900 [ 768.500239] ? down_read+0x10f/0x430 [ 768.500716] ? down_write+0x160/0x160 [ 768.501212] get_user_pages_unlocked+0x18a/0x690 [ 768.501819] ? internal_get_user_pages_fast+0xdce/0x2640 [ 768.502523] ? pin_user_pages_locked+0x7b0/0x7b0 [ 768.503146] internal_get_user_pages_fast+0x175f/0x2640 [ 768.503854] ? pin_user_pages_unlocked+0x80/0x80 [ 768.504469] ? trace_hardirqs_on+0x5b/0x180 [ 768.505023] get_user_pages_fast+0x66/0xa0 [ 768.505572] iov_iter_get_pages+0x297/0xf40 [ 768.506123] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 768.506759] ? mempool_resize+0x7d0/0x7d0 [ 768.507299] bio_iov_iter_get_pages+0x22a/0x1200 [ 768.507916] ? bvec_alloc+0x17e/0x2f0 [ 768.508408] ? bio_alloc_bioset+0x2a1/0x600 [ 768.508969] ? bio_add_pc_page+0x100/0x100 [ 768.509510] ? bvec_alloc+0x290/0x2f0 [ 768.510009] ? iov_iter_npages+0x1fd/0xa70 [ 768.510553] ? ext4_iomap_begin+0x1a0/0x700 [ 768.511128] iomap_dio_bio_actor+0x77a/0xef0 [ 768.511702] iomap_dio_actor+0x36f/0x560 [ 768.512229] iomap_apply+0x289/0x810 [ 768.512711] ? iomap_dio_rw+0x90/0x90 [ 768.513212] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 768.513947] ? delete_from_page_cache_batch+0xa30/0xa30 [ 768.514648] ? mark_held_locks+0x9e/0xe0 [ 768.515181] ? filemap_check_errors+0xa5/0x150 [ 768.515766] __iomap_dio_rw+0x6cd/0x1110 [ 768.516279] ? iomap_dio_rw+0x90/0x90 [ 768.516780] ? iomap_dio_bio_actor+0xef0/0xef0 [ 768.517372] ? down_read+0x10f/0x430 [ 768.517842] ? down_write+0x160/0x160 [ 768.518338] iomap_dio_rw+0x31/0x90 [ 768.518806] ext4_file_read_iter+0x2c7/0x4c0 [ 768.519368] new_sync_read+0x424/0x6f0 [ 768.519859] ? ksys_lseek+0x1b0/0x1b0 [ 768.520353] ? fsnotify_perm.part.0+0x22d/0x620 [ 768.520940] ? security_file_permission+0xb1/0xe0 [ 768.521551] vfs_read+0x4da/0x620 [ 768.521992] ksys_read+0x12d/0x260 [ 768.522442] ? vfs_write+0xb10/0xb10 [ 768.522919] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 768.523576] ? syscall_enter_from_user_mode+0x1d/0x50 [ 768.524245] do_syscall_64+0x33/0x40 [ 768.524713] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 768.525372] RIP: 0033:0x7f8e866d3b19 [ 768.525854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 768.528248] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 768.529201] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 768.530107] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 768.531016] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 768.531914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 768.532815] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 768.533745] CPU: 0 PID: 6485 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 768.535271] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 768.537100] Call Trace: [ 768.537677] dump_stack+0x107/0x167 [ 768.538476] should_fail.cold+0x5/0xa [ 768.539322] __alloc_pages_nodemask+0x182/0x600 [ 768.540337] ? add_mm_counter_fast+0x220/0x220 [ 768.541331] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 768.542648] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 768.543793] ? lock_downgrade+0x6d0/0x6d0 [ 768.544694] ? mark_held_locks+0x9e/0xe0 [ 768.545596] alloc_pages_vma+0xbb/0x410 [ 768.546469] handle_mm_fault+0x152f/0x3500 [ 768.547402] ? do_raw_spin_lock+0x121/0x260 [ 768.548336] ? rwlock_bug.part.0+0x90/0x90 [ 768.549263] ? __pmd_alloc+0x630/0x630 [ 768.550142] __get_user_pages+0x6ec/0x1620 [ 768.551084] ? follow_page_mask+0x1900/0x1900 [ 768.552064] ? down_read+0x10f/0x430 [ 768.552875] ? down_write+0x160/0x160 [ 768.553716] get_user_pages_unlocked+0x18a/0x690 [ 768.554768] ? internal_get_user_pages_fast+0xdce/0x2640 [ 768.555956] ? pin_user_pages_locked+0x7b0/0x7b0 [ 768.557003] internal_get_user_pages_fast+0x175f/0x2640 [ 768.558188] ? pin_user_pages_unlocked+0x80/0x80 [ 768.559230] ? trace_hardirqs_on+0x5b/0x180 [ 768.560170] get_user_pages_fast+0x66/0xa0 [ 768.561096] iov_iter_get_pages+0x297/0xf40 [ 768.562033] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 768.563100] ? mempool_resize+0x7d0/0x7d0 [ 768.564014] bio_iov_iter_get_pages+0x22a/0x1200 [ 768.565049] ? bvec_alloc+0x17e/0x2f0 [ 768.565880] ? bio_alloc_bioset+0x2a1/0x600 [ 768.566820] ? bio_add_pc_page+0x100/0x100 [ 768.567733] ? bvec_alloc+0x290/0x2f0 [ 768.568562] ? iov_iter_npages+0x1fd/0xa70 [ 768.569484] ? ext4_iomap_begin+0x1a0/0x700 [ 768.570421] iomap_dio_bio_actor+0x77a/0xef0 [ 768.571394] iomap_dio_actor+0x36f/0x560 [ 768.572282] iomap_apply+0x289/0x810 [ 768.573089] ? iomap_dio_rw+0x90/0x90 [ 768.573916] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 768.575179] ? delete_from_page_cache_batch+0xa30/0xa30 [ 768.576348] ? mark_held_locks+0x9e/0xe0 [ 768.577247] ? filemap_check_errors+0xa5/0x150 [ 768.578233] __iomap_dio_rw+0x6cd/0x1110 [ 768.579138] ? iomap_dio_rw+0x90/0x90 [ 768.579991] ? iomap_dio_bio_actor+0xef0/0xef0 [ 768.580998] ? down_read+0x10f/0x430 [ 768.581822] ? down_write+0x160/0x160 [ 768.582673] iomap_dio_rw+0x31/0x90 [ 768.583486] ext4_file_read_iter+0x2c7/0x4c0 [ 768.584462] new_sync_read+0x424/0x6f0 [ 768.585324] ? ksys_lseek+0x1b0/0x1b0 [ 768.586179] ? fsnotify_perm.part.0+0x22d/0x620 [ 768.587190] ? security_file_permission+0xb1/0xe0 [ 768.588261] vfs_read+0x4da/0x620 [ 768.589034] ksys_read+0x12d/0x260 [ 768.590005] ? vfs_write+0xb10/0xb10 [ 768.590903] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 768.592042] ? syscall_enter_from_user_mode+0x1d/0x50 [ 768.593141] do_syscall_64+0x33/0x40 [ 768.593936] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 768.595031] RIP: 0033:0x7fb97f666b19 [ 768.595825] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 768.599755] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 768.601378] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 768.602900] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 768.604412] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 768.605920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 768.607446] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 768.609866] loop4: detected capacity change from 0 to 41948160 05:46:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 17) 05:46:21 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8921, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:46:21 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:46:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 18) 05:46:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1da688) 05:46:21 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f00000000c0)={0x0, 0xfb, 0x3d, 0x1, 0x3, "28ea9dea685797c8028252a9d4c375ac", "76571f8acea66b192f9abd918ac1996a001a9d988d1687838c59da75294459a6e528fdf015a81bb6"}, 0x3d, 0x2) [ 781.845184] FAULT_INJECTION: forcing a failure. [ 781.845184] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 781.846793] CPU: 1 PID: 6494 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 781.847665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 781.848745] Call Trace: [ 781.849081] dump_stack+0x107/0x167 [ 781.849537] should_fail.cold+0x5/0xa [ 781.850015] __alloc_pages_nodemask+0x182/0x600 [ 781.850604] ? add_mm_counter_fast+0x220/0x220 [ 781.851183] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 781.851943] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 781.852602] ? lock_downgrade+0x6d0/0x6d0 [ 781.853120] ? mark_held_locks+0x9e/0xe0 [ 781.853633] alloc_pages_vma+0xbb/0x410 [ 781.854131] handle_mm_fault+0x152f/0x3500 [ 781.854664] ? do_raw_spin_lock+0x121/0x260 [ 781.855206] ? rwlock_bug.part.0+0x90/0x90 [ 781.855732] ? __pmd_alloc+0x630/0x630 [ 781.856238] __get_user_pages+0x6ec/0x1620 [ 781.856775] ? follow_page_mask+0x1900/0x1900 [ 781.857334] ? down_read+0x10f/0x430 [ 781.857800] ? down_write+0x160/0x160 [ 781.858293] get_user_pages_unlocked+0x18a/0x690 [ 781.858888] ? internal_get_user_pages_fast+0xdce/0x2640 [ 781.859576] ? pin_user_pages_locked+0x7b0/0x7b0 [ 781.860186] internal_get_user_pages_fast+0x175f/0x2640 [ 781.860882] ? pin_user_pages_unlocked+0x80/0x80 [ 781.861476] ? trace_hardirqs_on+0x5b/0x180 [ 781.862015] get_user_pages_fast+0x66/0xa0 [ 781.862550] iov_iter_get_pages+0x297/0xf40 [ 781.863099] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 781.863721] ? mempool_resize+0x7d0/0x7d0 [ 781.863855] FAULT_INJECTION: forcing a failure. [ 781.863855] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 781.864252] bio_iov_iter_get_pages+0x22a/0x1200 [ 781.867322] ? bvec_alloc+0x17e/0x2f0 [ 781.867805] ? bio_alloc_bioset+0x2a1/0x600 [ 781.868344] ? bio_add_pc_page+0x100/0x100 [ 781.868869] ? bvec_alloc+0x290/0x2f0 [ 781.869336] ? iov_iter_npages+0x1fd/0xa70 [ 781.869857] ? ext4_iomap_begin+0x1a0/0x700 [ 781.870393] iomap_dio_bio_actor+0x77a/0xef0 [ 781.870955] iomap_dio_actor+0x36f/0x560 [ 781.871464] iomap_apply+0x289/0x810 [ 781.871932] ? iomap_dio_rw+0x90/0x90 [ 781.872403] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 781.873125] ? delete_from_page_cache_batch+0xa30/0xa30 [ 781.873791] ? mark_held_locks+0x9e/0xe0 [ 781.874300] ? filemap_check_errors+0xa5/0x150 [ 781.874873] __iomap_dio_rw+0x6cd/0x1110 [ 781.875383] ? iomap_dio_rw+0x90/0x90 [ 781.875866] ? iomap_dio_bio_actor+0xef0/0xef0 [ 781.876437] ? down_read+0x10f/0x430 [ 781.876903] ? down_write+0x160/0x160 [ 781.877383] iomap_dio_rw+0x31/0x90 [ 781.877838] ext4_file_read_iter+0x2c7/0x4c0 [ 781.878384] new_sync_read+0x424/0x6f0 [ 781.878864] ? ksys_lseek+0x1b0/0x1b0 [ 781.879357] ? fsnotify_perm.part.0+0x22d/0x620 [ 781.879935] ? security_file_permission+0xb1/0xe0 [ 781.880539] vfs_read+0x4da/0x620 [ 781.880973] ksys_read+0x12d/0x260 [ 781.881419] ? vfs_write+0xb10/0xb10 [ 781.881882] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 781.882537] ? syscall_enter_from_user_mode+0x1d/0x50 [ 781.883183] do_syscall_64+0x33/0x40 [ 781.883649] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 781.884291] RIP: 0033:0x7fe6449f5b19 [ 781.884761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 781.887062] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 781.888008] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 781.888890] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 781.889767] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 781.890639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 781.891526] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 781.892440] CPU: 0 PID: 6496 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 781.893911] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 781.895680] Call Trace: [ 781.896254] dump_stack+0x107/0x167 [ 781.897033] should_fail.cold+0x5/0xa [ 781.897849] __alloc_pages_nodemask+0x182/0x600 [ 781.898839] ? add_mm_counter_fast+0x220/0x220 [ 781.899819] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 781.901107] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 781.902229] ? lock_downgrade+0x6d0/0x6d0 [ 781.903129] ? mark_held_locks+0x9e/0xe0 [ 781.904011] alloc_pages_vma+0xbb/0x410 [ 781.904868] handle_mm_fault+0x152f/0x3500 [ 781.905770] ? do_raw_spin_lock+0x121/0x260 [ 781.906687] ? rwlock_bug.part.0+0x90/0x90 [ 781.907592] ? __pmd_alloc+0x630/0x630 [ 781.908444] __get_user_pages+0x6ec/0x1620 [ 781.909346] ? follow_page_mask+0x1900/0x1900 [ 781.910299] ? down_read+0x10f/0x430 [ 781.911093] ? down_write+0x160/0x160 05:46:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 18) 05:46:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, 0x0, 0x0) [ 781.911911] get_user_pages_unlocked+0x18a/0x690 [ 781.913045] ? internal_get_user_pages_fast+0xdce/0x2640 [ 781.914202] ? pin_user_pages_locked+0x7b0/0x7b0 [ 781.915234] internal_get_user_pages_fast+0x175f/0x2640 [ 781.916395] ? pin_user_pages_unlocked+0x80/0x80 [ 781.917401] ? trace_hardirqs_on+0x5b/0x180 [ 781.918322] get_user_pages_fast+0x66/0xa0 [ 781.919239] iov_iter_get_pages+0x297/0xf40 [ 781.920162] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 781.921204] ? mempool_resize+0x7d0/0x7d0 [ 781.922096] bio_iov_iter_get_pages+0x22a/0x1200 [ 781.923125] ? bvec_alloc+0x17e/0x2f0 [ 781.923946] ? bio_alloc_bioset+0x2a1/0x600 [ 781.924862] ? bio_add_pc_page+0x100/0x100 [ 781.925759] ? bvec_alloc+0x290/0x2f0 [ 781.926568] ? iov_iter_npages+0x1fd/0xa70 [ 781.927475] ? ext4_iomap_begin+0x1a0/0x700 [ 781.928402] iomap_dio_bio_actor+0x77a/0xef0 [ 781.929352] iomap_dio_actor+0x36f/0x560 [ 781.930223] iomap_apply+0x289/0x810 [ 781.931029] ? iomap_dio_rw+0x90/0x90 [ 781.931840] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 781.933067] ? delete_from_page_cache_batch+0xa30/0xa30 [ 781.934198] ? mark_held_locks+0x9e/0xe0 [ 781.935079] ? filemap_check_errors+0xa5/0x150 [ 781.936058] __iomap_dio_rw+0x6cd/0x1110 [ 781.936917] ? iomap_dio_rw+0x90/0x90 [ 781.937741] ? iomap_dio_bio_actor+0xef0/0xef0 [ 781.938725] ? down_read+0x10f/0x430 [ 781.939522] ? down_write+0x160/0x160 [ 781.940334] iomap_dio_rw+0x31/0x90 [ 781.941105] ext4_file_read_iter+0x2c7/0x4c0 [ 781.942041] new_sync_read+0x424/0x6f0 [ 781.942866] ? ksys_lseek+0x1b0/0x1b0 [ 781.943704] ? fsnotify_perm.part.0+0x22d/0x620 [ 781.944699] ? security_file_permission+0xb1/0xe0 [ 781.945730] vfs_read+0x4da/0x620 [ 781.946474] ksys_read+0x12d/0x260 [ 781.947236] ? vfs_write+0xb10/0xb10 [ 781.948029] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 781.949350] ? syscall_enter_from_user_mode+0x1d/0x50 [ 781.950463] do_syscall_64+0x33/0x40 [ 781.951269] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 781.952353] RIP: 0033:0x7fb97f666b19 [ 781.953143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 781.957057] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 781.958675] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 781.960193] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 781.961713] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 781.963238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 781.964762] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:46:21 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 781.977042] loop4: detected capacity change from 0 to 41948160 [ 781.992687] FAULT_INJECTION: forcing a failure. [ 781.992687] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 781.995203] CPU: 0 PID: 6507 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 781.996777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 781.998543] Call Trace: [ 781.999119] dump_stack+0x107/0x167 [ 781.999896] should_fail.cold+0x5/0xa [ 782.000716] __alloc_pages_nodemask+0x182/0x600 [ 782.001706] ? add_mm_counter_fast+0x220/0x220 05:46:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x201b4000) [ 782.002681] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 782.004145] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 782.005256] ? lock_downgrade+0x6d0/0x6d0 [ 782.006130] ? mark_held_locks+0x9e/0xe0 [ 782.007016] alloc_pages_vma+0xbb/0x410 [ 782.007871] handle_mm_fault+0x152f/0x3500 [ 782.008768] ? do_raw_spin_lock+0x121/0x260 [ 782.009683] ? rwlock_bug.part.0+0x90/0x90 [ 782.010582] ? __pmd_alloc+0x630/0x630 [ 782.011445] __get_user_pages+0x6ec/0x1620 [ 782.012354] ? follow_page_mask+0x1900/0x1900 [ 782.013306] ? down_read+0x10f/0x430 [ 782.014100] ? down_write+0x160/0x160 [ 782.014922] get_user_pages_unlocked+0x18a/0x690 [ 782.015944] ? internal_get_user_pages_fast+0xdce/0x2640 [ 782.017094] ? pin_user_pages_locked+0x7b0/0x7b0 [ 782.018118] internal_get_user_pages_fast+0x175f/0x2640 [ 782.019292] ? pin_user_pages_unlocked+0x80/0x80 [ 782.020305] ? trace_hardirqs_on+0x5b/0x180 [ 782.021226] get_user_pages_fast+0x66/0xa0 [ 782.022128] iov_iter_get_pages+0x297/0xf40 [ 782.023057] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 782.024097] ? mempool_resize+0x7d0/0x7d0 [ 782.024987] bio_iov_iter_get_pages+0x22a/0x1200 [ 782.025998] ? bvec_alloc+0x17e/0x2f0 [ 782.026816] ? bio_alloc_bioset+0x2a1/0x600 [ 782.027738] ? bio_add_pc_page+0x100/0x100 [ 782.028636] ? bvec_alloc+0x290/0x2f0 [ 782.029446] ? iov_iter_npages+0x1fd/0xa70 [ 782.030346] ? ext4_iomap_begin+0x1a0/0x700 [ 782.031281] iomap_dio_bio_actor+0x77a/0xef0 [ 782.032234] iomap_dio_actor+0x36f/0x560 [ 782.033107] iomap_apply+0x289/0x810 [ 782.033904] ? iomap_dio_rw+0x90/0x90 [ 782.034717] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 782.035962] ? delete_from_page_cache_batch+0xa30/0xa30 [ 782.037092] ? mark_held_locks+0x9e/0xe0 [ 782.037969] ? filemap_check_errors+0xa5/0x150 [ 782.038960] __iomap_dio_rw+0x6cd/0x1110 [ 782.039833] ? iomap_dio_rw+0x90/0x90 [ 782.040661] ? iomap_dio_bio_actor+0xef0/0xef0 [ 782.041642] ? down_read+0x10f/0x430 [ 782.042433] ? down_write+0x160/0x160 [ 782.043257] iomap_dio_rw+0x31/0x90 [ 782.044036] ext4_file_read_iter+0x2c7/0x4c0 [ 782.044971] new_sync_read+0x424/0x6f0 [ 782.045803] ? ksys_lseek+0x1b0/0x1b0 [ 782.046632] ? fsnotify_perm.part.0+0x22d/0x620 [ 782.047634] ? security_file_permission+0xb1/0xe0 [ 782.048675] vfs_read+0x4da/0x620 [ 782.049428] ksys_read+0x12d/0x260 [ 782.050183] ? vfs_write+0xb10/0xb10 [ 782.050990] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 782.052103] ? syscall_enter_from_user_mode+0x1d/0x50 [ 782.053203] do_syscall_64+0x33/0x40 [ 782.054002] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 782.055099] RIP: 0033:0x7f8e866d3b19 [ 782.055889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 782.059809] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 782.061425] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 782.062948] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 782.064474] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 782.065991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 782.067533] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 782.080736] wlan1: mtu greater than device maximum [ 782.110207] FAULT_INJECTION: forcing a failure. [ 782.110207] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 782.111721] CPU: 1 PID: 6518 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 782.112506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 782.113454] Call Trace: [ 782.113770] dump_stack+0x107/0x167 [ 782.114189] should_fail.cold+0x5/0xa [ 782.114637] __alloc_pages_nodemask+0x182/0x600 [ 782.115181] ? add_mm_counter_fast+0x220/0x220 [ 782.115712] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 782.116406] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 782.117008] ? lock_downgrade+0x6d0/0x6d0 [ 782.117483] ? mark_held_locks+0x9e/0xe0 [ 782.117962] alloc_pages_vma+0xbb/0x410 [ 782.118419] handle_mm_fault+0x152f/0x3500 [ 782.118912] ? do_raw_spin_lock+0x121/0x260 [ 782.119416] ? rwlock_bug.part.0+0x90/0x90 [ 782.119904] ? __pmd_alloc+0x630/0x630 [ 782.120362] __get_user_pages+0x6ec/0x1620 [ 782.120852] ? follow_page_mask+0x1900/0x1900 [ 782.121368] ? down_read+0x10f/0x430 [ 782.121795] ? down_write+0x160/0x160 [ 782.122245] get_user_pages_unlocked+0x18a/0x690 [ 782.122796] ? internal_get_user_pages_fast+0xdce/0x2640 [ 782.123428] ? pin_user_pages_locked+0x7b0/0x7b0 [ 782.123976] internal_get_user_pages_fast+0x175f/0x2640 [ 782.124600] ? pin_user_pages_unlocked+0x80/0x80 [ 782.125144] ? trace_hardirqs_on+0x5b/0x180 [ 782.125640] get_user_pages_fast+0x66/0xa0 [ 782.126131] iov_iter_get_pages+0x297/0xf40 [ 782.126630] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 782.127196] ? mempool_resize+0x7d0/0x7d0 [ 782.127678] bio_iov_iter_get_pages+0x22a/0x1200 [ 782.128225] ? bvec_alloc+0x17e/0x2f0 [ 782.128667] ? bio_alloc_bioset+0x2a1/0x600 [ 782.129163] ? bio_add_pc_page+0x100/0x100 [ 782.129645] ? bvec_alloc+0x290/0x2f0 [ 782.130085] ? iov_iter_npages+0x1fd/0xa70 [ 782.130579] ? ext4_iomap_begin+0x1a0/0x700 [ 782.131090] iomap_dio_bio_actor+0x77a/0xef0 [ 782.131603] iomap_dio_actor+0x36f/0x560 [ 782.132069] iomap_apply+0x289/0x810 [ 782.132493] ? iomap_dio_rw+0x90/0x90 [ 782.132926] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 782.133585] ? delete_from_page_cache_batch+0xa30/0xa30 [ 782.134200] ? mark_held_locks+0x9e/0xe0 [ 782.134673] ? filemap_check_errors+0xa5/0x150 [ 782.135217] __iomap_dio_rw+0x6cd/0x1110 [ 782.135684] ? iomap_dio_rw+0x90/0x90 [ 782.136135] ? iomap_dio_bio_actor+0xef0/0xef0 [ 782.136664] ? down_read+0x10f/0x430 [ 782.137088] ? down_write+0x160/0x160 [ 782.137533] iomap_dio_rw+0x31/0x90 [ 782.137955] ext4_file_read_iter+0x2c7/0x4c0 [ 782.138465] new_sync_read+0x424/0x6f0 [ 782.138915] ? ksys_lseek+0x1b0/0x1b0 [ 782.139369] ? fsnotify_perm.part.0+0x22d/0x620 [ 782.139900] ? security_file_permission+0xb1/0xe0 [ 782.140458] vfs_read+0x4da/0x620 [ 782.140860] ksys_read+0x12d/0x260 [ 782.141267] ? vfs_write+0xb10/0xb10 [ 782.141699] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 782.142302] ? syscall_enter_from_user_mode+0x1d/0x50 [ 782.142896] do_syscall_64+0x33/0x40 [ 782.143334] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 782.143917] RIP: 0033:0x7fe6449f5b19 [ 782.144343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 782.146451] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 782.147335] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 782.148154] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 782.148971] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 782.149788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 782.150600] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:46:21 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:46:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 19) [ 793.389932] FAULT_INJECTION: forcing a failure. [ 793.389932] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 793.392527] CPU: 0 PID: 6528 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 793.393978] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 793.395760] Call Trace: [ 793.396323] dump_stack+0x107/0x167 [ 793.397100] should_fail.cold+0x5/0xa [ 793.397914] __alloc_pages_nodemask+0x182/0x600 [ 793.398751] loop4: detected capacity change from 0 to 41948160 [ 793.398905] ? add_mm_counter_fast+0x220/0x220 [ 793.400646] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 793.401925] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 793.403032] ? lock_downgrade+0x6d0/0x6d0 [ 793.403937] ? mark_held_locks+0x9e/0xe0 [ 793.404801] alloc_pages_vma+0xbb/0x410 [ 793.405647] handle_mm_fault+0x152f/0x3500 [ 793.406539] ? do_raw_spin_lock+0x121/0x260 [ 793.407474] ? rwlock_bug.part.0+0x90/0x90 [ 793.408368] ? __pmd_alloc+0x630/0x630 [ 793.409217] __get_user_pages+0x6ec/0x1620 [ 793.410129] ? follow_page_mask+0x1900/0x1900 [ 793.411095] ? down_read+0x10f/0x430 [ 793.411899] ? down_write+0x160/0x160 [ 793.412716] get_user_pages_unlocked+0x18a/0x690 [ 793.413719] ? internal_get_user_pages_fast+0xdce/0x2640 [ 793.414862] ? pin_user_pages_locked+0x7b0/0x7b0 [ 793.415918] internal_get_user_pages_fast+0x175f/0x2640 [ 793.417077] ? pin_user_pages_unlocked+0x80/0x80 [ 793.418087] ? trace_hardirqs_on+0x5b/0x180 [ 793.419007] get_user_pages_fast+0x66/0xa0 [ 793.419934] iov_iter_get_pages+0x297/0xf40 [ 793.420858] ? csum_and_copy_to_iter+0x14a0/0x14a0 05:46:32 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8923, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:46:32 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 20) 05:46:32 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:46:32 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = eventfd(0x8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) read(r0, &(0x7f00000000c0)=""/102400, 0x19000) 05:46:32 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 19) 05:46:32 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 18) 05:46:32 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x28000, 0x0) read(r0, &(0x7f00000000c0)=""/102386, 0xfffffffffffffe85) syz_io_uring_setup(0x397, &(0x7f0000000000)={0x0, 0xad46, 0x4, 0x2, 0x1f3}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x5000)=nil, &(0x7f00000190c0)=0x0, &(0x7f0000019100)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r3}}, 0x9) syz_io_uring_submit(r1, r4, &(0x7f0000019180)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, r0, 0x0, &(0x7f0000019140)='./file0\x00', 0x1, 0x200100, 0x77af82679de8c60c}, 0x8) 05:46:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, 0x0, 0x0) [ 793.421893] ? mempool_resize+0x7d0/0x7d0 [ 793.423003] bio_iov_iter_get_pages+0x22a/0x1200 [ 793.424041] ? bvec_alloc+0x17e/0x2f0 [ 793.424872] ? bio_alloc_bioset+0x2a1/0x600 [ 793.425802] ? bio_add_pc_page+0x100/0x100 [ 793.426713] ? bvec_alloc+0x290/0x2f0 [ 793.427566] ? iov_iter_npages+0x1fd/0xa70 [ 793.428475] ? ext4_iomap_begin+0x1a0/0x700 [ 793.429412] iomap_dio_bio_actor+0x77a/0xef0 [ 793.430375] iomap_dio_actor+0x36f/0x560 [ 793.431277] iomap_apply+0x289/0x810 [ 793.432081] ? iomap_dio_rw+0x90/0x90 [ 793.432908] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 793.434153] ? delete_from_page_cache_batch+0xa30/0xa30 [ 793.435332] ? mark_held_locks+0x9e/0xe0 [ 793.436218] ? filemap_check_errors+0xa5/0x150 [ 793.437207] __iomap_dio_rw+0x6cd/0x1110 [ 793.438081] ? iomap_dio_rw+0x90/0x90 [ 793.438920] ? iomap_dio_bio_actor+0xef0/0xef0 [ 793.439938] ? down_read+0x10f/0x430 [ 793.440738] ? down_write+0x160/0x160 [ 793.441563] iomap_dio_rw+0x31/0x90 [ 793.442354] ext4_file_read_iter+0x2c7/0x4c0 [ 793.442698] FAULT_INJECTION: forcing a failure. [ 793.442698] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 793.443329] new_sync_read+0x424/0x6f0 [ 793.443354] ? ksys_lseek+0x1b0/0x1b0 [ 793.446416] ? fsnotify_perm.part.0+0x22d/0x620 [ 793.447446] ? security_file_permission+0xb1/0xe0 [ 793.448494] vfs_read+0x4da/0x620 [ 793.449245] ksys_read+0x12d/0x260 [ 793.450009] ? vfs_write+0xb10/0xb10 [ 793.450814] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 793.451972] ? syscall_enter_from_user_mode+0x1d/0x50 [ 793.453084] do_syscall_64+0x33/0x40 [ 793.453884] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 793.454989] RIP: 0033:0x7f8e866d3b19 [ 793.455814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 793.459787] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 793.461439] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 793.462982] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 793.464540] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 793.466063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 793.467609] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 793.469158] CPU: 1 PID: 6537 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 793.470079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 793.471062] Call Trace: [ 793.471409] dump_stack+0x107/0x167 [ 793.471879] should_fail.cold+0x5/0xa [ 793.472354] __alloc_pages_nodemask+0x182/0x600 [ 793.472924] ? add_mm_counter_fast+0x220/0x220 [ 793.473486] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 793.474230] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 793.474882] ? lock_downgrade+0x6d0/0x6d0 [ 793.475403] ? mark_held_locks+0x9e/0xe0 [ 793.475907] alloc_pages_vma+0xbb/0x410 [ 793.476405] handle_mm_fault+0x152f/0x3500 [ 793.476932] ? do_raw_spin_lock+0x121/0x260 [ 793.477468] ? rwlock_bug.part.0+0x90/0x90 [ 793.477988] ? __pmd_alloc+0x630/0x630 [ 793.478465] __get_user_pages+0x6ec/0x1620 [ 793.478987] ? follow_page_mask+0x1900/0x1900 [ 793.479557] ? down_read+0x10f/0x430 [ 793.480002] ? down_write+0x160/0x160 [ 793.480474] get_user_pages_unlocked+0x18a/0x690 [ 793.481053] ? internal_get_user_pages_fast+0xdce/0x2640 [ 793.481697] ? pin_user_pages_locked+0x7b0/0x7b0 [ 793.482280] internal_get_user_pages_fast+0x175f/0x2640 [ 793.482950] ? pin_user_pages_unlocked+0x80/0x80 [ 793.483547] ? trace_hardirqs_on+0x5b/0x180 [ 793.484085] get_user_pages_fast+0x66/0xa0 [ 793.484608] iov_iter_get_pages+0x297/0xf40 [ 793.485140] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 793.485742] ? mempool_resize+0x7d0/0x7d0 [ 793.486261] bio_iov_iter_get_pages+0x22a/0x1200 [ 793.486846] ? bvec_alloc+0x17e/0x2f0 [ 793.487327] ? bio_alloc_bioset+0x2a1/0x600 [ 793.487849] ? bio_add_pc_page+0x100/0x100 [ 793.488351] ? bvec_alloc+0x290/0x2f0 [ 793.488817] ? iov_iter_npages+0x1fd/0xa70 [ 793.489328] ? ext4_iomap_begin+0x1a0/0x700 [ 793.489842] iomap_dio_bio_actor+0x77a/0xef0 [ 793.490410] iomap_dio_actor+0x36f/0x560 [ 793.490909] iomap_apply+0x289/0x810 [ 793.491368] ? iomap_dio_rw+0x90/0x90 [ 793.491832] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 793.492534] ? delete_from_page_cache_batch+0xa30/0xa30 [ 793.493186] ? mark_held_locks+0x9e/0xe0 [ 793.493692] ? filemap_check_errors+0xa5/0x150 [ 793.494265] __iomap_dio_rw+0x6cd/0x1110 [ 793.494762] ? iomap_dio_rw+0x90/0x90 [ 793.495250] ? iomap_dio_bio_actor+0xef0/0xef0 [ 793.495809] ? down_read+0x10f/0x430 [ 793.496257] ? down_write+0x160/0x160 [ 793.496707] iomap_dio_rw+0x31/0x90 [ 793.497150] ext4_file_read_iter+0x2c7/0x4c0 [ 793.497687] new_sync_read+0x424/0x6f0 [ 793.498167] ? ksys_lseek+0x1b0/0x1b0 [ 793.498642] ? fsnotify_perm.part.0+0x22d/0x620 [ 793.499222] ? security_file_permission+0xb1/0xe0 [ 793.499799] vfs_read+0x4da/0x620 [ 793.500230] ksys_read+0x12d/0x260 [ 793.500668] ? vfs_write+0xb10/0xb10 [ 793.501110] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 793.501760] ? syscall_enter_from_user_mode+0x1d/0x50 [ 793.502366] do_syscall_64+0x33/0x40 [ 793.502824] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 793.503432] RIP: 0033:0x7fe6449f5b19 [ 793.503891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 793.506148] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 793.507091] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 793.507928] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 793.508800] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 793.509679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 793.510551] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:46:32 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x2, 0x111) read(r0, &(0x7f0000000000), 0x1b4000) 05:46:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) 05:46:32 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8924, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 793.514284] FAULT_INJECTION: forcing a failure. [ 793.514284] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 793.516974] CPU: 0 PID: 6540 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 793.518415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 793.520229] Call Trace: [ 793.520794] dump_stack+0x107/0x167 [ 793.521582] should_fail.cold+0x5/0xa [ 793.522402] __alloc_pages_nodemask+0x182/0x600 [ 793.523643] ? add_mm_counter_fast+0x220/0x220 [ 793.524637] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 793.525945] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 793.527074] ? lock_downgrade+0x6d0/0x6d0 [ 793.528002] ? mark_held_locks+0x9e/0xe0 [ 793.528878] alloc_pages_vma+0xbb/0x410 [ 793.529740] handle_mm_fault+0x152f/0x3500 [ 793.530655] ? do_raw_spin_lock+0x121/0x260 [ 793.531584] ? rwlock_bug.part.0+0x90/0x90 [ 793.532488] ? __pmd_alloc+0x630/0x630 [ 793.533359] __get_user_pages+0x6ec/0x1620 [ 793.534281] ? follow_page_mask+0x1900/0x1900 [ 793.535273] ? down_read+0x10f/0x430 [ 793.536086] ? down_write+0x160/0x160 [ 793.536913] get_user_pages_unlocked+0x18a/0x690 [ 793.537935] ? internal_get_user_pages_fast+0xdce/0x2640 [ 793.539111] ? pin_user_pages_locked+0x7b0/0x7b0 [ 793.540155] internal_get_user_pages_fast+0x175f/0x2640 [ 793.541323] ? pin_user_pages_unlocked+0x80/0x80 [ 793.542325] ? trace_hardirqs_on+0x5b/0x180 [ 793.543285] get_user_pages_fast+0x66/0xa0 [ 793.544184] iov_iter_get_pages+0x297/0xf40 [ 793.545112] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 793.546167] ? mempool_resize+0x7d0/0x7d0 [ 793.547062] bio_iov_iter_get_pages+0x22a/0x1200 [ 793.548092] ? bvec_alloc+0x17e/0x2f0 [ 793.548896] ? bio_alloc_bioset+0x2a1/0x600 [ 793.549808] ? bio_add_pc_page+0x100/0x100 [ 793.550704] ? bvec_alloc+0x290/0x2f0 [ 793.551525] ? iov_iter_npages+0x1fd/0xa70 [ 793.552418] ? ext4_iomap_begin+0x1a0/0x700 [ 793.553333] iomap_dio_bio_actor+0x77a/0xef0 [ 793.554279] iomap_dio_actor+0x36f/0x560 [ 793.555152] iomap_apply+0x289/0x810 [ 793.555949] ? iomap_dio_rw+0x90/0x90 [ 793.556765] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 793.557989] ? delete_from_page_cache_batch+0xa30/0xa30 [ 793.559154] ? mark_held_locks+0x9e/0xe0 [ 793.560041] ? filemap_check_errors+0xa5/0x150 [ 793.561020] __iomap_dio_rw+0x6cd/0x1110 [ 793.561876] ? iomap_dio_rw+0x90/0x90 [ 793.562702] ? iomap_dio_bio_actor+0xef0/0xef0 [ 793.563706] ? down_read+0x10f/0x430 [ 793.564497] ? down_write+0x160/0x160 [ 793.565315] iomap_dio_rw+0x31/0x90 [ 793.566092] ext4_file_read_iter+0x2c7/0x4c0 [ 793.567031] new_sync_read+0x424/0x6f0 [ 793.567888] ? ksys_lseek+0x1b0/0x1b0 [ 793.568714] ? fsnotify_perm.part.0+0x22d/0x620 [ 793.569704] ? security_file_permission+0xb1/0xe0 [ 793.570737] vfs_read+0x4da/0x620 [ 793.571519] ksys_read+0x12d/0x260 [ 793.572282] ? vfs_write+0xb10/0xb10 [ 793.573079] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 793.574192] ? syscall_enter_from_user_mode+0x1d/0x50 [ 793.575303] do_syscall_64+0x33/0x40 [ 793.576099] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 793.577179] RIP: 0033:0x7fb97f666b19 [ 793.577966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 793.581867] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 793.583506] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 793.585017] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 793.586527] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 793.588063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 793.589578] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:46:33 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xb1f1080abee7afe6, 0x90) read(r0, &(0x7f0000000000), 0x1b4000) 05:46:33 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 21) 05:46:33 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 20) 05:46:33 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8927, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:46:33 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 793.673323] loop4: detected capacity change from 0 to 41948160 [ 793.701657] FAULT_INJECTION: forcing a failure. [ 793.701657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 793.704373] CPU: 0 PID: 6554 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 793.705858] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 793.707674] Call Trace: [ 793.708246] dump_stack+0x107/0x167 [ 793.709036] should_fail.cold+0x5/0xa [ 793.709866] __alloc_pages_nodemask+0x182/0x600 [ 793.710875] ? add_mm_counter_fast+0x220/0x220 [ 793.711892] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 793.713192] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 793.714327] ? lock_downgrade+0x6d0/0x6d0 [ 793.715257] ? mark_held_locks+0x9e/0xe0 [ 793.716136] alloc_pages_vma+0xbb/0x410 [ 793.717000] handle_mm_fault+0x152f/0x3500 [ 793.717911] ? do_raw_spin_lock+0x121/0x260 [ 793.718837] ? rwlock_bug.part.0+0x90/0x90 [ 793.719779] ? __pmd_alloc+0x630/0x630 [ 793.720642] __get_user_pages+0x6ec/0x1620 [ 793.721566] ? follow_page_mask+0x1900/0x1900 [ 793.722534] ? down_read+0x10f/0x430 [ 793.723360] ? down_write+0x160/0x160 [ 793.724196] get_user_pages_unlocked+0x18a/0x690 [ 793.725221] ? internal_get_user_pages_fast+0xdce/0x2640 [ 793.726389] ? pin_user_pages_locked+0x7b0/0x7b0 [ 793.727460] internal_get_user_pages_fast+0x175f/0x2640 [ 793.728640] ? pin_user_pages_unlocked+0x80/0x80 [ 793.729662] ? trace_hardirqs_on+0x5b/0x180 [ 793.730593] get_user_pages_fast+0x66/0xa0 [ 793.731535] iov_iter_get_pages+0x297/0xf40 [ 793.732474] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 793.733532] ? mempool_resize+0x7d0/0x7d0 [ 793.734437] bio_iov_iter_get_pages+0x22a/0x1200 [ 793.735495] ? bvec_alloc+0x17e/0x2f0 [ 793.736324] ? bio_alloc_bioset+0x2a1/0x600 [ 793.737251] ? bio_add_pc_page+0x100/0x100 [ 793.738164] ? bvec_alloc+0x290/0x2f0 [ 793.738989] ? iov_iter_npages+0x1fd/0xa70 [ 793.739934] ? ext4_iomap_begin+0x1a0/0x700 [ 793.740872] iomap_dio_bio_actor+0x77a/0xef0 [ 793.741838] iomap_dio_actor+0x36f/0x560 [ 793.742720] iomap_apply+0x289/0x810 [ 793.743553] ? iomap_dio_rw+0x90/0x90 [ 793.744382] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 793.745630] ? delete_from_page_cache_batch+0xa30/0xa30 [ 793.746776] ? mark_held_locks+0x9e/0xe0 [ 793.747692] ? filemap_check_errors+0xa5/0x150 [ 793.748685] __iomap_dio_rw+0x6cd/0x1110 [ 793.749562] ? iomap_dio_rw+0x90/0x90 [ 793.750403] ? iomap_dio_bio_actor+0xef0/0xef0 [ 793.751429] ? down_read+0x10f/0x430 [ 793.752233] ? down_write+0x160/0x160 [ 793.753065] iomap_dio_rw+0x31/0x90 [ 793.753856] ext4_file_read_iter+0x2c7/0x4c0 [ 793.754812] new_sync_read+0x424/0x6f0 [ 793.755682] ? ksys_lseek+0x1b0/0x1b0 [ 793.756526] ? fsnotify_perm.part.0+0x22d/0x620 [ 793.757534] ? security_file_permission+0xb1/0xe0 [ 793.758585] vfs_read+0x4da/0x620 [ 793.759369] ksys_read+0x12d/0x260 [ 793.760140] ? vfs_write+0xb10/0xb10 [ 793.760949] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 793.762082] ? syscall_enter_from_user_mode+0x1d/0x50 [ 793.763234] do_syscall_64+0x33/0x40 [ 793.764037] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 793.765143] RIP: 0033:0x7fe6449f5b19 [ 793.765944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 793.769929] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 793.771605] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 793.773140] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 793.774679] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 793.776248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 793.777790] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 793.805048] FAULT_INJECTION: forcing a failure. [ 793.805048] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 793.806490] CPU: 1 PID: 6561 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 793.807334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 793.808342] Call Trace: [ 793.808670] dump_stack+0x107/0x167 [ 793.809109] should_fail.cold+0x5/0xa [ 793.809552] __alloc_pages_nodemask+0x182/0x600 [ 793.810114] ? add_mm_counter_fast+0x220/0x220 [ 793.810639] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 793.811371] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 793.812005] ? lock_downgrade+0x6d0/0x6d0 [ 793.812504] ? mark_held_locks+0x9e/0xe0 [ 793.812972] alloc_pages_vma+0xbb/0x410 [ 793.813455] handle_mm_fault+0x152f/0x3500 [ 793.813945] ? do_raw_spin_lock+0x121/0x260 [ 793.814457] ? rwlock_bug.part.0+0x90/0x90 [ 793.814947] ? __pmd_alloc+0x630/0x630 [ 793.815438] __get_user_pages+0x6ec/0x1620 [ 793.815933] ? follow_page_mask+0x1900/0x1900 [ 793.816467] ? down_read+0x10f/0x430 [ 793.816895] ? down_write+0x160/0x160 [ 793.817361] get_user_pages_unlocked+0x18a/0x690 [ 793.817924] ? internal_get_user_pages_fast+0xdce/0x2640 [ 793.818583] ? pin_user_pages_locked+0x7b0/0x7b0 [ 793.819147] internal_get_user_pages_fast+0x175f/0x2640 [ 793.819799] ? pin_user_pages_unlocked+0x80/0x80 [ 793.820358] ? trace_hardirqs_on+0x5b/0x180 [ 793.820883] get_user_pages_fast+0x66/0xa0 [ 793.821391] iov_iter_get_pages+0x297/0xf40 [ 793.821907] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 793.822500] ? mempool_resize+0x7d0/0x7d0 [ 793.822998] bio_iov_iter_get_pages+0x22a/0x1200 [ 793.823575] ? bvec_alloc+0x17e/0x2f0 [ 793.824028] ? bio_alloc_bioset+0x2a1/0x600 [ 793.824540] ? bio_add_pc_page+0x100/0x100 [ 793.825054] ? bvec_alloc+0x290/0x2f0 [ 793.825511] ? iov_iter_npages+0x1fd/0xa70 [ 793.826025] ? ext4_iomap_begin+0x1a0/0x700 [ 793.826546] iomap_dio_bio_actor+0x77a/0xef0 [ 793.827079] iomap_dio_actor+0x36f/0x560 [ 793.827570] iomap_apply+0x289/0x810 [ 793.828017] ? iomap_dio_rw+0x90/0x90 [ 793.828476] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 793.829168] ? delete_from_page_cache_batch+0xa30/0xa30 [ 793.829813] ? mark_held_locks+0x9e/0xe0 [ 793.830331] ? filemap_check_errors+0xa5/0x150 [ 793.830885] __iomap_dio_rw+0x6cd/0x1110 [ 793.831372] ? iomap_dio_rw+0x90/0x90 [ 793.831843] ? iomap_dio_bio_actor+0xef0/0xef0 [ 793.832388] ? down_read+0x10f/0x430 [ 793.832829] ? down_write+0x160/0x160 [ 793.833288] iomap_dio_rw+0x31/0x90 [ 793.833726] ext4_file_read_iter+0x2c7/0x4c0 [ 793.834271] new_sync_read+0x424/0x6f0 [ 793.834739] ? ksys_lseek+0x1b0/0x1b0 [ 793.835219] ? fsnotify_perm.part.0+0x22d/0x620 [ 793.835779] ? security_file_permission+0xb1/0xe0 [ 793.836360] vfs_read+0x4da/0x620 [ 793.836778] ksys_read+0x12d/0x260 [ 793.837201] ? vfs_write+0xb10/0xb10 [ 793.837651] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 793.838275] ? syscall_enter_from_user_mode+0x1d/0x50 [ 793.838893] do_syscall_64+0x33/0x40 [ 793.839349] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 793.839957] RIP: 0033:0x7f8e866d3b19 [ 793.840401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 793.842588] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 793.843513] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 793.844357] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 793.845218] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 793.846077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 793.846926] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 05:46:33 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000000)) 05:46:33 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) getsockname(r0, &(0x7f0000000580)=@x25={0x9, @remote}, &(0x7f0000000600)=0x80) r4 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x4, &(0x7f0000000440)=[{&(0x7f00000000c0)="682e3c403c78b5362e4d8a2fefca47b3568a421055e9a3faa9184d9090a5e10195a7077df6cc5963a03e0dd9df8e94a7056f87bdcee933926a99117130513b61068d3fb5adf179945a76900c6a6600f618d098c004d8fc577b0d8f0888077c43fbd36fe5ea047226584fe415821700495abdad12ea2563f272ee267ce1dd9794f621d59c714e746616e0ab7526229da92b5fe069ee00e0924dce9df57c871c04e54a52e6a11d4b83d264687d906a6f5c6ccacd5110ec249380cae90307cf4a8744f99a750e0f9b35911d0098028376b4671304dc7b5aa774307a97bada03eeff64315a24f27a9036b43b1cf5a7e2876db66157406fa8c8fd5a", 0xf9, 0x7}, {&(0x7f00000001c0)="6aecad2d6463ece67f5865e8a246a179abf6972a0d09cf9325f0177a8d39cfa0f4f763978bdcefb6d0bf3a534a258de2f7ee12ab53672cd271421365036c4530061ab0c68429f7c0e5988876d8e94064359ad05a6cb0fe05fd2df0ec4211801c3d39", 0x62, 0x4}, {&(0x7f0000000240)="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", 0xfc, 0x1}, {&(0x7f0000000340)="b68ac4d6a77f49bc00a54852bc497c58018953460eeb44464e23eab8d5018ed4c4f76943e69a8084a4651a1f824f8db9442914d1e585c3ce3037ae39ac6daf7607366d2e9962287b4eb9a598a5161f39ed5e0b35a4ebb540cbde265c1bc10d05f85f15a5487ae00f8bec04177cd04c277d3d15c45402ac624c7d498340525d1c13fca73eab595d20110a5f2c2916928f7adfd224162422cab659b66515a37afcc070ac1a945dd54640721539047e4d61b159d779ff7c557ed2e98f9cb5a38a5e841d282a2581d2fe8189f6dbc7841d6eb0f4e353e2430aa9c4939da9dc82bc", 0xdf, 0x80}], 0x841042, &(0x7f00000004c0)={[{@huge_within_size}, {@huge_within_size}, {@huge_never}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x31, 0x2c, 0xf469a6862427817f, 0x36]}}}}, {@size={'size', 0x3d, [0x36, 0x30, 0x35, 0x78, 0x32, 0x39, 0x2]}}, {@huge_advise}, {@mpol={'mpol', 0x3d, {'local', '=static', @void}}}, {@uid={'uid', 0x3d, 0xee01}}], [{@fsname}]}) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) 05:46:33 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8929, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:46:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 22) 05:46:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 21) 05:46:45 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8930, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:46:45 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:46:45 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) dup3(r0, r0, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r2, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r1, r2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x266b, 0x959, 0x2, 0x7fff}) 05:46:45 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 19) 05:46:45 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x10f100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = pidfd_getfd(r0, r0, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000000)=0x180000000000000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r4, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r3, r4) readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/9, 0x9}, {&(0x7f0000000280)=""/230, 0xe6}, {&(0x7f0000000380)=""/12, 0xc}], 0x3) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x8, 0x1f, 0xf7, 0x0, 0x0, 0x5, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0xa100, 0xd4, 0x1, 0x1, 0x0, 0x5d, 0x8, 0x0, 0x7fffffff, 0x0, 0x5}, 0xffffffffffffffff, 0x5, r2, 0x2) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = signalfd4(r5, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r7, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r6}}, 0x9) copy_file_range(r1, 0x0, r6, &(0x7f00000000c0)=0xfffffffffffffffe, 0x796, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000040)={r2}) 05:46:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x0, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 806.351722] FAULT_INJECTION: forcing a failure. [ 806.351722] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 806.354612] CPU: 1 PID: 6581 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 806.356059] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 806.357819] Call Trace: [ 806.358383] dump_stack+0x107/0x167 [ 806.359150] should_fail.cold+0x5/0xa [ 806.359969] __alloc_pages_nodemask+0x182/0x600 [ 806.360970] ? add_mm_counter_fast+0x220/0x220 [ 806.361931] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 806.363202] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 806.364317] ? lock_downgrade+0x6d0/0x6d0 [ 806.365189] ? mark_held_locks+0x9e/0xe0 [ 806.366052] alloc_pages_vma+0xbb/0x410 [ 806.366898] handle_mm_fault+0x152f/0x3500 [ 806.367806] ? do_raw_spin_lock+0x121/0x260 [ 806.368716] ? rwlock_bug.part.0+0x90/0x90 [ 806.369613] ? __pmd_alloc+0x630/0x630 [ 806.370468] __get_user_pages+0x6ec/0x1620 [ 806.371383] ? follow_page_mask+0x1900/0x1900 [ 806.372342] ? down_read+0x10f/0x430 [ 806.373123] ? down_write+0x160/0x160 [ 806.373940] get_user_pages_unlocked+0x18a/0x690 [ 806.374940] ? internal_get_user_pages_fast+0xdce/0x2640 [ 806.376077] ? pin_user_pages_locked+0x7b0/0x7b0 [ 806.377083] internal_get_user_pages_fast+0x175f/0x2640 [ 806.378220] ? pin_user_pages_unlocked+0x80/0x80 [ 806.379200] ? trace_hardirqs_on+0x5b/0x180 [ 806.380121] get_user_pages_fast+0x66/0xa0 [ 806.381020] iov_iter_get_pages+0x297/0xf40 [ 806.381920] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 806.382925] ? mempool_resize+0x7d0/0x7d0 [ 806.383814] bio_iov_iter_get_pages+0x22a/0x1200 [ 806.384831] ? bvec_alloc+0x17e/0x2f0 [ 806.385625] ? bio_alloc_bioset+0x2a1/0x600 [ 806.386515] ? bio_add_pc_page+0x100/0x100 [ 806.387405] ? bvec_alloc+0x290/0x2f0 [ 806.388206] ? iov_iter_npages+0x1fd/0xa70 [ 806.389075] ? ext4_iomap_begin+0x1a0/0x700 [ 806.389986] iomap_dio_bio_actor+0x77a/0xef0 [ 806.390912] iomap_dio_actor+0x36f/0x560 [ 806.391777] iomap_apply+0x289/0x810 [ 806.392559] ? iomap_dio_rw+0x90/0x90 [ 806.393345] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 806.394554] ? delete_from_page_cache_batch+0xa30/0xa30 [ 806.395666] ? mark_held_locks+0x9e/0xe0 [ 806.396743] ? filemap_check_errors+0xa5/0x150 [ 806.397805] __iomap_dio_rw+0x6cd/0x1110 [ 806.398646] ? iomap_dio_rw+0x90/0x90 [ 806.399688] ? iomap_dio_bio_actor+0xef0/0xef0 [ 806.400673] ? down_read+0x10f/0x430 [ 806.401448] ? down_write+0x160/0x160 [ 806.402237] iomap_dio_rw+0x31/0x90 [ 806.402993] ext4_file_read_iter+0x2c7/0x4c0 [ 806.403915] new_sync_read+0x424/0x6f0 [ 806.404735] ? ksys_lseek+0x1b0/0x1b0 [ 806.405534] ? fsnotify_perm.part.0+0x22d/0x620 [ 806.406714] ? security_file_permission+0xb1/0xe0 [ 806.407728] vfs_read+0x4da/0x620 [ 806.408443] ksys_read+0x12d/0x260 [ 806.409462] ? vfs_write+0xb10/0xb10 [ 806.410317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 806.411629] ? syscall_enter_from_user_mode+0x1d/0x50 [ 806.412786] do_syscall_64+0x33/0x40 [ 806.413556] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 806.414609] RIP: 0033:0x7fe6449f5b19 [ 806.415374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 806.419165] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 806.420744] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 806.422227] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 806.423709] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 806.425184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 806.426668] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 806.440352] FAULT_INJECTION: forcing a failure. [ 806.440352] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 806.443059] CPU: 0 PID: 6590 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 806.443610] FAULT_INJECTION: forcing a failure. [ 806.443610] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 806.444550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 806.444557] Call Trace: [ 806.444590] dump_stack+0x107/0x167 [ 806.444617] should_fail.cold+0x5/0xa [ 806.450797] __alloc_pages_nodemask+0x182/0x600 [ 806.451809] ? add_mm_counter_fast+0x220/0x220 [ 806.452797] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 806.454065] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 806.455180] ? lock_downgrade+0x6d0/0x6d0 [ 806.456089] ? mark_held_locks+0x9e/0xe0 [ 806.456957] alloc_pages_vma+0xbb/0x410 [ 806.457800] handle_mm_fault+0x152f/0x3500 [ 806.458694] ? do_raw_spin_lock+0x121/0x260 [ 806.459629] ? rwlock_bug.part.0+0x90/0x90 [ 806.460527] ? __pmd_alloc+0x630/0x630 [ 806.461382] __get_user_pages+0x6ec/0x1620 [ 806.462287] ? follow_page_mask+0x1900/0x1900 [ 806.463236] ? down_read+0x10f/0x430 [ 806.464051] ? down_write+0x160/0x160 [ 806.464864] get_user_pages_unlocked+0x18a/0x690 [ 806.465864] ? internal_get_user_pages_fast+0xdce/0x2640 [ 806.467006] ? pin_user_pages_locked+0x7b0/0x7b0 [ 806.468050] internal_get_user_pages_fast+0x175f/0x2640 [ 806.469210] ? pin_user_pages_unlocked+0x80/0x80 [ 806.470215] ? trace_hardirqs_on+0x5b/0x180 [ 806.471129] get_user_pages_fast+0x66/0xa0 [ 806.472073] iov_iter_get_pages+0x297/0xf40 [ 806.473001] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 806.474047] ? mempool_resize+0x7d0/0x7d0 [ 806.474942] bio_iov_iter_get_pages+0x22a/0x1200 [ 806.475979] ? bvec_alloc+0x17e/0x2f0 [ 806.476813] ? bio_alloc_bioset+0x2a1/0x600 [ 806.477736] ? bio_add_pc_page+0x100/0x100 [ 806.478652] ? bvec_alloc+0x290/0x2f0 [ 806.479494] ? iov_iter_npages+0x1fd/0xa70 [ 806.480406] ? ext4_iomap_begin+0x1a0/0x700 [ 806.481347] iomap_dio_bio_actor+0x77a/0xef0 [ 806.482300] iomap_dio_actor+0x36f/0x560 [ 806.483179] iomap_apply+0x289/0x810 [ 806.484004] ? iomap_dio_rw+0x90/0x90 [ 806.484822] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 806.486044] ? delete_from_page_cache_batch+0xa30/0xa30 [ 806.487162] ? mark_held_locks+0x9e/0xe0 [ 806.488066] ? filemap_check_errors+0xa5/0x150 [ 806.489039] __iomap_dio_rw+0x6cd/0x1110 [ 806.489910] ? iomap_dio_rw+0x90/0x90 [ 806.490735] ? iomap_dio_bio_actor+0xef0/0xef0 [ 806.491750] ? down_read+0x10f/0x430 [ 806.492543] ? down_write+0x160/0x160 [ 806.493357] iomap_dio_rw+0x31/0x90 [ 806.494128] ext4_file_read_iter+0x2c7/0x4c0 [ 806.495069] new_sync_read+0x424/0x6f0 [ 806.495922] ? ksys_lseek+0x1b0/0x1b0 [ 806.496761] ? fsnotify_perm.part.0+0x22d/0x620 [ 806.497756] ? security_file_permission+0xb1/0xe0 [ 806.498794] vfs_read+0x4da/0x620 [ 806.499569] ksys_read+0x12d/0x260 [ 806.500323] ? vfs_write+0xb10/0xb10 [ 806.501125] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 806.502240] ? syscall_enter_from_user_mode+0x1d/0x50 [ 806.503349] do_syscall_64+0x33/0x40 [ 806.504155] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 806.505237] RIP: 0033:0x7fb97f666b19 [ 806.506023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 806.509914] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 806.511566] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 806.513084] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 806.514585] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 806.516122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 806.517623] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 806.519159] CPU: 1 PID: 6583 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 806.520548] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 806.522174] Call Trace: [ 806.522698] dump_stack+0x107/0x167 [ 806.523427] should_fail.cold+0x5/0xa [ 806.524173] __alloc_pages_nodemask+0x182/0x600 [ 806.525093] ? add_mm_counter_fast+0x220/0x220 [ 806.525996] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 806.527182] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 806.528224] ? lock_downgrade+0x6d0/0x6d0 [ 806.529042] ? mark_held_locks+0x9e/0xe0 [ 806.529837] alloc_pages_vma+0xbb/0x410 [ 806.530624] handle_mm_fault+0x152f/0x3500 [ 806.531460] ? do_raw_spin_lock+0x121/0x260 [ 806.532299] ? rwlock_bug.part.0+0x90/0x90 [ 806.533125] ? __pmd_alloc+0x630/0x630 [ 806.533903] __get_user_pages+0x6ec/0x1620 [ 806.534762] ? follow_page_mask+0x1900/0x1900 [ 806.535912] ? down_read+0x10f/0x430 [ 806.536833] ? down_write+0x160/0x160 [ 806.537583] get_user_pages_unlocked+0x18a/0x690 [ 806.538497] ? internal_get_user_pages_fast+0xdce/0x2640 [ 806.539559] ? pin_user_pages_locked+0x7b0/0x7b0 [ 806.540487] internal_get_user_pages_fast+0x175f/0x2640 [ 806.541536] ? pin_user_pages_unlocked+0x80/0x80 [ 806.542445] ? trace_hardirqs_on+0x5b/0x180 [ 806.543284] get_user_pages_fast+0x66/0xa0 [ 806.544097] iov_iter_get_pages+0x297/0xf40 [ 806.545069] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 806.546272] ? mempool_resize+0x7d0/0x7d0 [ 806.547077] bio_iov_iter_get_pages+0x22a/0x1200 [ 806.548000] ? bvec_alloc+0x17e/0x2f0 [ 806.548741] ? bio_alloc_bioset+0x2a1/0x600 [ 806.549569] ? bio_add_pc_page+0x100/0x100 [ 806.550371] ? bvec_alloc+0x290/0x2f0 [ 806.551101] ? iov_iter_npages+0x1fd/0xa70 [ 806.551920] ? ext4_iomap_begin+0x1a0/0x700 [ 806.552759] iomap_dio_bio_actor+0x77a/0xef0 [ 806.553620] iomap_dio_actor+0x36f/0x560 [ 806.554402] iomap_apply+0x289/0x810 [ 806.555119] ? iomap_dio_rw+0x90/0x90 [ 806.555864] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 806.556979] ? delete_from_page_cache_batch+0xa30/0xa30 [ 806.558007] ? mark_held_locks+0x9e/0xe0 [ 806.558797] ? filemap_check_errors+0xa5/0x150 [ 806.559679] __iomap_dio_rw+0x6cd/0x1110 [ 806.560466] ? iomap_dio_rw+0x90/0x90 [ 806.561217] ? iomap_dio_bio_actor+0xef0/0xef0 [ 806.562103] ? down_read+0x10f/0x430 [ 806.562800] ? down_write+0x160/0x160 [ 806.563538] iomap_dio_rw+0x31/0x90 [ 806.564230] ext4_file_read_iter+0x2c7/0x4c0 [ 806.565070] new_sync_read+0x424/0x6f0 [ 806.565807] ? ksys_lseek+0x1b0/0x1b0 [ 806.566539] ? fsnotify_perm.part.0+0x22d/0x620 [ 806.567430] ? security_file_permission+0xb1/0xe0 [ 806.568352] vfs_read+0x4da/0x620 [ 806.569020] ksys_read+0x12d/0x260 [ 806.569704] ? vfs_write+0xb10/0xb10 [ 806.570420] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 806.571642] ? syscall_enter_from_user_mode+0x1d/0x50 [ 806.572945] do_syscall_64+0x33/0x40 [ 806.573659] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 806.574643] RIP: 0033:0x7f8e866d3b19 [ 806.575357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 806.578857] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 806.580318] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 05:46:46 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x48d, 0x8}}, './file0/file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = geteuid() r4 = accept4(r0, &(0x7f0000001700)=@generic, &(0x7f0000001780)=0x80, 0x0) sendmsg$nl_generic(r2, &(0x7f0000001680)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f0000001640)={&(0x7f0000000280)={0x1398, 0x19, 0x2, 0x70bd27, 0x25dfdbfc, {}, [@nested={0xfc, 0x1, 0x0, 0x1, [@generic="4d4e23ea5d0fdf63dc3755e47696d98ccc323e4b808826785fd074e115a4f781ba024fd16a2703048b375b189adddc2ed5f883b24ac14929e5f9e75903077ee93410c917346be807fffb664d766055e33545f9b2aea184cc9bb4ce94f40849bd0ac8b95c58c9f957a1c8a766655a9a6340a85a93c0a29cda2dfa1c62b1a1119d191b88d292b1c1d305bec522973f9f59822a70beaad95db051c9984c6af36a145be93f87f222f0ac215594db086b779cf57d2692446db12755757da3dcffcb0e6b684bf8", @typed={0x8, 0x48, 0x0, 0x0, @fd=r4}, @generic="55ffbe2d70d5fd6d6649b5d5662dbe390a199b9c15b816e780c47bc6c1f5129dff6eaba4dc56c0e8", @generic="6dfa771a"]}, @typed={0x8, 0xf, 0x0, 0x0, @uid=r3}, @typed={0xa, 0x12, 0x0, 0x0, @str=')]&[^\x00'}, @generic="e615f07ace07d4bb42da369beaddcf2103e573a3d43e0349ec77ab5067e88761e15895d554103d71480f7f54c4cc5dfc638438db43830cbb9ca870481e043fecd98478f6c2951c611deb7bf5b1157cce8e50212507406d63f57b23325313f8880390c65d0f31e76bd86bdf758079ee9781eab4ce506331be00d25a5941f889e045dd32874cc3f8decfc3f64041ead2a74065be4021d6380d7f2b27aa505e6352d5fa337c7e594867ac545b71d3c19c", @nested={0x10ea, 0x46, 0x0, 0x1, [@generic="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", @typed={0x8, 0xc, 0x0, 0x0, @fd=r1}, @generic="824ff9f3e5819722353cfa384387187e4f446cbed58f8c47b09fd0a3b240e21c8bcaf59faaa2f25e4b674c79e76ec1715130746474c784f7f3c627a604dd2a930bafa3d8bd6dd9a45dc23394918e093bb6f65ce3e30d39124cfa851c4bebb7e2f41358123efde4a773d2345fb8218131f75cec3cdeda7cfb0d68d660484c3239f714baea42aeb388e9021b431a4eddcf8066e8784217388ba1a8eb6e9ba9c8eb64efafd794f43523802783460dcf2d6ac8a28db178696df1534017d8d17c084bef54f0a62de1d6acc172ae0404465eba87f0ac8f624dd37482ad7ef178a5"]}, @typed={0x8, 0x11, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="a71ec8d6b211f6800379cd42a0180cbb785a8ae69ae5d791fb724ed619789d53e0916567781e680b5ab2cc96b31e5e0030e59f92b0c53bcec0ec6f0e165dd10e38db1adff7f9b8b4437b1aa6d2403db89c03eb69c0d059e0c5a469a34bc6bfdedec1b4d368ca8f4dc83df0f29e7ac44127797e3a0dceef9a1878cd1af565cb6dd11b370a118cd26b80bf74526bf6869e9a4db7e53086af929d0199bf3c1144c5f7ff1522827d1aa8c3803ff27f9482b7e54c36692567c88c441fac3a6fb99ea113f2b0da6b7176", @typed={0x8, 0x56, 0x0, 0x0, @str='-^/\x00'}]}, 0x1398}, 0x1, 0x0, 0x0, 0x8005}, 0x8890) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = signalfd4(r5, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r7, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r6}}, 0x9) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r6, 0xc0189374, &(0x7f00000016c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x8}}, './file1\x00'}) r8 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r8, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r1, r8) recvfrom(r8, &(0x7f00000000c0)=""/194, 0xc2, 0x10240, &(0x7f0000000000)=@can, 0x80) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 806.581671] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 fchmodat(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x10) [ 806.583408] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 806.584789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 806.586119] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 05:46:46 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8932, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:46:46 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 23) 05:46:46 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 806.684164] FAULT_INJECTION: forcing a failure. [ 806.684164] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 806.686398] CPU: 1 PID: 6596 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 806.687616] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 806.689095] Call Trace: [ 806.689573] dump_stack+0x107/0x167 [ 806.690229] should_fail.cold+0x5/0xa [ 806.690921] __alloc_pages_nodemask+0x182/0x600 [ 806.691760] ? add_mm_counter_fast+0x220/0x220 [ 806.692572] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 806.693650] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 806.694587] ? lock_downgrade+0x6d0/0x6d0 [ 806.695325] ? mark_held_locks+0x9e/0xe0 [ 806.696056] alloc_pages_vma+0xbb/0x410 [ 806.696771] handle_mm_fault+0x152f/0x3500 [ 806.697532] ? do_raw_spin_lock+0x121/0x260 [ 806.698301] ? rwlock_bug.part.0+0x90/0x90 [ 806.699041] ? __pmd_alloc+0x630/0x630 [ 806.699760] __get_user_pages+0x6ec/0x1620 [ 806.700530] ? follow_page_mask+0x1900/0x1900 [ 806.701318] ? down_read+0x10f/0x430 [ 806.701978] ? down_write+0x160/0x160 [ 806.702659] get_user_pages_unlocked+0x18a/0x690 [ 806.703503] ? internal_get_user_pages_fast+0xdce/0x2640 [ 806.704480] ? pin_user_pages_locked+0x7b0/0x7b0 [ 806.705338] internal_get_user_pages_fast+0x175f/0x2640 [ 806.706308] ? pin_user_pages_unlocked+0x80/0x80 [ 806.707139] ? trace_hardirqs_on+0x5b/0x180 [ 806.707909] get_user_pages_fast+0x66/0xa0 [ 806.708665] iov_iter_get_pages+0x297/0xf40 [ 806.709662] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 806.710600] ? mempool_resize+0x7d0/0x7d0 [ 806.711390] bio_iov_iter_get_pages+0x22a/0x1200 [ 806.712408] ? bvec_alloc+0x17e/0x2f0 [ 806.713238] ? bio_alloc_bioset+0x2a1/0x600 [ 806.714010] ? bio_add_pc_page+0x100/0x100 [ 806.714759] ? bvec_alloc+0x290/0x2f0 [ 806.715439] ? iov_iter_npages+0x1fd/0xa70 [ 806.716179] ? ext4_iomap_begin+0x1a0/0x700 [ 806.716947] iomap_dio_bio_actor+0x77a/0xef0 [ 806.717746] iomap_dio_actor+0x36f/0x560 [ 806.718463] iomap_apply+0x289/0x810 [ 806.719116] ? iomap_dio_rw+0x90/0x90 [ 806.719797] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 806.720814] ? delete_from_page_cache_batch+0xa30/0xa30 [ 806.721745] ? mark_held_locks+0x9e/0xe0 [ 806.722457] ? filemap_check_errors+0xa5/0x150 [ 806.723269] __iomap_dio_rw+0x6cd/0x1110 [ 806.723982] ? iomap_dio_rw+0x90/0x90 [ 806.724668] ? iomap_dio_bio_actor+0xef0/0xef0 [ 806.725707] ? down_read+0x10f/0x430 [ 806.726522] ? down_write+0x160/0x160 [ 806.727298] iomap_dio_rw+0x31/0x90 [ 806.727949] ext4_file_read_iter+0x2c7/0x4c0 [ 806.728890] new_sync_read+0x424/0x6f0 [ 806.729581] ? ksys_lseek+0x1b0/0x1b0 [ 806.730258] ? fsnotify_perm.part.0+0x22d/0x620 [ 806.731074] ? security_file_permission+0xb1/0xe0 [ 806.731942] vfs_read+0x4da/0x620 [ 806.732563] ksys_read+0x12d/0x260 [ 806.733186] ? vfs_write+0xb10/0xb10 [ 806.733837] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 806.734754] ? syscall_enter_from_user_mode+0x1d/0x50 [ 806.735657] do_syscall_64+0x33/0x40 [ 806.736305] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 806.737204] RIP: 0033:0x7fe6449f5b19 [ 806.737853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 806.741047] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 806.742374] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 806.743609] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 806.744855] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 806.746097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 806.747329] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:46:46 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 20) [ 806.775755] FAULT_INJECTION: forcing a failure. [ 806.775755] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 806.778365] CPU: 0 PID: 6602 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 806.779842] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 806.781609] Call Trace: [ 806.782180] dump_stack+0x107/0x167 [ 806.782955] should_fail.cold+0x5/0xa [ 806.783805] __alloc_pages_nodemask+0x182/0x600 [ 806.784795] ? add_mm_counter_fast+0x220/0x220 [ 806.785758] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 806.787029] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 806.788171] ? lock_downgrade+0x6d0/0x6d0 [ 806.789043] ? mark_held_locks+0x9e/0xe0 [ 806.789911] alloc_pages_vma+0xbb/0x410 [ 806.790753] handle_mm_fault+0x152f/0x3500 [ 806.791677] ? do_raw_spin_lock+0x121/0x260 [ 806.792586] ? rwlock_bug.part.0+0x90/0x90 [ 806.793478] ? __pmd_alloc+0x630/0x630 [ 806.794325] __get_user_pages+0x6ec/0x1620 [ 806.795233] ? follow_page_mask+0x1900/0x1900 [ 806.796209] ? down_read+0x10f/0x430 [ 806.797000] ? down_write+0x160/0x160 [ 806.797827] get_user_pages_unlocked+0x18a/0x690 [ 806.798832] ? internal_get_user_pages_fast+0xdce/0x2640 [ 806.800005] ? pin_user_pages_locked+0x7b0/0x7b0 [ 806.801028] internal_get_user_pages_fast+0x175f/0x2640 [ 806.802201] ? pin_user_pages_unlocked+0x80/0x80 [ 806.803209] ? trace_hardirqs_on+0x5b/0x180 [ 806.804162] get_user_pages_fast+0x66/0xa0 [ 806.805066] iov_iter_get_pages+0x297/0xf40 [ 806.805988] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 806.807023] ? mempool_resize+0x7d0/0x7d0 [ 806.807942] bio_iov_iter_get_pages+0x22a/0x1200 [ 806.808954] ? bvec_alloc+0x17e/0x2f0 [ 806.809762] ? bio_alloc_bioset+0x2a1/0x600 [ 806.810681] ? bio_add_pc_page+0x100/0x100 [ 806.811611] ? bvec_alloc+0x290/0x2f0 [ 806.812422] ? iov_iter_npages+0x1fd/0xa70 [ 806.813322] ? ext4_iomap_begin+0x1a0/0x700 [ 806.814245] iomap_dio_bio_actor+0x77a/0xef0 [ 806.815196] iomap_dio_actor+0x36f/0x560 [ 806.816105] iomap_apply+0x289/0x810 [ 806.816907] ? iomap_dio_rw+0x90/0x90 [ 806.817724] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 806.818960] ? delete_from_page_cache_batch+0xa30/0xa30 [ 806.820115] ? mark_held_locks+0x9e/0xe0 [ 806.820993] ? filemap_check_errors+0xa5/0x150 [ 806.821975] __iomap_dio_rw+0x6cd/0x1110 [ 806.822825] ? iomap_dio_rw+0x90/0x90 [ 806.823671] ? iomap_dio_bio_actor+0xef0/0xef0 [ 806.824644] ? down_read+0x10f/0x430 [ 806.825440] ? down_write+0x160/0x160 [ 806.826245] iomap_dio_rw+0x31/0x90 [ 806.827014] ext4_file_read_iter+0x2c7/0x4c0 [ 806.827976] new_sync_read+0x424/0x6f0 [ 806.828815] ? ksys_lseek+0x1b0/0x1b0 [ 806.829637] ? fsnotify_perm.part.0+0x22d/0x620 [ 806.830628] ? security_file_permission+0xb1/0xe0 [ 806.831693] vfs_read+0x4da/0x620 [ 806.832444] ksys_read+0x12d/0x260 [ 806.833199] ? vfs_write+0xb10/0xb10 [ 806.833994] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 806.835114] ? syscall_enter_from_user_mode+0x1d/0x50 [ 806.836238] do_syscall_64+0x33/0x40 [ 806.837047] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 806.838132] RIP: 0033:0x7fb97f666b19 [ 806.838924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 806.842869] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 806.844505] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 806.846033] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 806.847563] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 806.849078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 806.850583] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:47:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 1) 05:47:00 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8933, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:47:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 22) 05:47:00 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:47:00 executing program 5: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r1, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r0, r1) openat(r0, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r2, &(0x7f0000000000), 0x1b4000) r3 = inotify_init() ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x5, 0x9a}) ioctl$F2FS_IOC_GARBAGE_COLLECT(r3, 0x4004f506, &(0x7f00000000c0)) 05:47:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 24) 05:47:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 21) 05:47:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = getegid() setregid(0x0, r1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = socket$nl_audit(0x10, 0x3, 0x9) r6 = accept$packet(r0, &(0x7f0000001c80), &(0x7f0000003140)=0x14) r7 = eventfd(0x8) r8 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r9, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r8, r9) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000003180), 0xa442, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000003300)={&(0x7f00000003c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000440)="693b10b8b363f2ae5b5d7cf00162a2d021160d6ef970e5a438c74df598174618ffcf750c8870ded0c546dfbb9a429cf24d6005395ceff2544f6c2d47ac16fbe53371a8003580c82e3044216742311406e2741648a6190a548331c02e88756733c0d716f5e5d682022da021d1f02c002796f5af773b0c3d55d62f646ed307b066751e50efa8a69dd85e844917e68e80d01272dc4e90bf172f1386e002f0fbd24a39b5051c9c16648a95c54150f9", 0xad}, {&(0x7f0000000500)="1e28a5f99a0de96718d401406ef4c24e7567e68d036a42be946d7a6c2e2ed39d5d3598eca39be4d88a078061bfb2996cb8d65df0907a803482719e3741b77f3f9a54bb0c2226fa07121bbd355061e9db6a043e0cc4ab0f5e9ecf3b69a3281df51b081d5e1e4550190e1937236e00f5b03a9e975a1a59c48db82a6d31a195b5c6baee77d9c387d94febe79834c81ad6e94f84a92c87f02ec97f70ca4c64afb9c03078ad35597c28ee224787cefd4f93a3e290a595c53b1bb119e31deaec1aec120befb71ee790a9496e490e8a77a8f199fa42a02bac81c7ed6cdd39e55c19c41da8ff5c8739d6ad190976f002a153112afdad9933704d8dd9", 0xf8}, {&(0x7f0000000600)="5d6ed78fa8d27f4fe8451edce16a135647ade9c0a617def4155edd735551db8833fc48b253f8496b83d2a00dcf730f1ff684850ef19568c856fd71e9a86624617e0931309f520c14fc271e87d03473de6e7ba49fcff76a7dc326782b9083b6cd36fb6b66c25beacae08d89ed5119986c118f951e1680e6cd62224942169fafd341f9f113677666c8d27a357b46664f89e825d1771e318dfdd541d88cad1016362be026a5b25b986fd6831b93e4235e7eb520535c23fb403160984c2b844b9e3889309f1fb5b9f0ff9f06aae0547866d8b6023332ece181fb", 0xd8}, {&(0x7f0000000700)="616f8f4d04a8cd149a3ef9007cfd1b9fd6175a9924e6fc58fff88f50ff92070205dd5d2bdd3333b55af39e13f63f4c7aa1110b4e1c61d3d50b5080e97534bec82109818be44674ae11569cc65630229b334985b64a5c3aadaf2771493914296f796c54bc2706840555216371b6591514a1fd2e4626517adb7c6a545729b0128ba81d9675c3d82a4a9cbef79d6418d110df436484f73c2abebadc294277ce4bcf4781be94049a3f63337c4b18d371fe0621cd1e1f1192f3925dcc3ed456594dfa6afeb80487", 0xc5}, {&(0x7f0000000800)="111172ec9920fb3cdf9fc9ce4c868cc9010fb799a43481937931b35fc721de3e49782b199f50a6e8663a9e83c1a68a25505a54504b19f9ca38987ee5987a4bb8f9ecda585bbfc768154c572782cdc2a3fde9c3a32d03ee4968558824e68895b6182f703c85590e30f12724e4f9db82c6593c8443a8bb7b672bbaf52838097bbfe7174037085dc568118f528f155cee65480b993df203b2e988a026be9ca775feca5726ce", 0xa4}], 0x5, &(0x7f00000031c0)=[@rights={{0x30, 0x1, 0x1, [r0, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2}}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r0, r0, r0, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [r0, r5, 0xffffffffffffffff, r6, r0]}}, @rights={{0x24, 0x1, 0x1, [r0, r7, r0, r0, r9]}}, @rights={{0x14, 0x1, 0x1, [r10]}}], 0x128, 0x20000040}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x101, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="a16856b3695c3d124e76bb06f35df2009e2860d21dfecd9bc8c371e39967ecdcc00c0645228a27b935a40bbbc2dbac1579f5a6385579eceaa746172e1f1d3e7bd9d2323da1deb3fa0f0763eede738e", 0x4f, 0x40}, {&(0x7f0000000140)="18d160e053bb3049e1a17c000793d568f1c53efbaeb6bf91a1be152fe8cd86b2f590623dbae558a3a72d8ca80b58ea1222629a97d17f2d0ee34a0bc8d43166228b3b08c843f56ddd01cb554942325d9854a1ccb228b45445223d1f7a9d8e8e6bed996ce32281b01ccec7c39cf871b91a6830e4a43cfa0f00ca16275facb5f1f2f78c5b3db50f5abb0f6c76af", 0x8c, 0xed32}], 0x200002, &(0x7f0000000240)={[{@resgid={'resgid', 0x3d, r1}}, {@grpquota}, {@lazytime}], [{@uid_eq={'uid', 0x3d, r2}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@subj_role}, {@fsname={'fsname', 0x3d, '#'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', r3}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) [ 821.019358] FAULT_INJECTION: forcing a failure. [ 821.019358] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 821.021028] FAULT_INJECTION: forcing a failure. [ 821.021028] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 821.021965] CPU: 0 PID: 6613 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 821.024830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.026586] Call Trace: [ 821.027153] dump_stack+0x107/0x167 [ 821.027938] should_fail.cold+0x5/0xa [ 821.028754] __alloc_pages_nodemask+0x182/0x600 [ 821.029742] ? add_mm_counter_fast+0x220/0x220 [ 821.030713] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 821.032003] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 821.033125] ? lock_downgrade+0x6d0/0x6d0 [ 821.034003] ? mark_held_locks+0x9e/0xe0 [ 821.034961] alloc_pages_vma+0xbb/0x410 [ 821.035852] handle_mm_fault+0x152f/0x3500 [ 821.036753] ? do_raw_spin_lock+0x121/0x260 [ 821.037667] ? rwlock_bug.part.0+0x90/0x90 [ 821.038569] ? __pmd_alloc+0x630/0x630 [ 821.039421] __get_user_pages+0x6ec/0x1620 [ 821.040352] ? follow_page_mask+0x1900/0x1900 [ 821.041310] ? down_read+0x10f/0x430 [ 821.042098] ? down_write+0x160/0x160 [ 821.042919] get_user_pages_unlocked+0x18a/0x690 [ 821.043943] ? internal_get_user_pages_fast+0xdce/0x2640 [ 821.045123] ? pin_user_pages_locked+0x7b0/0x7b0 [ 821.046158] internal_get_user_pages_fast+0x175f/0x2640 [ 821.047325] ? pin_user_pages_unlocked+0x80/0x80 [ 821.048350] ? trace_hardirqs_on+0x5b/0x180 [ 821.049270] get_user_pages_fast+0x66/0xa0 [ 821.050168] iov_iter_get_pages+0x297/0xf40 [ 821.051088] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 821.052142] ? mempool_resize+0x7d0/0x7d0 [ 821.053040] bio_iov_iter_get_pages+0x22a/0x1200 [ 821.054053] ? bvec_alloc+0x17e/0x2f0 [ 821.054866] ? bio_alloc_bioset+0x2a1/0x600 [ 821.055808] ? bio_add_pc_page+0x100/0x100 [ 821.056708] ? bvec_alloc+0x290/0x2f0 [ 821.057521] ? iov_iter_npages+0x1fd/0xa70 [ 821.058420] ? ext4_iomap_begin+0x1a0/0x700 [ 821.059347] iomap_dio_bio_actor+0x77a/0xef0 [ 821.060311] iomap_dio_actor+0x36f/0x560 [ 821.061189] iomap_apply+0x289/0x810 [ 821.061985] ? iomap_dio_rw+0x90/0x90 [ 821.062806] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 821.064057] ? delete_from_page_cache_batch+0xa30/0xa30 [ 821.065190] ? mark_held_locks+0x9e/0xe0 [ 821.066069] ? filemap_check_errors+0xa5/0x150 [ 821.067042] __iomap_dio_rw+0x6cd/0x1110 [ 821.067919] ? iomap_dio_rw+0x90/0x90 [ 821.068748] ? iomap_dio_bio_actor+0xef0/0xef0 [ 821.069728] ? down_read+0x10f/0x430 [ 821.070519] ? down_write+0x160/0x160 [ 821.071334] iomap_dio_rw+0x31/0x90 [ 821.072125] ext4_file_read_iter+0x2c7/0x4c0 [ 821.073062] new_sync_read+0x424/0x6f0 [ 821.073894] ? ksys_lseek+0x1b0/0x1b0 [ 821.074722] ? fsnotify_perm.part.0+0x22d/0x620 [ 821.075725] ? security_file_permission+0xb1/0xe0 [ 821.076757] vfs_read+0x4da/0x620 [ 821.077510] ksys_read+0x12d/0x260 [ 821.078338] ? vfs_write+0xb10/0xb10 [ 821.079206] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 821.080368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 821.081470] do_syscall_64+0x33/0x40 [ 821.082263] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 821.083350] RIP: 0033:0x7fe6449f5b19 [ 821.084152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.088057] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 821.089674] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 821.091186] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 821.092707] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.094214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.095737] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 821.097283] CPU: 1 PID: 6611 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 821.098123] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.099133] Call Trace: [ 821.099469] dump_stack+0x107/0x167 [ 821.099913] should_fail.cold+0x5/0xa [ 821.100378] __alloc_pages_nodemask+0x182/0x600 [ 821.100948] ? add_mm_counter_fast+0x220/0x220 [ 821.101510] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 821.102236] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 821.102872] ? lock_downgrade+0x6d0/0x6d0 [ 821.103375] ? mark_held_locks+0x9e/0xe0 [ 821.103882] alloc_pages_vma+0xbb/0x410 [ 821.104368] handle_mm_fault+0x152f/0x3500 [ 821.104881] ? do_raw_spin_lock+0x121/0x260 [ 821.105405] ? rwlock_bug.part.0+0x90/0x90 [ 821.105918] ? __pmd_alloc+0x630/0x630 [ 821.106405] __get_user_pages+0x6ec/0x1620 [ 821.106925] ? follow_page_mask+0x1900/0x1900 [ 821.107485] ? down_read+0x10f/0x430 [ 821.107934] ? down_write+0x160/0x160 [ 821.108407] get_user_pages_unlocked+0x18a/0x690 [ 821.108991] ? internal_get_user_pages_fast+0xdce/0x2640 [ 821.109663] ? pin_user_pages_locked+0x7b0/0x7b0 [ 821.110248] internal_get_user_pages_fast+0x175f/0x2640 [ 821.110908] ? pin_user_pages_unlocked+0x80/0x80 [ 821.111496] ? trace_hardirqs_on+0x5b/0x180 [ 821.112018] get_user_pages_fast+0x66/0xa0 [ 821.112542] iov_iter_get_pages+0x297/0xf40 [ 821.113070] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 821.113656] ? mempool_resize+0x7d0/0x7d0 [ 821.114166] bio_iov_iter_get_pages+0x22a/0x1200 [ 821.114743] ? bvec_alloc+0x17e/0x2f0 [ 821.115206] ? bio_alloc_bioset+0x2a1/0x600 [ 821.115739] ? bio_add_pc_page+0x100/0x100 [ 821.116246] ? bvec_alloc+0x290/0x2f0 [ 821.116706] ? iov_iter_npages+0x1fd/0xa70 [ 821.117217] ? ext4_iomap_begin+0x1a0/0x700 [ 821.117743] iomap_dio_bio_actor+0x77a/0xef0 [ 821.118277] iomap_dio_actor+0x36f/0x560 [ 821.118771] iomap_apply+0x289/0x810 [ 821.119247] ? iomap_dio_rw+0x90/0x90 [ 821.119722] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 821.120414] ? delete_from_page_cache_batch+0xa30/0xa30 [ 821.121054] ? mark_held_locks+0x9e/0xe0 [ 821.121548] ? filemap_check_errors+0xa5/0x150 [ 821.122105] __iomap_dio_rw+0x6cd/0x1110 [ 821.122595] ? iomap_dio_rw+0x90/0x90 [ 821.123066] ? iomap_dio_bio_actor+0xef0/0xef0 [ 821.123644] ? down_read+0x10f/0x430 [ 821.124096] ? down_write+0x160/0x160 [ 821.124563] iomap_dio_rw+0x31/0x90 [ 821.125008] ext4_file_read_iter+0x2c7/0x4c0 [ 821.125543] new_sync_read+0x424/0x6f0 [ 821.126017] ? ksys_lseek+0x1b0/0x1b0 [ 821.126488] ? fsnotify_perm.part.0+0x22d/0x620 [ 821.127056] ? security_file_permission+0xb1/0xe0 [ 821.127659] vfs_read+0x4da/0x620 [ 821.128082] ksys_read+0x12d/0x260 [ 821.128513] ? vfs_write+0xb10/0xb10 [ 821.128968] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 821.129602] ? syscall_enter_from_user_mode+0x1d/0x50 [ 821.130221] do_syscall_64+0x33/0x40 [ 821.130667] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 821.131277] RIP: 0033:0x7f8e866d3b19 [ 821.131731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.133917] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 821.134828] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 821.135687] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 821.136536] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.137385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.138231] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 821.144405] FAULT_INJECTION: forcing a failure. [ 821.144405] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 821.145899] CPU: 1 PID: 6623 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 821.146719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.147715] Call Trace: [ 821.147921] loop4: detected capacity change from 0 to 41948160 [ 821.148033] dump_stack+0x107/0x167 [ 821.148052] should_fail.cold+0x5/0xa [ 821.150192] __alloc_pages_nodemask+0x182/0x600 [ 821.150745] ? add_mm_counter_fast+0x220/0x220 [ 821.151289] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 821.152013] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 821.152632] ? lock_downgrade+0x6d0/0x6d0 [ 821.153124] ? mark_held_locks+0x9e/0xe0 [ 821.153609] alloc_pages_vma+0xbb/0x410 [ 821.154092] handle_mm_fault+0x152f/0x3500 [ 821.154596] ? do_raw_spin_lock+0x121/0x260 [ 821.155111] ? rwlock_bug.part.0+0x90/0x90 [ 821.155624] ? __pmd_alloc+0x630/0x630 [ 821.156111] __get_user_pages+0x6ec/0x1620 [ 821.156628] ? follow_page_mask+0x1900/0x1900 [ 821.157161] ? down_read+0x10f/0x430 [ 821.157607] ? down_write+0x160/0x160 [ 821.158063] get_user_pages_unlocked+0x18a/0x690 [ 821.158625] ? internal_get_user_pages_fast+0xdce/0x2640 [ 821.159271] ? pin_user_pages_locked+0x7b0/0x7b0 [ 821.159866] internal_get_user_pages_fast+0x175f/0x2640 [ 821.160522] ? pin_user_pages_unlocked+0x80/0x80 [ 821.161089] ? trace_hardirqs_on+0x5b/0x180 [ 821.161612] get_user_pages_fast+0x66/0xa0 [ 821.162121] iov_iter_get_pages+0x297/0xf40 [ 821.162641] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 821.163221] ? mempool_resize+0x7d0/0x7d0 [ 821.163734] bio_iov_iter_get_pages+0x22a/0x1200 [ 821.164301] ? bvec_alloc+0x17e/0x2f0 [ 821.164762] ? bio_alloc_bioset+0x2a1/0x600 [ 821.165277] ? bio_add_pc_page+0x100/0x100 [ 821.165784] ? bvec_alloc+0x290/0x2f0 [ 821.166243] ? iov_iter_npages+0x1fd/0xa70 [ 821.166748] ? ext4_iomap_begin+0x1a0/0x700 [ 821.167264] iomap_dio_bio_actor+0x77a/0xef0 [ 821.167809] iomap_dio_actor+0x36f/0x560 [ 821.168297] iomap_apply+0x289/0x810 [ 821.168736] ? iomap_dio_rw+0x90/0x90 [ 821.169193] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 821.169876] ? delete_from_page_cache_batch+0xa30/0xa30 [ 821.170512] ? mark_held_locks+0x9e/0xe0 [ 821.170999] ? filemap_check_errors+0xa5/0x150 [ 821.171552] __iomap_dio_rw+0x6cd/0x1110 [ 821.172033] ? iomap_dio_rw+0x90/0x90 [ 821.172498] ? iomap_dio_bio_actor+0xef0/0xef0 [ 821.173041] ? down_read+0x10f/0x430 [ 821.173480] ? down_write+0x160/0x160 [ 821.173937] iomap_dio_rw+0x31/0x90 [ 821.174366] ext4_file_read_iter+0x2c7/0x4c0 [ 821.174890] new_sync_read+0x424/0x6f0 [ 821.175308] FAULT_INJECTION: forcing a failure. [ 821.175308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 821.176703] ? ksys_lseek+0x1b0/0x1b0 [ 821.176723] ? fsnotify_perm.part.0+0x22d/0x620 [ 821.176737] ? security_file_permission+0xb1/0xe0 [ 821.176754] vfs_read+0x4da/0x620 [ 821.176769] ksys_read+0x12d/0x260 [ 821.176782] ? vfs_write+0xb10/0xb10 [ 821.176797] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 821.176809] ? syscall_enter_from_user_mode+0x1d/0x50 [ 821.176827] do_syscall_64+0x33/0x40 [ 821.176839] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 821.182869] RIP: 0033:0x7fb97f666b19 [ 821.183309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.185475] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 821.186374] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 821.187211] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 821.188056] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.188899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.189744] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 821.190605] CPU: 0 PID: 6621 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 821.192089] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.193856] Call Trace: [ 821.194427] dump_stack+0x107/0x167 [ 821.195208] should_fail.cold+0x5/0xa [ 821.196032] iov_iter_copy_from_user_atomic+0x49b/0xdb0 [ 821.197173] ? fat_write_begin+0x95/0x180 [ 821.198051] ? fat_add_cluster+0x100/0x100 [ 821.198946] ? fat_write_begin+0xa3/0x180 [ 821.199846] generic_perform_write+0x279/0x4f0 [ 821.200824] ? __mnt_drop_write_file+0x9/0x70 [ 821.201779] ? page_cache_prev_miss+0x310/0x310 [ 821.203033] ? evict_inodes+0x470/0x470 [ 821.203904] ? generic_write_checks+0x2ad/0x390 [ 821.204908] __generic_file_write_iter+0x39d/0x5d0 [ 821.205958] generic_file_write_iter+0xdb/0x230 [ 821.206950] ? iov_iter_init+0x3c/0x130 [ 821.207812] new_sync_write+0x42c/0x660 [ 821.208668] ? new_sync_read+0x6f0/0x6f0 [ 821.209530] ? ksys_write+0x12d/0x260 [ 821.210340] ? lock_release+0x680/0x680 [ 821.211189] ? avc_policy_seqno+0x9/0x70 [ 821.212055] ? selinux_file_permission+0x92/0x520 [ 821.213097] vfs_write+0x7c0/0xb10 [ 821.213855] ksys_write+0x12d/0x260 [ 821.214625] ? __ia32_sys_read+0xb0/0xb0 [ 821.215505] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 821.216618] ? syscall_enter_from_user_mode+0x1d/0x50 [ 821.217719] do_syscall_64+0x33/0x40 [ 821.218508] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 821.219612] RIP: 0033:0x7f69c26bfb19 [ 821.220404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.224325] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 821.225957] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 821.227496] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 821.229023] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.230554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 821.232074] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:47:00 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8936, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:47:00 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) unlinkat(r2, &(0x7f0000000000)='./file0\x00', 0x200) read(r0, &(0x7f0000000000), 0x1b4000) 05:47:00 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:47:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 2) 05:47:00 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 22) 05:47:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 25) 05:47:00 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8937, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:47:00 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = accept$unix(r0, &(0x7f0000000000), &(0x7f00000000c0)=0x6e) pwritev2(r1, &(0x7f0000001180)=[{&(0x7f0000000100)="304ed75f852e422da80fe57871d7879163f07ab2e7b83bb66a65164af1f60a20c4d227aa3ff45533df677886e6a958ead08981cc2bd028df8b53d84322361167f2496da391aa1b72fe3af31ef626e2e4dbc9a4251d478c4ca4f2aaa250ab9ff6c0f1cb5ddff61aea917269648bbbd36c8951edfbfcfadd0b0913a545b0a65e2f1b4da4756eab1101af758ac53feb88c7d5259f989b5729ba7ac355af7756deec09dceab77c72abbbdfe4d8d382a482d27bd22493449468481ee017ee7a64b7db0f4671e298c7ad6bc671e2eb966c34b5be6bf60a59bd998e6f1f5ea376a0d40b01094c35ceb5edf56d1f1fbdcf3880129b83046ed35f2fc558038fb101aaa2c0882d7d485bf6338908a409988bb1fca6f875375f4c87afec3f06c53018c0a5457b31ce6ad3fcc5f0d6d9c5d49b4621cae4ef000a713b6a0709a582b3bca24a3feb0db7c22f597f8cd07f5859dcab36cdfd1bed1b927e4385650f2e8578fb40b4adc7c3cabe8e2293ea06f839bbf555c2221d4b997fb8b2c389ee525c59576411eda367aedf648237e2541f43efd3c0d37131bd4546390b874e940699e5fe5133dfbcd58ff30ad0f81065fd9a3b0527e61b5458a3a9c605d7979313141071e8556c22c95ae11e99fbb01229e45c4ad4e323b29531f212cd0b08a47b3eebf1e7f06aa868a47e094c4ca6d1a101b5491a5b877f6ed790349a0adf6de5718da81a91b9bef44efcb557d4c714d81ff9bda5d796eaa0e4a8f871e38ae16e71c7b9821c9c2e3b83784e88d953dcdb91ffedf0fde10c457735c69882591ccc93f6001c4e5cad3b033bac196eb763dff97b4c413579acedc42e132f9fa1834c99175831661bd57b724ad5aceb944b879f5d008da3a52779ab82fa458cf90151ea30c6151a944ac88b8ed5eb912b01743906b141359a6f70937e07440e8abb98417a013ab31dded44eef61ab0ac241b3fcc0c7e22dfc84e1f2d67f5675ebbb084d45dafbe7d8e6b2379ac3b0964901f89ecfe3de72a6591ec554be29a20f5558da8abb79ef31c72803dd04147c809269bb2a73b8bd16094004fca8c3c60ffc801858943623387136eb4a3bef79efb7406715107b9664dd5139e265fd75b4df035383b198b51e08cd38ab566337546ccd05defb6f40889338944011dcf8f8b27f5131d3f9f1072e42142d23bc05a178d99bcc7612b7d2601c0f636b7271724615e1a41d0dca62f6f449ba619d3743aa1cd84b14fe2adb5334c8faf9c2ebf1597ba060024508d574924da747eb1b66bed6ec305291f90a955439c7f8dcf536adb431db51f02d4252319fecfd94158ee31574edb0cf38cf0af967cd33e71119f0c72cf8007c8ff4bf4ea081f813407be4f5c4429b9d1e05237f32f04c8739849c5e51f633f5cb150e08fd2ad6f60cf72e9948ad4b8feb20ef0c6e3de98b6311872c4eb97ca6987aeb99330ecca0d42c0c96bb1d7f7a51789015e0b14f12870c02cb50d9fe66e7b82e3832587b61ad88dec4609d5895bb67b33ac04b78616bdbd0abb8f6c5ebdae9f137b79e8c5d83c99ab4349a4c2f80717605d248c72e9b7287e96744e708cc75c7ae18c5bb3f39864a660f9e4af4a3b403da9d412c452718b21ce392cd309b5817d7ac1682d315c7cdea7b8d500027151aecc81340c945383252cced4ca1eda746998fe6e167945916a72f7e1d866ad9301660b31b9d3598db7d2ccc1f17ea0d4a7d433c7a1e7b5da090242c85a422b76e6bd19bc6850c41cdce258b57b53168ceaf0d07dcddb23bf9d565023869903b86a186056fe581c88f701349e8ffacc9f53efcd0e9f34ea4c484ec169ca9a31c5cdd70b364418c8f345adc96196752382bc8afa361e65b8804a19a34b7700d41d6f48cf1811e7003e0b94e1c1747c68390b718c460f5e2fe458bd52caf8301e42af5345f61526d804ab20cc8d06f67f2a761500d37401d52b3efff78bf7d6daac700917dc231f4198a9de9c036ff12ac813b86f3a5649a94e6b7fade020eb92e91ac17bef37bccc8461e1c4f87410855572e19ebd0466bbe12ce1e42ff03734ec355fcfb5852d9da6ff74c4c8be7e961ce7ad1c25153e0e0b5b3c840cb4af23e4213773dfe6510d4d940f027728e799649bb121886e1ebcb18b9fe781c51bfc7bc087706e4d11460ef2bb0b6f366abe26d268e8499847364dd035ec31821cfb7c35d0c2fb7fa0c3f6cf07cec922b9d626bfc5f69c6a5bd7084f99c7733376d76b75db8fb2b9b6bf7e75698ce2983861b49d41e63e88e159f9c29669aab0268b690fff40150c307692a944452d348fdec7d5e0400ff357e7a1706d08b4322e8f8088812a01fbe4d1f1d03c8fddea6359be2fa580dde70b9d3ddeb3b4256f267c6e64187ff54113f6a3f9faec0c9dcf8aa66484aa41c7644667c7bb9687f07b27e5b2977e1196bb9f2a77912064bcb793afddb1ab83a92d924417e9696412f9ced3c6bbcfd07796c92fd9846967167a20a15ef29fa10142dddbf54ce41289aa3948211cf53e2cb1a1e1ee4a74a190af805604cee586e782b2a081fa9cd3d5e3fdcf9cddaa921cf1d4ee109d07ddb032f19350799864e3358adcf901d0290b4e20ccd3c9725eed3e78a3faa84f42c659f3b26c56594d9ddd664cc4c59d137b9be0cbdd0da8d496956a410b0734f9a57cc5ef48dcfddf59e68cced16abe1fb766559caee1169428cc4b3d4f39ce9f3965a13c0b72c74867b4752c1b8377f6debe80c8f6eecda2b4f739a8c2c07528a1d76f77dfe06e7f4361085f615cb5e44cbc122a09aa7abf789f78f1888448ad8e6fa5ae0ac36ae2237be6ce2a7f1d283b875403b8e59dde92fab63c22a3fcd9554db1e29c25e6161a10d524af87648a42b9534b62dad1c75dcdc73fcdba3558230effbc39cfd9f994d892cec3d27a64e8c59bc5b5d4747aa48539a22546c35b527bf0e56ca8f2bfd02b0d202aa4a9cc7ce42712cac4598eb5f0731eec0b890910a4b2cc7e0551e07da9fff443d22a145ec2c5c439dcc4966ed3ec6907d024d37e39c2c334c547412bccd33a86e748c70690f90bb00bd87d801ddd4bd6a033e0c99d9d0562957d80efffc48ad716acf20600d127179b3570ff1722ea959876102f30731e1aed2d46841ee10c3f2c6b255f2d306f7720056aafba03a1a3b679ea642b83e80a49ba7e075040e95e81488acc1df02e2f34c566c6f56dc6faaa4cf79b953583b939b374da202894ffd6c95c0fd1ac260b0c1b373a10b4df1f8b840259cd5fc7c00d1ca93ba4358efb644225d35af4b243a7d170b524031a6ff437272c7c65697761682d9846d9418b9ebae645114fb7912c896a46995ad6a4840bc036ad8586056a756ad183cc785bc01e02a359ecd3e973438e921f9bde4eb883bac3ef28da932f53bc2911847e63a4a40ab77c095f90df576442f0bae3d79eb4f8f9f83449755870bba30afad64da6d94f3efa5a70dee4f46acf6893bf332659734c09c33d8d60d8c35e6563f7a022abf1bc100c501bc3b1b3dbfe6fec03642610a2151c893c74ff5f413c88e51c51c63140b9b832d920edd33a529d80131d2071e07d4a0b90f67d3d1b3c21894a72a12bb61c6e3c7276ec786c13d8eb55650f6b336f598c16698b6ea83270163bd57fd0ce6bf769624acc8538a495be134401d0957908ff75be89f4ec9be22d897d1c62ae80801e5f154ffb185e82fbf588681023f6f3dbed8742938b2bbdfa5e191e5e7999f8e850e731c338a8c39a2291284111a30616a3b37cd86734ee6fa0b91d6c706fa4eebf179a083152b3b9b536f00676b8517608938f378f4010d598815b31dd210b0f1ddee726ac2619d6d1d6afe9e3e1c6d87630c56214bf6cd7915d4aa83611ce0d1a420737a73ade7bc7d5062a3b7ed331156304dd80bf28e6c35c2b2ca19b10cc8514e27f7d2e785f8550428fceddcf2ad846b1ddc30eed64a6b01f2682b1945196d6677c544e26b711c082c06c292a79199fcd70975d100817c08a5e9863dec0ac1bc43b28abd423ccb5bfd3fc525401a32cb8d3e5899de44f5bceddee95a738244b2550fa5a52ecd7d674a807e4044958128a1a2b30e372d2ced467e1c02cfed7f8be7cb4300add85e22b682bd951b8f56d806d776e37cefe74c70b9c165559be7524220c6a4f4e53d7e049e8e5c92c501735324f1aa44f48701d3517c67ff29281fdd5c0ea26c569945191ef52a710698339b8ba789e75a6efd95333c0c5a04bc9bf5781a09dab9015080e976eec613c6e0e20592bb932107befbd9634de74007cc757de3ba3008588452524e5e4962505d0958a67f4c5f66e9f718a194e9e0fcca1813666ce109af0235b3055ff11c27fa9b5e1c835c6e9cdc23ee06879463cdb53a96ef739237c3dd13c73b4ed1b359b6b0567a180f07582e7009db4852d3290fff3267309a1016fddbf4b2891382ea178309d2bd3ad5f79022ac4662076c0348af62df42c38d7e23a07c73b4c3358636756bf345636a305b2e9d42332c3f3c1e2c9120d1c4b0300456c849505db08386a10cdee97d8bb704a9eca68f4183190125d90d21699c7a080313c1b925d79e52589018ee484de77f2db2bd84af7f79b5662518e02c116cf30faf649e76963c892168c60003e64bd81887e3c4d9b78d6763f830cd56e6910725675f7aad7079fa456a7ef113b81d0ca12563fe4f2650c3c7ccba43ec69ca648835340e1c4dec53ec640933e5f6dd5a8696cfe630963c9b740f0b033fdabeff7fdbdb3a98ea941b8d45897ee0c7fa76a82c784717220281ae833dff11640c812a5ee5cdf5d73f46eb30203e7a06110966070ef8a381e861dcc7eb3d2f57de2496e43eedf4a168db512434e0c34096240c27ba60bf84f2c9e8002935822ec62d9af3c2824e5e0bc95d842aff16ba6d1de23f22bdd3a162d99646b20db6faf30284282cea25c2abbaa3d9e7444e968ac1861f1591a7a563861e9b90c5c7a6709e02ea47d9140657808cdc0895cf145ddcacd015b9395de97ea9e80dbae641644f76a6e37589db2be18c54a275c1dee76559a2ce5ea4d6905756540cea47adfe372b974fd404e759eb4e6f55a19d5b675f98c4428f13d8e9e2cc066de4ede7475e43fc8596f9f7761ea106ca9f244698bad8e328c37b9fb7099870ffb986394c4dc8f68ac2aa677f0bda54028a5f784e039accf3cfaef2a25859519c02482a0847bc6b66ff14cb7b84bff84a48accc3302129d6cd351c156a2714198c718871da9eb47768b13193ba21f6219383ddb5d3637753c1556776d0bfcc5b4c50f2db7481295c9363fbeb9e6e26803ece3ae8a15aeca8a3457290b5b1d821babd2cdb92b3efad4d9c72ddcd9f111e1f330f7029f3b441e741950258412adaecd46ff18b3a4f6217369bde48a8b88d28a469d450e3b1d3625f8a2dc51ba99750c113ce6ea781b5bf4364328e8e76f4254382f2c2be9e91cff547e9dc011674f82b30a4e760ffc62b8254f620a4b920771ca38bf5fe527c15f4d875eda17d1d42185b64dbe21385ed633f499fd7317611272a446ed722cf4dae8fa2a47d79498eff329dcd639cedb101c9b468ebc638582f825848fde8c5297965067ef94cbfc89226bcbb3ddeed704bee5dde3e7fabf798e12fdc6d6648f8ead159ae9265d622b9d495d87951c4332ec95bd593b1d042fcb21371e4f208e6db7272096adcea63244c1d221faedb87ed5bf045d805163dfeb69f1c652f85a935db9f7c4d91a466422f6259d93fec66cd2241982083cadc587b31dfbf3c7b3f414cc967bd03d968985399fc93668085c", 0x1000}, {&(0x7f0000001100)="802aa2dec4a29bfd6d0a8eac039a9ac94684773409fba9ce2e1531c23005acfe2a9c1afd1f9610e7fb4625b59c160fce0cf3594dedb22f873506c89c4b3b7968eb2fba4695ff6d1ba760f09603acc34bf0518002a9bf70db7185c100f9", 0x5d}], 0x2, 0xb54, 0x8, 0x6) [ 821.365129] FAULT_INJECTION: forcing a failure. [ 821.365129] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 821.367777] CPU: 0 PID: 6640 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 821.369228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.369332] FAULT_INJECTION: forcing a failure. [ 821.369332] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 821.370982] Call Trace: [ 821.371009] dump_stack+0x107/0x167 [ 821.371033] should_fail.cold+0x5/0xa [ 821.374505] __alloc_pages_nodemask+0x182/0x600 [ 821.375497] ? add_mm_counter_fast+0x220/0x220 [ 821.376471] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 821.377747] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 821.378856] ? lock_downgrade+0x6d0/0x6d0 [ 821.379752] ? mark_held_locks+0x9e/0xe0 [ 821.380619] alloc_pages_vma+0xbb/0x410 [ 821.381464] handle_mm_fault+0x152f/0x3500 [ 821.382370] ? do_raw_spin_lock+0x121/0x260 [ 821.383280] ? rwlock_bug.part.0+0x90/0x90 [ 821.384183] ? __pmd_alloc+0x630/0x630 [ 821.385037] __get_user_pages+0x6ec/0x1620 [ 821.385945] ? follow_page_mask+0x1900/0x1900 [ 821.386900] ? down_read+0x10f/0x430 [ 821.387697] ? down_write+0x160/0x160 [ 821.388519] get_user_pages_unlocked+0x18a/0x690 [ 821.389523] ? internal_get_user_pages_fast+0xdce/0x2640 [ 821.390672] ? pin_user_pages_locked+0x7b0/0x7b0 [ 821.391693] internal_get_user_pages_fast+0x175f/0x2640 [ 821.392841] ? pin_user_pages_unlocked+0x80/0x80 [ 821.393837] ? trace_hardirqs_on+0x5b/0x180 [ 821.394753] get_user_pages_fast+0x66/0xa0 [ 821.395646] iov_iter_get_pages+0x297/0xf40 [ 821.396557] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 821.397588] ? mempool_resize+0x7d0/0x7d0 [ 821.398472] bio_iov_iter_get_pages+0x22a/0x1200 [ 821.399479] ? bvec_alloc+0x17e/0x2f0 [ 821.400280] ? bio_alloc_bioset+0x2a1/0x600 [ 821.401197] ? bio_add_pc_page+0x100/0x100 [ 821.402092] ? bvec_alloc+0x290/0x2f0 [ 821.402892] ? iov_iter_npages+0x1fd/0xa70 [ 821.403786] ? ext4_iomap_begin+0x1a0/0x700 [ 821.404700] iomap_dio_bio_actor+0x77a/0xef0 [ 821.405648] iomap_dio_actor+0x36f/0x560 [ 821.406505] iomap_apply+0x289/0x810 [ 821.407290] ? iomap_dio_rw+0x90/0x90 [ 821.408098] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 821.409313] ? delete_from_page_cache_batch+0xa30/0xa30 [ 821.410424] ? mark_held_locks+0x9e/0xe0 [ 821.411291] ? filemap_check_errors+0xa5/0x150 [ 821.412282] __iomap_dio_rw+0x6cd/0x1110 [ 821.413145] ? iomap_dio_rw+0x90/0x90 [ 821.413970] ? iomap_dio_bio_actor+0xef0/0xef0 [ 821.414933] ? down_read+0x10f/0x430 [ 821.415720] ? down_write+0x160/0x160 [ 821.416526] iomap_dio_rw+0x31/0x90 [ 821.417295] ext4_file_read_iter+0x2c7/0x4c0 [ 821.418219] new_sync_read+0x424/0x6f0 [ 821.419035] ? ksys_lseek+0x1b0/0x1b0 [ 821.419861] ? fsnotify_perm.part.0+0x22d/0x620 [ 821.420845] ? security_file_permission+0xb1/0xe0 [ 821.421863] vfs_read+0x4da/0x620 [ 821.422612] ksys_read+0x12d/0x260 [ 821.423365] ? vfs_write+0xb10/0xb10 [ 821.424159] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 821.425254] ? syscall_enter_from_user_mode+0x1d/0x50 [ 821.426354] do_syscall_64+0x33/0x40 [ 821.427141] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 821.428224] RIP: 0033:0x7fe6449f5b19 [ 821.429005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.432889] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 821.434498] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 821.436003] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 821.437503] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.439007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.440527] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 821.442054] CPU: 1 PID: 6642 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 821.442866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.443831] Call Trace: [ 821.444141] dump_stack+0x107/0x167 [ 821.444566] should_fail.cold+0x5/0xa [ 821.445005] __alloc_pages_nodemask+0x182/0x600 [ 821.445541] ? add_mm_counter_fast+0x220/0x220 [ 821.446065] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 821.446764] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 821.447365] ? lock_downgrade+0x6d0/0x6d0 [ 821.447848] ? mark_held_locks+0x9e/0xe0 [ 821.448329] alloc_pages_vma+0xbb/0x410 [ 821.448800] handle_mm_fault+0x152f/0x3500 [ 821.449293] ? do_raw_spin_lock+0x121/0x260 [ 821.449797] ? rwlock_bug.part.0+0x90/0x90 [ 821.450282] ? __pmd_alloc+0x630/0x630 [ 821.450743] __get_user_pages+0x6ec/0x1620 [ 821.451242] ? follow_page_mask+0x1900/0x1900 [ 821.451766] ? down_read+0x10f/0x430 [ 821.452191] ? down_write+0x160/0x160 [ 821.452635] get_user_pages_unlocked+0x18a/0x690 [ 821.453184] ? internal_get_user_pages_fast+0xdce/0x2640 [ 821.453808] ? pin_user_pages_locked+0x7b0/0x7b0 [ 821.454459] internal_get_user_pages_fast+0x175f/0x2640 [ 821.455230] ? pin_user_pages_unlocked+0x80/0x80 [ 821.455784] ? trace_hardirqs_on+0x5b/0x180 [ 821.456383] get_user_pages_fast+0x66/0xa0 [ 821.456966] iov_iter_get_pages+0x297/0xf40 [ 821.457476] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 821.458057] ? mempool_resize+0x7d0/0x7d0 [ 821.458701] bio_iov_iter_get_pages+0x22a/0x1200 [ 821.459283] ? bvec_alloc+0x17e/0x2f0 [ 821.459740] ? bio_alloc_bioset+0x2a1/0x600 [ 821.460233] ? bio_add_pc_page+0x100/0x100 [ 821.460724] ? bvec_alloc+0x290/0x2f0 [ 821.461168] ? iov_iter_npages+0x1fd/0xa70 [ 821.461659] ? ext4_iomap_begin+0x1a0/0x700 [ 821.462189] iomap_dio_bio_actor+0x77a/0xef0 [ 821.462707] iomap_dio_actor+0x36f/0x560 [ 821.463179] iomap_apply+0x289/0x810 [ 821.463624] ? iomap_dio_rw+0x90/0x90 [ 821.464061] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 821.464720] ? delete_from_page_cache_batch+0xa30/0xa30 [ 821.465338] ? mark_held_locks+0x9e/0xe0 [ 821.465812] ? filemap_check_errors+0xa5/0x150 [ 821.466346] __iomap_dio_rw+0x6cd/0x1110 [ 821.466813] ? iomap_dio_rw+0x90/0x90 [ 821.467262] ? iomap_dio_bio_actor+0xef0/0xef0 [ 821.467812] ? down_read+0x10f/0x430 [ 821.468236] ? down_write+0x160/0x160 [ 821.468686] iomap_dio_rw+0x31/0x90 [ 821.469106] ext4_file_read_iter+0x2c7/0x4c0 [ 821.469619] new_sync_read+0x424/0x6f0 [ 821.470071] ? ksys_lseek+0x1b0/0x1b0 [ 821.470523] ? fsnotify_perm.part.0+0x22d/0x620 [ 821.471063] ? security_file_permission+0xb1/0xe0 [ 821.471637] vfs_read+0x4da/0x620 [ 821.472046] ksys_read+0x12d/0x260 [ 821.472457] ? vfs_write+0xb10/0xb10 [ 821.472892] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 821.473499] ? syscall_enter_from_user_mode+0x1d/0x50 [ 821.474098] do_syscall_64+0x33/0x40 [ 821.474531] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 821.475128] RIP: 0033:0x7fb97f666b19 [ 821.475572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.477687] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 821.478568] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 821.479391] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 821.480220] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.481040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.481863] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:47:00 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8940, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:47:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 23) 05:47:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x107100, 0x42) read(r0, &(0x7f0000000000), 0x1b4000) [ 821.588733] loop4: detected capacity change from 0 to 41948160 [ 821.590269] FAULT_INJECTION: forcing a failure. [ 821.590269] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 821.591669] CPU: 1 PID: 6656 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 821.592466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.593437] Call Trace: [ 821.593751] dump_stack+0x107/0x167 [ 821.594177] should_fail.cold+0x5/0xa [ 821.594632] __alloc_pages_nodemask+0x182/0x600 [ 821.595175] ? add_mm_counter_fast+0x220/0x220 [ 821.595726] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 821.596416] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 821.597026] ? lock_downgrade+0x6d0/0x6d0 [ 821.597508] ? mark_held_locks+0x9e/0xe0 [ 821.597979] alloc_pages_vma+0xbb/0x410 [ 821.598442] handle_mm_fault+0x152f/0x3500 [ 821.598931] ? do_raw_spin_lock+0x121/0x260 [ 821.599435] ? rwlock_bug.part.0+0x90/0x90 [ 821.599931] ? __pmd_alloc+0x630/0x630 [ 821.600392] __get_user_pages+0x6ec/0x1620 [ 821.600904] ? follow_page_mask+0x1900/0x1900 [ 821.601424] ? down_read+0x10f/0x430 [ 821.601859] ? down_write+0x160/0x160 [ 821.602312] get_user_pages_unlocked+0x18a/0x690 [ 821.602863] ? internal_get_user_pages_fast+0xdce/0x2640 [ 821.603503] ? pin_user_pages_locked+0x7b0/0x7b0 [ 821.604059] internal_get_user_pages_fast+0x175f/0x2640 [ 821.604700] ? pin_user_pages_unlocked+0x80/0x80 [ 821.605253] ? trace_hardirqs_on+0x5b/0x180 [ 821.605756] get_user_pages_fast+0x66/0xa0 [ 821.606251] iov_iter_get_pages+0x297/0xf40 [ 821.606756] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 821.607328] ? mempool_resize+0x7d0/0x7d0 [ 821.607823] bio_iov_iter_get_pages+0x22a/0x1200 [ 821.608379] ? bvec_alloc+0x17e/0x2f0 [ 821.608824] ? bio_alloc_bioset+0x2a1/0x600 [ 821.609325] ? bio_add_pc_page+0x100/0x100 [ 821.609821] ? bvec_alloc+0x290/0x2f0 [ 821.610268] ? iov_iter_npages+0x1fd/0xa70 [ 821.610761] ? ext4_iomap_begin+0x1a0/0x700 [ 821.611270] iomap_dio_bio_actor+0x77a/0xef0 [ 821.611800] iomap_dio_actor+0x36f/0x560 [ 821.612279] iomap_apply+0x289/0x810 [ 821.612715] ? iomap_dio_rw+0x90/0x90 [ 821.613159] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 821.613876] ? delete_from_page_cache_batch+0xa30/0xa30 [ 821.614508] ? mark_held_locks+0x9e/0xe0 [ 821.614984] ? filemap_check_errors+0xa5/0x150 [ 821.615523] __iomap_dio_rw+0x6cd/0x1110 [ 821.615991] ? iomap_dio_rw+0x90/0x90 [ 821.616442] ? iomap_dio_bio_actor+0xef0/0xef0 [ 821.616975] ? down_read+0x10f/0x430 [ 821.617415] ? down_write+0x160/0x160 [ 821.617857] iomap_dio_rw+0x31/0x90 [ 821.618277] ext4_file_read_iter+0x2c7/0x4c0 [ 821.618786] new_sync_read+0x424/0x6f0 [ 821.619234] ? ksys_lseek+0x1b0/0x1b0 [ 821.619692] ? fsnotify_perm.part.0+0x22d/0x620 [ 821.620233] ? security_file_permission+0xb1/0xe0 [ 821.620812] vfs_read+0x4da/0x620 [ 821.621223] ksys_read+0x12d/0x260 [ 821.621633] ? vfs_write+0xb10/0xb10 [ 821.622068] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 821.622674] ? syscall_enter_from_user_mode+0x1d/0x50 [ 821.623275] do_syscall_64+0x33/0x40 [ 821.623712] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 821.624305] RIP: 0033:0x7f8e866d3b19 [ 821.624739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.626857] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 821.627739] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 821.628556] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 821.629375] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.630193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 821.631019] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 821.658525] FAULT_INJECTION: forcing a failure. [ 821.658525] name failslab, interval 1, probability 0, space 0, times 0 [ 821.660541] CPU: 1 PID: 6658 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 821.661334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 821.662302] Call Trace: [ 821.662610] dump_stack+0x107/0x167 [ 821.663035] should_fail.cold+0x5/0xa [ 821.663495] ? create_object.isra.0+0x3a/0xa30 [ 821.664022] should_failslab+0x5/0x20 [ 821.664461] kmem_cache_alloc+0x5b/0x310 [ 821.664933] create_object.isra.0+0x3a/0xa30 [ 821.665442] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 821.666030] kmem_cache_alloc+0x159/0x310 [ 821.666513] jbd2__journal_start+0x190/0x7e0 [ 821.667025] __ext4_journal_start_sb+0x214/0x390 [ 821.667588] ext4_dirty_inode+0xbc/0x130 [ 821.668053] ? ext4_setattr+0x21b0/0x21b0 [ 821.668536] __mark_inode_dirty+0x492/0xd40 [ 821.669035] ? current_time+0xac/0x120 [ 821.669487] generic_update_time+0x21c/0x370 [ 821.669995] ? igrab+0xc0/0xc0 [ 821.670366] file_update_time+0x43a/0x520 [ 821.670846] ? evict_inodes+0x470/0x470 [ 821.671309] ? down_write_killable+0x180/0x180 [ 821.671847] file_modified+0x7d/0xa0 [ 821.672279] ext4_buffered_write_iter+0xf9/0x4a0 [ 821.672827] ? __lock_acquire+0xbb1/0x5b00 [ 821.673320] ext4_file_write_iter+0x3ab/0x1530 [ 821.673850] ? __lock_acquire+0x1657/0x5b00 [ 821.674356] ? ext4_file_read_iter+0x4c0/0x4c0 [ 821.674890] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 821.675507] new_sync_write+0x42c/0x660 [ 821.675967] ? new_sync_read+0x6f0/0x6f0 [ 821.676434] ? ksys_write+0x12d/0x260 [ 821.676874] ? lock_release+0x680/0x680 [ 821.677333] ? avc_policy_seqno+0x9/0x70 [ 821.677798] ? selinux_file_permission+0x92/0x520 [ 821.678367] vfs_write+0x7c0/0xb10 [ 821.678783] ksys_write+0x12d/0x260 [ 821.679204] ? __ia32_sys_read+0xb0/0xb0 [ 821.679689] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 821.680293] ? syscall_enter_from_user_mode+0x1d/0x50 [ 821.680887] do_syscall_64+0x33/0x40 [ 821.681321] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 821.681914] RIP: 0033:0x7f69c26bfb19 [ 821.682344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.684466] RSP: 002b:00007f69bfbf3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 821.685334] RAX: ffffffffffffffda RBX: 00007f69c27d30e0 RCX: 00007f69c26bfb19 [ 821.686147] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000005 [ 821.687012] RBP: 00007f69bfbf31d0 R08: 0000000000000000 R09: 0000000000000000 [ 821.687837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 821.688650] R13: 00007ffdb68c537f R14: 00007f69bfbf3300 R15: 0000000000022000 05:47:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 23) [ 833.767806] FAULT_INJECTION: forcing a failure. [ 833.767806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 833.770973] CPU: 0 PID: 6664 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 833.772791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 833.775031] Call Trace: [ 833.775758] dump_stack+0x107/0x167 [ 833.776756] should_fail.cold+0x5/0xa [ 833.777777] __alloc_pages_nodemask+0x182/0x600 [ 833.779061] ? add_mm_counter_fast+0x220/0x220 [ 833.780198] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 833.781459] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 833.782550] ? lock_downgrade+0x6d0/0x6d0 [ 833.783419] ? mark_held_locks+0x9e/0xe0 [ 833.784311] alloc_pages_vma+0xbb/0x410 [ 833.785153] handle_mm_fault+0x152f/0x3500 [ 833.786043] ? do_raw_spin_lock+0x121/0x260 [ 833.786942] ? rwlock_bug.part.0+0x90/0x90 [ 833.787810] ? __pmd_alloc+0x630/0x630 [ 833.788683] __get_user_pages+0x6ec/0x1620 [ 833.789623] ? follow_page_mask+0x1900/0x1900 [ 833.790563] ? down_read+0x10f/0x430 [ 833.791369] ? down_write+0x160/0x160 [ 833.792218] get_user_pages_unlocked+0x18a/0x690 [ 833.793216] ? internal_get_user_pages_fast+0xdce/0x2640 [ 833.794377] ? pin_user_pages_locked+0x7b0/0x7b0 [ 833.795377] internal_get_user_pages_fast+0x175f/0x2640 [ 833.796501] ? pin_user_pages_unlocked+0x80/0x80 [ 833.797496] ? trace_hardirqs_on+0x5b/0x180 [ 833.798412] get_user_pages_fast+0x66/0xa0 [ 833.799320] iov_iter_get_pages+0x297/0xf40 05:47:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 24) 05:47:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 3) 05:47:13 executing program 5: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='user\x00', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) 05:47:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:47:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 26) 05:47:13 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8941, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:47:13 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) fsmount(r0, 0x1, 0x8) read(r0, &(0x7f0000000000), 0x1b4000) r1 = dup(r0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r4, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r3, r4) sendfile(r4, 0xffffffffffffffff, 0x0, 0x59) signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000200), 0x800) setresuid(0xffffffffffffffff, r6, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)=0x0) setreuid(r6, r7) setresuid(0xffffffffffffffff, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x1000000, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="b0f10a38cd315a2605582d6bf3dc9efcc368b263babcbc080071f06d8ed5d917258700000000", @ANYRESHEX=r2, @ANYBLOB="2c667363616368652c6d6d611a378d8161700500656275673d3073666666666666666666766666666666372c6d6d61702c7569643d", @ANYRESDEC=r5, @ANYBLOB="2c61707072616973652c666f776e65720411ac6d3e", @ANYRESDEC=0xee00, @ANYBLOB=',uid=', @ANYRESDEC, @ANYBLOB="2c7375626a96b9d3606100f5376f776e65723e1e2d5b19630200fd3252ab14dcef88acbeba1f925525eb5f241266d6779fed416d1b2b37260a27e022e3e57b236fb1b0fb7caab6f158903f3e7f8e8843b06e96f12b4a90535d1c2bb5826497b3088b790f55168f5b3dfefe940e73ddd0178c4e76fcbd", @ANYRESDEC=0xee01, @ANYBLOB=',subj_role=(!5c\x00'/26]) [ 833.800235] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 833.801508] ? mempool_resize+0x7d0/0x7d0 [ 833.802128] FAULT_INJECTION: forcing a failure. [ 833.802128] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 833.802422] bio_iov_iter_get_pages+0x22a/0x1200 [ 833.802451] ? bvec_alloc+0x17e/0x2f0 [ 833.805632] ? bio_alloc_bioset+0x2a1/0x600 [ 833.806536] ? bio_add_pc_page+0x100/0x100 [ 833.807424] ? bvec_alloc+0x290/0x2f0 [ 833.808238] ? iov_iter_npages+0x1fd/0xa70 [ 833.809130] ? ext4_iomap_begin+0x1a0/0x700 [ 833.810054] iomap_dio_bio_actor+0x77a/0xef0 [ 833.810996] iomap_dio_actor+0x36f/0x560 [ 833.811872] iomap_apply+0x289/0x810 [ 833.812659] ? iomap_dio_rw+0x90/0x90 [ 833.813463] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 833.814676] ? delete_from_page_cache_batch+0xa30/0xa30 [ 833.815801] ? mark_held_locks+0x9e/0xe0 [ 833.816675] ? filemap_check_errors+0xa5/0x150 [ 833.817652] __iomap_dio_rw+0x6cd/0x1110 [ 833.818504] ? iomap_dio_rw+0x90/0x90 [ 833.819329] ? iomap_dio_bio_actor+0xef0/0xef0 [ 833.820310] ? down_read+0x10f/0x430 [ 833.821094] ? down_write+0x160/0x160 [ 833.821903] iomap_dio_rw+0x31/0x90 [ 833.822676] ext4_file_read_iter+0x2c7/0x4c0 [ 833.823605] new_sync_read+0x424/0x6f0 [ 833.824442] ? ksys_lseek+0x1b0/0x1b0 [ 833.825266] ? fsnotify_perm.part.0+0x22d/0x620 [ 833.826249] ? security_file_permission+0xb1/0xe0 [ 833.827275] vfs_read+0x4da/0x620 [ 833.828024] ksys_read+0x12d/0x260 [ 833.828770] ? vfs_write+0xb10/0xb10 [ 833.829558] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 833.830668] ? syscall_enter_from_user_mode+0x1d/0x50 [ 833.831769] do_syscall_64+0x33/0x40 [ 833.832551] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 833.833629] RIP: 0033:0x7fb97f666b19 [ 833.834413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 833.838285] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 833.839892] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 833.841393] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 833.842902] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 833.844421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 833.845923] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 833.847448] CPU: 1 PID: 6666 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 833.848285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 833.849285] Call Trace: [ 833.849605] dump_stack+0x107/0x167 [ 833.850034] should_fail.cold+0x5/0xa [ 833.850496] __alloc_pages_nodemask+0x182/0x600 [ 833.851115] ? add_mm_counter_fast+0x220/0x220 [ 833.851664] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 833.852377] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 833.852998] ? lock_downgrade+0x6d0/0x6d0 [ 833.853482] ? mark_held_locks+0x9e/0xe0 [ 833.853977] alloc_pages_vma+0xbb/0x410 [ 833.854447] handle_mm_fault+0x152f/0x3500 [ 833.854944] ? do_raw_spin_lock+0x121/0x260 [ 833.855459] ? rwlock_bug.part.0+0x90/0x90 [ 833.855962] ? __pmd_alloc+0x630/0x630 [ 833.856441] __get_user_pages+0x6ec/0x1620 [ 833.856941] ? follow_page_mask+0x1900/0x1900 [ 833.857469] ? down_read+0x10f/0x430 [ 833.857909] ? down_write+0x160/0x160 [ 833.858366] get_user_pages_unlocked+0x18a/0x690 [ 833.858920] ? internal_get_user_pages_fast+0xdce/0x2640 [ 833.859555] ? pin_user_pages_locked+0x7b0/0x7b0 [ 833.860121] internal_get_user_pages_fast+0x175f/0x2640 [ 833.860764] ? pin_user_pages_unlocked+0x80/0x80 [ 833.861320] ? trace_hardirqs_on+0x5b/0x180 [ 833.861827] get_user_pages_fast+0x66/0xa0 [ 833.862324] iov_iter_get_pages+0x297/0xf40 [ 833.862830] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 833.863418] ? mempool_resize+0x7d0/0x7d0 [ 833.863928] bio_iov_iter_get_pages+0x22a/0x1200 [ 833.864495] ? bvec_alloc+0x17e/0x2f0 [ 833.864941] ? bio_alloc_bioset+0x2a1/0x600 [ 833.865447] ? bio_add_pc_page+0x100/0x100 [ 833.865943] ? bvec_alloc+0x290/0x2f0 [ 833.866398] ? iov_iter_npages+0x1fd/0xa70 [ 833.866896] ? ext4_iomap_begin+0x1a0/0x700 [ 833.867406] iomap_dio_bio_actor+0x77a/0xef0 [ 833.867938] iomap_dio_actor+0x36f/0x560 [ 833.868417] iomap_apply+0x289/0x810 [ 833.868853] ? iomap_dio_rw+0x90/0x90 [ 833.869306] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 833.869978] ? delete_from_page_cache_batch+0xa30/0xa30 [ 833.870600] ? mark_held_locks+0x9e/0xe0 [ 833.871081] ? filemap_check_errors+0xa5/0x150 [ 833.871629] __iomap_dio_rw+0x6cd/0x1110 [ 833.872101] ? iomap_dio_rw+0x90/0x90 [ 833.872570] ? iomap_dio_bio_actor+0xef0/0xef0 [ 833.873110] ? down_read+0x10f/0x430 [ 833.873546] ? down_write+0x160/0x160 [ 833.873993] iomap_dio_rw+0x31/0x90 [ 833.874419] ext4_file_read_iter+0x2c7/0x4c0 [ 833.874940] new_sync_read+0x424/0x6f0 [ 833.875399] ? ksys_lseek+0x1b0/0x1b0 [ 833.875867] ? fsnotify_perm.part.0+0x22d/0x620 [ 833.876411] ? security_file_permission+0xb1/0xe0 [ 833.876989] vfs_read+0x4da/0x620 [ 833.877396] ksys_read+0x12d/0x260 [ 833.877820] ? vfs_write+0xb10/0xb10 [ 833.878262] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 833.878870] ? syscall_enter_from_user_mode+0x1d/0x50 [ 833.879471] do_syscall_64+0x33/0x40 [ 833.879909] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 833.880508] RIP: 0033:0x7f8e866d3b19 [ 833.880947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 833.883066] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 833.883975] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 833.884803] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 833.885630] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 833.886454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 833.887287] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 833.889711] FAULT_INJECTION: forcing a failure. 05:47:13 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8942, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 833.889711] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 833.892495] CPU: 0 PID: 6671 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 833.893947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 833.895921] Call Trace: [ 833.896484] dump_stack+0x107/0x167 [ 833.897253] should_fail.cold+0x5/0xa [ 833.898067] __alloc_pages_nodemask+0x182/0x600 [ 833.899046] ? add_mm_counter_fast+0x220/0x220 [ 833.900027] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 833.901314] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 833.902421] ? lock_downgrade+0x6d0/0x6d0 [ 833.903298] ? mark_held_locks+0x9e/0xe0 [ 833.904180] alloc_pages_vma+0xbb/0x410 [ 833.905041] handle_mm_fault+0x152f/0x3500 [ 833.905940] ? do_raw_spin_lock+0x121/0x260 [ 833.906849] ? rwlock_bug.part.0+0x90/0x90 [ 833.907765] ? __pmd_alloc+0x630/0x630 [ 833.908612] __get_user_pages+0x6ec/0x1620 [ 833.909525] ? follow_page_mask+0x1900/0x1900 [ 833.910485] ? down_read+0x10f/0x430 [ 833.911282] ? down_write+0x160/0x160 [ 833.912111] get_user_pages_unlocked+0x18a/0x690 [ 833.913129] ? internal_get_user_pages_fast+0xdce/0x2640 [ 833.914287] ? pin_user_pages_locked+0x7b0/0x7b0 [ 833.915316] internal_get_user_pages_fast+0x175f/0x2640 [ 833.916487] ? pin_user_pages_unlocked+0x80/0x80 [ 833.917508] ? trace_hardirqs_on+0x5b/0x180 [ 833.918424] get_user_pages_fast+0x66/0xa0 [ 833.919329] iov_iter_get_pages+0x297/0xf40 [ 833.920253] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 833.921293] ? mempool_resize+0x7d0/0x7d0 [ 833.922174] bio_iov_iter_get_pages+0x22a/0x1200 [ 833.923186] ? bvec_alloc+0x17e/0x2f0 [ 833.924011] ? bio_alloc_bioset+0x2a1/0x600 [ 833.924917] ? bio_add_pc_page+0x100/0x100 [ 833.925811] ? bvec_alloc+0x290/0x2f0 [ 833.926618] ? iov_iter_npages+0x1fd/0xa70 [ 833.927506] ? ext4_iomap_begin+0x1a0/0x700 [ 833.928428] iomap_dio_bio_actor+0x77a/0xef0 [ 833.929375] iomap_dio_actor+0x36f/0x560 [ 833.930236] iomap_apply+0x289/0x810 [ 833.931021] ? iomap_dio_rw+0x90/0x90 [ 833.931844] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 833.933059] ? delete_from_page_cache_batch+0xa30/0xa30 [ 833.934185] ? mark_held_locks+0x9e/0xe0 [ 833.935048] ? filemap_check_errors+0xa5/0x150 [ 833.936034] __iomap_dio_rw+0x6cd/0x1110 [ 833.936886] ? iomap_dio_rw+0x90/0x90 [ 833.937712] ? iomap_dio_bio_actor+0xef0/0xef0 [ 833.938679] ? down_read+0x10f/0x430 [ 833.939467] ? down_write+0x160/0x160 [ 833.940284] iomap_dio_rw+0x31/0x90 [ 833.941053] ext4_file_read_iter+0x2c7/0x4c0 [ 833.941981] new_sync_read+0x424/0x6f0 [ 833.942812] ? ksys_lseek+0x1b0/0x1b0 [ 833.943641] ? fsnotify_perm.part.0+0x22d/0x620 [ 833.944628] ? security_file_permission+0xb1/0xe0 [ 833.945651] vfs_read+0x4da/0x620 [ 833.946387] ksys_read+0x12d/0x260 [ 833.947132] ? vfs_write+0xb10/0xb10 [ 833.947925] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 833.949028] ? syscall_enter_from_user_mode+0x1d/0x50 [ 833.950118] do_syscall_64+0x33/0x40 [ 833.950909] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 833.951992] RIP: 0033:0x7fe6449f5b19 [ 833.952780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 833.956648] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 833.958260] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 833.959784] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 833.961295] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 833.962827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 833.964340] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 [ 833.982972] loop4: detected capacity change from 0 to 41948160 05:47:13 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8943, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 834.012377] FAULT_INJECTION: forcing a failure. [ 834.012377] name failslab, interval 1, probability 0, space 0, times 0 [ 834.013699] CPU: 1 PID: 6686 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 834.014487] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 834.015433] Call Trace: [ 834.015750] dump_stack+0x107/0x167 [ 834.016167] should_fail.cold+0x5/0xa [ 834.016616] ? jbd2__journal_start+0x190/0x7e0 [ 834.017140] should_failslab+0x5/0x20 [ 834.017580] kmem_cache_alloc+0x5b/0x310 [ 834.018052] jbd2__journal_start+0x190/0x7e0 [ 834.018572] __ext4_journal_start_sb+0x214/0x390 [ 834.019123] ext4_da_write_begin+0x51f/0xd40 [ 834.019650] ? ext4_write_begin+0x10f0/0x10f0 [ 834.020166] ? copyout_mc+0x140/0x140 [ 834.020200] 9pnet: Insufficient options for proto=fd [ 834.020596] ? ext4_dirty_inode+0x107/0x130 [ 834.020640] ? __mark_inode_dirty+0x12e/0xd40 [ 834.020654] generic_perform_write+0x20a/0x4f0 [ 834.020672] ? page_cache_prev_miss+0x310/0x310 [ 834.020685] ? down_write_killable+0x180/0x180 [ 834.020703] ext4_buffered_write_iter+0x232/0x4a0 [ 834.020716] ? __lock_acquire+0xbb1/0x5b00 [ 834.020729] ext4_file_write_iter+0x3ab/0x1530 [ 834.020742] ? __lock_acquire+0x1657/0x5b00 [ 834.020758] ? ext4_file_read_iter+0x4c0/0x4c0 [ 834.020772] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 834.020792] new_sync_write+0x42c/0x660 [ 834.020812] ? new_sync_read+0x6f0/0x6f0 [ 834.028498] ? ksys_write+0x12d/0x260 [ 834.028935] ? lock_release+0x680/0x680 [ 834.029397] ? avc_policy_seqno+0x9/0x70 [ 834.029876] ? selinux_file_permission+0x92/0x520 [ 834.030447] vfs_write+0x7c0/0xb10 [ 834.030864] ksys_write+0x12d/0x260 [ 834.031285] ? __ia32_sys_read+0xb0/0xb0 [ 834.031765] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 834.032371] ? syscall_enter_from_user_mode+0x1d/0x50 [ 834.032966] do_syscall_64+0x33/0x40 [ 834.033392] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 834.033989] RIP: 0033:0x7f69c26bfb19 [ 834.034414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 834.036560] RSP: 002b:00007f69bfc14188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 834.037444] RAX: ffffffffffffffda RBX: 00007f69c27d3020 RCX: 00007f69c26bfb19 [ 834.038270] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000005 [ 834.039090] RBP: 00007f69bfc141d0 R08: 0000000000000000 R09: 0000000000000000 [ 834.039929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 834.040756] R13: 00007ffdb68c537f R14: 00007f69bfc14300 R15: 0000000000022000 05:47:13 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 24) 05:47:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:47:13 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 25) 05:47:13 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x303300, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x109002, 0x38) read(r0, &(0x7f0000000000), 0x1b4000) [ 834.063980] mac80211_hwsim hwsim10 wlan1: refused to change device tx_queue_len 05:47:13 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 27) [ 834.102023] FAULT_INJECTION: forcing a failure. [ 834.102023] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 834.104591] CPU: 0 PID: 6694 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 834.106038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 834.107803] Call Trace: [ 834.108369] dump_stack+0x107/0x167 [ 834.109140] should_fail.cold+0x5/0xa [ 834.109950] __alloc_pages_nodemask+0x182/0x600 [ 834.110931] ? add_mm_counter_fast+0x220/0x220 [ 834.111907] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 834.113182] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 834.114291] ? lock_downgrade+0x6d0/0x6d0 [ 834.115164] ? mark_held_locks+0x9e/0xe0 [ 834.116045] alloc_pages_vma+0xbb/0x410 [ 834.116889] handle_mm_fault+0x152f/0x3500 [ 834.117782] ? do_raw_spin_lock+0x121/0x260 [ 834.118693] ? rwlock_bug.part.0+0x90/0x90 [ 834.119589] ? __pmd_alloc+0x630/0x630 [ 834.120456] __get_user_pages+0x6ec/0x1620 [ 834.121369] ? follow_page_mask+0x1900/0x1900 [ 834.122328] ? down_read+0x10f/0x430 [ 834.123122] ? down_write+0x160/0x160 [ 834.123956] get_user_pages_unlocked+0x18a/0x690 [ 834.124970] ? internal_get_user_pages_fast+0xdce/0x2640 [ 834.126127] ? pin_user_pages_locked+0x7b0/0x7b0 [ 834.127150] internal_get_user_pages_fast+0x175f/0x2640 [ 834.128332] ? pin_user_pages_unlocked+0x80/0x80 [ 834.129361] ? trace_hardirqs_on+0x5b/0x180 [ 834.130299] get_user_pages_fast+0x66/0xa0 [ 834.131215] iov_iter_get_pages+0x297/0xf40 [ 834.132140] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 834.133187] ? mempool_resize+0x7d0/0x7d0 [ 834.134075] bio_iov_iter_get_pages+0x22a/0x1200 [ 834.135093] ? bvec_alloc+0x17e/0x2f0 [ 834.135907] ? bio_alloc_bioset+0x2a1/0x600 [ 834.136829] ? bio_add_pc_page+0x100/0x100 [ 834.137721] ? bvec_alloc+0x290/0x2f0 [ 834.138319] FAULT_INJECTION: forcing a failure. [ 834.138319] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 834.138536] ? iov_iter_npages+0x1fd/0xa70 [ 834.138563] ? ext4_iomap_begin+0x1a0/0x700 [ 834.141740] iomap_dio_bio_actor+0x77a/0xef0 [ 834.142694] iomap_dio_actor+0x36f/0x560 [ 834.143567] iomap_apply+0x289/0x810 [ 834.144367] ? iomap_dio_rw+0x90/0x90 [ 834.145181] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 834.146415] ? delete_from_page_cache_batch+0xa30/0xa30 [ 834.147517] ? mark_held_locks+0x9e/0xe0 [ 834.148409] ? filemap_check_errors+0xa5/0x150 [ 834.149399] __iomap_dio_rw+0x6cd/0x1110 [ 834.150263] ? iomap_dio_rw+0x90/0x90 [ 834.151098] ? iomap_dio_bio_actor+0xef0/0xef0 [ 834.152085] ? down_read+0x10f/0x430 [ 834.152890] ? down_write+0x160/0x160 [ 834.153709] iomap_dio_rw+0x31/0x90 [ 834.154485] ext4_file_read_iter+0x2c7/0x4c0 [ 834.155424] new_sync_read+0x424/0x6f0 [ 834.156260] ? ksys_lseek+0x1b0/0x1b0 [ 834.157092] ? fsnotify_perm.part.0+0x22d/0x620 [ 834.158087] ? security_file_permission+0xb1/0xe0 [ 834.159124] vfs_read+0x4da/0x620 [ 834.159880] ksys_read+0x12d/0x260 [ 834.160640] ? vfs_write+0xb10/0xb10 [ 834.161441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 834.162566] ? syscall_enter_from_user_mode+0x1d/0x50 [ 834.163687] do_syscall_64+0x33/0x40 [ 834.164484] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 834.165577] RIP: 0033:0x7fb97f666b19 [ 834.166366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 834.170315] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 834.171952] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 834.173480] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 834.175002] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 834.176535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 834.178072] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 834.179634] CPU: 1 PID: 6700 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 834.180435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 834.181382] Call Trace: [ 834.181697] dump_stack+0x107/0x167 [ 834.182119] should_fail.cold+0x5/0xa [ 834.182560] __alloc_pages_nodemask+0x182/0x600 [ 834.183099] ? add_mm_counter_fast+0x220/0x220 [ 834.183629] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 834.184322] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 834.184938] ? lock_downgrade+0x6d0/0x6d0 [ 834.185417] ? mark_held_locks+0x9e/0xe0 [ 834.185887] alloc_pages_vma+0xbb/0x410 [ 834.186355] handle_mm_fault+0x152f/0x3500 [ 834.186846] ? do_raw_spin_lock+0x121/0x260 [ 834.187341] ? rwlock_bug.part.0+0x90/0x90 [ 834.187846] ? __pmd_alloc+0x630/0x630 [ 834.188306] __get_user_pages+0x6ec/0x1620 [ 834.188802] ? follow_page_mask+0x1900/0x1900 [ 834.189318] ? down_read+0x10f/0x430 [ 834.189749] ? down_write+0x160/0x160 [ 834.190192] get_user_pages_unlocked+0x18a/0x690 [ 834.190882] ? internal_get_user_pages_fast+0xdce/0x2640 [ 834.191707] ? pin_user_pages_locked+0x7b0/0x7b0 [ 834.192268] internal_get_user_pages_fast+0x175f/0x2640 [ 834.192900] ? pin_user_pages_unlocked+0x80/0x80 [ 834.193445] ? trace_hardirqs_on+0x5b/0x180 [ 834.193945] get_user_pages_fast+0x66/0xa0 [ 834.194435] iov_iter_get_pages+0x297/0xf40 [ 834.194929] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 834.195494] ? mempool_resize+0x7d0/0x7d0 [ 834.195985] bio_iov_iter_get_pages+0x22a/0x1200 [ 834.196534] ? bvec_alloc+0x17e/0x2f0 [ 834.196979] ? bio_alloc_bioset+0x2a1/0x600 [ 834.197478] ? bio_add_pc_page+0x100/0x100 [ 834.197961] ? bvec_alloc+0x290/0x2f0 [ 834.198402] ? iov_iter_npages+0x1fd/0xa70 [ 834.198881] ? ext4_iomap_begin+0x1a0/0x700 [ 834.199385] iomap_dio_bio_actor+0x77a/0xef0 [ 834.199904] iomap_dio_actor+0x36f/0x560 [ 834.200365] iomap_apply+0x289/0x810 [ 834.200786] ? iomap_dio_rw+0x90/0x90 [ 834.201216] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 834.201869] ? delete_from_page_cache_batch+0xa30/0xa30 [ 834.202484] ? mark_held_locks+0x9e/0xe0 [ 834.202951] ? filemap_check_errors+0xa5/0x150 [ 834.203480] __iomap_dio_rw+0x6cd/0x1110 [ 834.203949] ? iomap_dio_rw+0x90/0x90 [ 834.204397] ? iomap_dio_bio_actor+0xef0/0xef0 [ 834.204921] ? down_read+0x10f/0x430 [ 834.205348] ? down_write+0x160/0x160 [ 834.205788] iomap_dio_rw+0x31/0x90 [ 834.206201] ext4_file_read_iter+0x2c7/0x4c0 [ 834.206705] new_sync_read+0x424/0x6f0 [ 834.207144] ? ksys_lseek+0x1b0/0x1b0 [ 834.207590] ? fsnotify_perm.part.0+0x22d/0x620 [ 834.208126] ? security_file_permission+0xb1/0xe0 [ 834.208677] vfs_read+0x4da/0x620 [ 834.209071] ksys_read+0x12d/0x260 [ 834.209484] ? vfs_write+0xb10/0xb10 [ 834.209911] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 834.210530] ? syscall_enter_from_user_mode+0x1d/0x50 [ 834.211114] do_syscall_64+0x33/0x40 [ 834.211546] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 834.212132] RIP: 0033:0x7f8e866d3b19 [ 834.212553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 834.214667] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 834.215525] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 834.216334] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 834.217137] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 834.217944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 834.218746] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 834.220314] FAULT_INJECTION: forcing a failure. [ 834.220314] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 834.221896] CPU: 1 PID: 6693 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 834.222856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 834.224027] Call Trace: [ 834.224334] dump_stack+0x107/0x167 [ 834.224760] should_fail.cold+0x5/0xa [ 834.225205] __alloc_pages_nodemask+0x182/0x600 [ 834.225746] ? add_mm_counter_fast+0x220/0x220 [ 834.226283] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 834.226986] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 834.227594] ? lock_downgrade+0x6d0/0x6d0 [ 834.228083] ? mark_held_locks+0x9e/0xe0 [ 834.228561] alloc_pages_vma+0xbb/0x410 [ 834.229024] handle_mm_fault+0x152f/0x3500 [ 834.229515] ? do_raw_spin_lock+0x121/0x260 [ 834.230014] ? rwlock_bug.part.0+0x90/0x90 [ 834.230494] ? __pmd_alloc+0x630/0x630 [ 834.230963] __get_user_pages+0x6ec/0x1620 [ 834.231454] ? follow_page_mask+0x1900/0x1900 [ 834.231979] ? down_read+0x10f/0x430 [ 834.232404] ? down_write+0x160/0x160 [ 834.232846] get_user_pages_unlocked+0x18a/0x690 [ 834.233385] ? internal_get_user_pages_fast+0xdce/0x2640 [ 834.234000] ? pin_user_pages_locked+0x7b0/0x7b0 [ 834.234551] internal_get_user_pages_fast+0x175f/0x2640 [ 834.235187] ? pin_user_pages_unlocked+0x80/0x80 [ 834.235741] ? trace_hardirqs_on+0x5b/0x180 [ 834.236241] get_user_pages_fast+0x66/0xa0 [ 834.236724] iov_iter_get_pages+0x297/0xf40 [ 834.237221] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 834.237776] ? mempool_resize+0x7d0/0x7d0 [ 834.238265] bio_iov_iter_get_pages+0x22a/0x1200 [ 834.238813] ? bvec_alloc+0x17e/0x2f0 [ 834.239260] ? bio_alloc_bioset+0x2a1/0x600 [ 834.239762] ? bio_add_pc_page+0x100/0x100 [ 834.240256] ? bvec_alloc+0x290/0x2f0 [ 834.240699] ? iov_iter_npages+0x1fd/0xa70 [ 834.241194] ? ext4_iomap_begin+0x1a0/0x700 [ 834.241699] iomap_dio_bio_actor+0x77a/0xef0 [ 834.242219] iomap_dio_actor+0x36f/0x560 [ 834.242698] iomap_apply+0x289/0x810 [ 834.243125] ? iomap_dio_rw+0x90/0x90 [ 834.243570] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 834.244241] ? delete_from_page_cache_batch+0xa30/0xa30 [ 834.244860] ? mark_held_locks+0x9e/0xe0 [ 834.245340] ? filemap_check_errors+0xa5/0x150 [ 834.245875] __iomap_dio_rw+0x6cd/0x1110 [ 834.246336] ? iomap_dio_rw+0x90/0x90 [ 834.246778] ? iomap_dio_bio_actor+0xef0/0xef0 [ 834.247301] ? down_read+0x10f/0x430 [ 834.247731] ? down_write+0x160/0x160 [ 834.248170] iomap_dio_rw+0x31/0x90 [ 834.248585] ext4_file_read_iter+0x2c7/0x4c0 [ 834.249089] new_sync_read+0x424/0x6f0 [ 834.249543] ? ksys_lseek+0x1b0/0x1b0 [ 834.249982] ? fsnotify_perm.part.0+0x22d/0x620 [ 834.250527] ? security_file_permission+0xb1/0xe0 [ 834.251087] vfs_read+0x4da/0x620 [ 834.251497] ksys_read+0x12d/0x260 [ 834.251912] ? vfs_write+0xb10/0xb10 [ 834.252350] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 834.252957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 834.253557] do_syscall_64+0x33/0x40 [ 834.253987] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 834.254586] RIP: 0033:0x7fe6449f5b19 [ 834.255013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 834.257166] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 834.258045] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 834.258869] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 834.259697] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 834.260527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 834.261361] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:47:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 26) 05:47:25 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8947, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:47:25 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 28) 05:47:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 4) [ 846.092117] FAULT_INJECTION: forcing a failure. [ 846.092117] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 846.093529] CPU: 1 PID: 6711 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 846.094330] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.095272] Call Trace: [ 846.095579] dump_stack+0x107/0x167 [ 846.096007] should_fail.cold+0x5/0xa [ 846.096461] __alloc_pages_nodemask+0x182/0x600 05:47:25 executing program 3: ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000000)=0x4) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x80, 0x6, 0x7}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) 05:47:25 executing program 5: read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000001240)='./file0\x00', 0x80100) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) fdatasync(r1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x220000, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r1, 0x50009401, &(0x7f0000000180)={{r2}, "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"}) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000000)) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = inotify_init1(0x800) ioctl$BTRFS_IOC_INO_PATHS(r5, 0xc0389423, &(0x7f0000001200)={0x180000000000, 0x50, [0x61c65cbf, 0x9, 0x2, 0x100000001], &(0x7f0000001180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) getsockopt$sock_timeval(r4, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r3, r4) preadv(r4, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/59, 0x3b}], 0x1, 0x80, 0x0) 05:47:25 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 25) [ 846.097156] ? add_mm_counter_fast+0x220/0x220 [ 846.097819] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 05:47:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 846.098512] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 846.099220] ? lock_downgrade+0x6d0/0x6d0 [ 846.099710] ? mark_held_locks+0x9e/0xe0 [ 846.100193] alloc_pages_vma+0xbb/0x410 [ 846.100651] handle_mm_fault+0x152f/0x3500 [ 846.101137] ? do_raw_spin_lock+0x121/0x260 [ 846.101633] ? rwlock_bug.part.0+0x90/0x90 [ 846.102121] ? __pmd_alloc+0x630/0x630 [ 846.102582] __get_user_pages+0x6ec/0x1620 [ 846.103071] ? follow_page_mask+0x1900/0x1900 [ 846.103584] ? down_read+0x10f/0x430 [ 846.104014] ? down_write+0x160/0x160 [ 846.104465] get_user_pages_unlocked+0x18a/0x690 [ 846.105051] ? internal_get_user_pages_fast+0xdce/0x2640 [ 846.105678] ? pin_user_pages_locked+0x7b0/0x7b0 [ 846.106224] internal_get_user_pages_fast+0x175f/0x2640 [ 846.106851] ? pin_user_pages_unlocked+0x80/0x80 [ 846.107390] ? trace_hardirqs_on+0x5b/0x180 [ 846.107895] get_user_pages_fast+0x66/0xa0 [ 846.108383] iov_iter_get_pages+0x297/0xf40 [ 846.108882] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 846.109442] ? mempool_resize+0x7d0/0x7d0 [ 846.109922] bio_iov_iter_get_pages+0x22a/0x1200 [ 846.110471] ? bvec_alloc+0x17e/0x2f0 [ 846.110912] ? bio_alloc_bioset+0x2a1/0x600 [ 846.111408] ? bio_add_pc_page+0x100/0x100 [ 846.111911] ? bvec_alloc+0x290/0x2f0 [ 846.112354] ? iov_iter_npages+0x1fd/0xa70 [ 846.112835] ? ext4_iomap_begin+0x1a0/0x700 [ 846.113332] iomap_dio_bio_actor+0x77a/0xef0 [ 846.113849] iomap_dio_actor+0x36f/0x560 [ 846.114317] iomap_apply+0x289/0x810 [ 846.114749] ? iomap_dio_rw+0x90/0x90 [ 846.115187] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 846.115855] ? delete_from_page_cache_batch+0xa30/0xa30 [ 846.116458] ? mark_held_locks+0x9e/0xe0 [ 846.116736] FAULT_INJECTION: forcing a failure. [ 846.116736] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 846.116938] ? filemap_check_errors+0xa5/0x150 [ 846.119921] __iomap_dio_rw+0x6cd/0x1110 [ 846.120383] ? iomap_dio_rw+0x90/0x90 [ 846.120837] ? iomap_dio_bio_actor+0xef0/0xef0 [ 846.121362] ? down_read+0x10f/0x430 [ 846.121790] ? down_write+0x160/0x160 [ 846.122227] iomap_dio_rw+0x31/0x90 [ 846.122645] ext4_file_read_iter+0x2c7/0x4c0 [ 846.123149] new_sync_read+0x424/0x6f0 [ 846.123600] ? ksys_lseek+0x1b0/0x1b0 [ 846.124061] ? fsnotify_perm.part.0+0x22d/0x620 [ 846.124590] ? security_file_permission+0xb1/0xe0 [ 846.125145] vfs_read+0x4da/0x620 [ 846.125547] ksys_read+0x12d/0x260 [ 846.125954] ? vfs_write+0xb10/0xb10 [ 846.126392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.126993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.127581] do_syscall_64+0x33/0x40 [ 846.128018] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 846.128603] RIP: 0033:0x7f8e866d3b19 [ 846.129033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.131135] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 846.132021] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 846.132834] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 846.133662] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 846.134471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 846.135291] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 846.136139] CPU: 0 PID: 6720 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 846.137574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.139286] Call Trace: [ 846.139884] dump_stack+0x107/0x167 [ 846.140661] should_fail.cold+0x5/0xa [ 846.141456] __alloc_pages_nodemask+0x182/0x600 [ 846.142429] ? add_mm_counter_fast+0x220/0x220 [ 846.143397] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 846.144671] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 846.145764] ? lock_downgrade+0x6d0/0x6d0 [ 846.146633] ? mark_held_locks+0x9e/0xe0 [ 846.147513] alloc_pages_vma+0xbb/0x410 [ 846.148360] handle_mm_fault+0x152f/0x3500 [ 846.149264] ? do_raw_spin_lock+0x121/0x260 [ 846.150169] ? rwlock_bug.part.0+0x90/0x90 [ 846.151047] ? __pmd_alloc+0x630/0x630 [ 846.151898] __get_user_pages+0x6ec/0x1620 [ 846.152803] ? follow_page_mask+0x1900/0x1900 [ 846.153728] ? down_read+0x10f/0x430 [ 846.154502] ? down_write+0x160/0x160 [ 846.155313] get_user_pages_unlocked+0x18a/0x690 [ 846.156323] ? internal_get_user_pages_fast+0xdce/0x2640 [ 846.157451] ? pin_user_pages_locked+0x7b0/0x7b0 [ 846.158487] internal_get_user_pages_fast+0x175f/0x2640 [ 846.159633] ? pin_user_pages_unlocked+0x80/0x80 [ 846.160867] ? trace_hardirqs_on+0x5b/0x180 [ 846.161768] get_user_pages_fast+0x66/0xa0 [ 846.162688] iov_iter_get_pages+0x297/0xf40 [ 846.163606] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 846.164693] ? mempool_resize+0x7d0/0x7d0 [ 846.165573] bio_iov_iter_get_pages+0x22a/0x1200 [ 846.166580] ? bvec_alloc+0x17e/0x2f0 [ 846.167368] ? bio_alloc_bioset+0x2a1/0x600 [ 846.168286] ? bio_add_pc_page+0x100/0x100 [ 846.169164] ? bvec_alloc+0x290/0x2f0 [ 846.169962] ? iov_iter_npages+0x1fd/0xa70 [ 846.170849] ? ext4_iomap_begin+0x1a0/0x700 [ 846.171789] iomap_dio_bio_actor+0x77a/0xef0 [ 846.172744] iomap_dio_actor+0x36f/0x560 [ 846.173601] iomap_apply+0x289/0x810 [ 846.174378] ? iomap_dio_rw+0x90/0x90 [ 846.175174] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 846.176384] ? delete_from_page_cache_batch+0xa30/0xa30 [ 846.177485] ? mark_held_locks+0x9e/0xe0 [ 846.178365] ? filemap_check_errors+0xa5/0x150 [ 846.179318] __iomap_dio_rw+0x6cd/0x1110 [ 846.180195] ? iomap_dio_rw+0x90/0x90 [ 846.181017] ? iomap_dio_bio_actor+0xef0/0xef0 [ 846.182001] ? down_read+0x10f/0x430 [ 846.182765] ? down_write+0x160/0x160 [ 846.183586] iomap_dio_rw+0x31/0x90 [ 846.184354] ext4_file_read_iter+0x2c7/0x4c0 [ 846.185262] new_sync_read+0x424/0x6f0 [ 846.186095] ? ksys_lseek+0x1b0/0x1b0 [ 846.186915] ? fsnotify_perm.part.0+0x22d/0x620 [ 846.187925] ? security_file_permission+0xb1/0xe0 [ 846.188948] vfs_read+0x4da/0x620 [ 846.189695] ksys_read+0x12d/0x260 [ 846.190425] ? vfs_write+0xb10/0xb10 [ 846.191225] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.192314] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.193160] FAULT_INJECTION: forcing a failure. [ 846.193160] name failslab, interval 1, probability 0, space 0, times 0 [ 846.193394] do_syscall_64+0x33/0x40 [ 846.193415] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 846.193433] RIP: 0033:0x7fb97f666b19 [ 846.197281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.201102] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 846.202661] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 846.204146] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 846.205612] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 846.207089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 846.208575] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 846.210074] CPU: 1 PID: 6725 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 846.210920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.211925] Call Trace: [ 846.212246] dump_stack+0x107/0x167 [ 846.212686] should_fail.cold+0x5/0xa [ 846.213135] ? create_object.isra.0+0x3a/0xa30 [ 846.213678] should_failslab+0x5/0x20 [ 846.214131] kmem_cache_alloc+0x5b/0x310 [ 846.214617] ? find_get_entry+0x2c8/0x740 [ 846.215106] create_object.isra.0+0x3a/0xa30 [ 846.215317] FAULT_INJECTION: forcing a failure. [ 846.215317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 846.215620] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 846.215635] kmem_cache_alloc+0x159/0x310 [ 846.215661] jbd2__journal_start+0x190/0x7e0 [ 846.219620] __ext4_journal_start_sb+0x214/0x390 [ 846.220183] ext4_da_write_begin+0x51f/0xd40 [ 846.220713] ? ext4_write_begin+0x10f0/0x10f0 [ 846.221236] ? copyout_mc+0x140/0x140 [ 846.221704] ? ext4_dirty_inode+0x107/0x130 [ 846.222224] ? __mark_inode_dirty+0x12e/0xd40 [ 846.222745] generic_perform_write+0x20a/0x4f0 [ 846.223293] ? page_cache_prev_miss+0x310/0x310 [ 846.223851] ? down_write_killable+0x180/0x180 [ 846.224389] ext4_buffered_write_iter+0x232/0x4a0 [ 846.224950] ? __lock_acquire+0xbb1/0x5b00 [ 846.225443] ext4_file_write_iter+0x3ab/0x1530 [ 846.225983] ? __lock_acquire+0x1657/0x5b00 [ 846.226498] ? ext4_file_read_iter+0x4c0/0x4c0 [ 846.227045] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 846.227662] new_sync_write+0x42c/0x660 [ 846.228134] ? new_sync_read+0x6f0/0x6f0 [ 846.228600] ? ksys_write+0x12d/0x260 [ 846.229064] ? lock_release+0x680/0x680 [ 846.229537] ? avc_policy_seqno+0x9/0x70 [ 846.230012] ? selinux_file_permission+0x92/0x520 [ 846.230599] vfs_write+0x7c0/0xb10 [ 846.231029] ksys_write+0x12d/0x260 [ 846.231463] ? __ia32_sys_read+0xb0/0xb0 [ 846.231947] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.232553] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.233161] do_syscall_64+0x33/0x40 [ 846.233601] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 846.234194] RIP: 0033:0x7f69c26bfb19 [ 846.234632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.236787] RSP: 002b:00007f69bfc14188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 846.237692] RAX: ffffffffffffffda RBX: 00007f69c27d3020 RCX: 00007f69c26bfb19 [ 846.238520] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000005 [ 846.239322] RBP: 00007f69bfc141d0 R08: 0000000000000000 R09: 0000000000000000 [ 846.240146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 846.240987] R13: 00007ffdb68c537f R14: 00007f69bfc14300 R15: 0000000000022000 05:47:25 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8948, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:47:25 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) read(r0, &(0x7f00000190c0)=""/102388, 0xfd2c) [ 846.241833] CPU: 0 PID: 6714 Comm: syz-executor.1 Not tainted 5.10.246 #1 [ 846.243568] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.245356] Call Trace: [ 846.245921] dump_stack+0x107/0x167 [ 846.246705] should_fail.cold+0x5/0xa [ 846.247521] __alloc_pages_nodemask+0x182/0x600 [ 846.248533] ? add_mm_counter_fast+0x220/0x220 [ 846.249513] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 846.250800] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 846.251930] ? lock_downgrade+0x6d0/0x6d0 [ 846.252817] ? mark_held_locks+0x9e/0xe0 [ 846.253689] alloc_pages_vma+0xbb/0x410 [ 846.254543] handle_mm_fault+0x152f/0x3500 [ 846.255452] ? do_raw_spin_lock+0x121/0x260 [ 846.256375] ? rwlock_bug.part.0+0x90/0x90 [ 846.257278] ? __pmd_alloc+0x630/0x630 [ 846.258142] __get_user_pages+0x6ec/0x1620 [ 846.259061] ? follow_page_mask+0x1900/0x1900 [ 846.260029] ? down_read+0x10f/0x430 [ 846.260822] ? down_write+0x160/0x160 [ 846.261644] get_user_pages_unlocked+0x18a/0x690 [ 846.262659] ? internal_get_user_pages_fast+0xdce/0x2640 [ 846.263823] ? pin_user_pages_locked+0x7b0/0x7b0 [ 846.264850] internal_get_user_pages_fast+0x175f/0x2640 [ 846.266018] ? pin_user_pages_unlocked+0x80/0x80 [ 846.267027] ? trace_hardirqs_on+0x5b/0x180 [ 846.267962] get_user_pages_fast+0x66/0xa0 [ 846.268870] iov_iter_get_pages+0x297/0xf40 [ 846.269793] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 846.270837] ? mempool_resize+0x7d0/0x7d0 [ 846.271733] bio_iov_iter_get_pages+0x22a/0x1200 [ 846.272758] ? bvec_alloc+0x17e/0x2f0 [ 846.273575] ? bio_alloc_bioset+0x2a1/0x600 [ 846.274496] ? bio_add_pc_page+0x100/0x100 [ 846.275396] ? bvec_alloc+0x290/0x2f0 [ 846.276218] ? iov_iter_npages+0x1fd/0xa70 [ 846.277116] ? ext4_iomap_begin+0x1a0/0x700 [ 846.278042] iomap_dio_bio_actor+0x77a/0xef0 [ 846.278995] iomap_dio_actor+0x36f/0x560 [ 846.279875] iomap_apply+0x289/0x810 [ 846.280669] ? iomap_dio_rw+0x90/0x90 [ 846.281486] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 846.282725] ? delete_from_page_cache_batch+0xa30/0xa30 [ 846.283869] ? mark_held_locks+0x9e/0xe0 [ 846.284746] ? filemap_check_errors+0xa5/0x150 [ 846.285726] __iomap_dio_rw+0x6cd/0x1110 [ 846.286587] ? iomap_dio_rw+0x90/0x90 [ 846.287411] ? iomap_dio_bio_actor+0xef0/0xef0 [ 846.287766] loop4: detected capacity change from 0 to 41948160 [ 846.288394] ? down_read+0x10f/0x430 [ 846.289902] ? down_write+0x160/0x160 [ 846.290721] iomap_dio_rw+0x31/0x90 [ 846.291498] ext4_file_read_iter+0x2c7/0x4c0 [ 846.292446] new_sync_read+0x424/0x6f0 [ 846.293275] ? ksys_lseek+0x1b0/0x1b0 [ 846.294093] ? fsnotify_perm.part.0+0x22d/0x620 [ 846.295084] ? security_file_permission+0xb1/0xe0 [ 846.296128] vfs_read+0x4da/0x620 [ 846.296872] ksys_read+0x12d/0x260 [ 846.297628] ? vfs_write+0xb10/0xb10 [ 846.298425] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.299538] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.300641] do_syscall_64+0x33/0x40 [ 846.301431] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 846.302522] RIP: 0033:0x7fe6449f5b19 [ 846.303312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.307231] RSP: 002b:00007fe641f6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 846.308854] RAX: ffffffffffffffda RBX: 00007fe644b08f60 RCX: 00007fe6449f5b19 [ 846.310366] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 846.311886] RBP: 00007fe641f6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 846.313401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 846.314914] R13: 00007ffe3b64f20f R14: 00007fe641f6b300 R15: 0000000000022000 05:47:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 27) 05:47:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 5) 05:47:25 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) pidfd_getfd(r0, r2, 0x0) 05:47:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 846.396268] FAULT_INJECTION: forcing a failure. [ 846.396268] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 846.397670] CPU: 1 PID: 6735 Comm: syz-executor.2 Not tainted 5.10.246 #1 [ 846.398444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.399400] Call Trace: [ 846.399712] dump_stack+0x107/0x167 [ 846.400143] should_fail.cold+0x5/0xa [ 846.400590] __alloc_pages_nodemask+0x182/0x600 [ 846.401126] ? add_mm_counter_fast+0x220/0x220 [ 846.401653] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 846.402347] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 846.402954] ? lock_downgrade+0x6d0/0x6d0 [ 846.403424] ? mark_held_locks+0x9e/0xe0 [ 846.403903] alloc_pages_vma+0xbb/0x410 [ 846.404363] handle_mm_fault+0x152f/0x3500 [ 846.404850] ? do_raw_spin_lock+0x121/0x260 [ 846.405344] ? rwlock_bug.part.0+0x90/0x90 [ 846.405829] ? __pmd_alloc+0x630/0x630 [ 846.406289] __get_user_pages+0x6ec/0x1620 [ 846.406774] ? follow_page_mask+0x1900/0x1900 [ 846.407284] ? down_read+0x10f/0x430 [ 846.407711] ? down_write+0x160/0x160 [ 846.408167] get_user_pages_unlocked+0x18a/0x690 [ 846.408712] ? internal_get_user_pages_fast+0xdce/0x2640 [ 846.409336] ? pin_user_pages_locked+0x7b0/0x7b0 [ 846.409888] internal_get_user_pages_fast+0x175f/0x2640 [ 846.410518] ? pin_user_pages_unlocked+0x80/0x80 [ 846.411070] ? trace_hardirqs_on+0x5b/0x180 [ 846.411569] get_user_pages_fast+0x66/0xa0 [ 846.412063] iov_iter_get_pages+0x297/0xf40 [ 846.412562] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 846.413123] ? mempool_resize+0x7d0/0x7d0 [ 846.413604] bio_iov_iter_get_pages+0x22a/0x1200 [ 846.414157] ? bvec_alloc+0x17e/0x2f0 [ 846.414594] ? bio_alloc_bioset+0x2a1/0x600 [ 846.415091] ? bio_add_pc_page+0x100/0x100 [ 846.415574] ? bvec_alloc+0x290/0x2f0 [ 846.416016] ? iov_iter_npages+0x1fd/0xa70 [ 846.416501] ? ext4_iomap_begin+0x1a0/0x700 [ 846.417005] iomap_dio_bio_actor+0x77a/0xef0 [ 846.417517] iomap_dio_actor+0x36f/0x560 [ 846.417990] iomap_apply+0x289/0x810 [ 846.418417] ? iomap_dio_rw+0x90/0x90 [ 846.418869] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 846.419542] ? delete_from_page_cache_batch+0xa30/0xa30 [ 846.420161] ? mark_held_locks+0x9e/0xe0 [ 846.420695] ? filemap_check_errors+0xa5/0x150 [ 846.421532] __iomap_dio_rw+0x6cd/0x1110 [ 846.422000] ? iomap_dio_rw+0x90/0x90 [ 846.422447] ? iomap_dio_bio_actor+0xef0/0xef0 [ 846.422977] ? down_read+0x10f/0x430 [ 846.423404] ? down_write+0x160/0x160 [ 846.423853] iomap_dio_rw+0x31/0x90 [ 846.424275] ext4_file_read_iter+0x2c7/0x4c0 [ 846.424789] new_sync_read+0x424/0x6f0 [ 846.425240] ? ksys_lseek+0x1b0/0x1b0 [ 846.425691] ? fsnotify_perm.part.0+0x22d/0x620 [ 846.426229] ? security_file_permission+0xb1/0xe0 [ 846.426788] vfs_read+0x4da/0x620 [ 846.427194] ksys_read+0x12d/0x260 [ 846.427606] ? vfs_write+0xb10/0xb10 [ 846.428040] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.428642] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.429238] do_syscall_64+0x33/0x40 [ 846.429664] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 846.430257] RIP: 0033:0x7f8e866d3b19 [ 846.430683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.432798] RSP: 002b:00007f8e83c49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 846.433682] RAX: ffffffffffffffda RBX: 00007f8e867e6f60 RCX: 00007f8e866d3b19 [ 846.434494] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 846.435311] RBP: 00007f8e83c491d0 R08: 0000000000000000 R09: 0000000000000000 [ 846.436137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 846.436951] R13: 00007fff5538d8ef R14: 00007f8e83c49300 R15: 0000000000022000 [ 846.462504] FAULT_INJECTION: forcing a failure. [ 846.462504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 846.465888] CPU: 0 PID: 6738 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 846.467342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.469119] Call Trace: [ 846.469687] dump_stack+0x107/0x167 05:47:25 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8949, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 846.470513] should_fail.cold+0x5/0xa [ 846.471492] iov_iter_copy_from_user_atomic+0x49b/0xdb0 05:47:25 executing program 5: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r0) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)='\x00', r0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r2) add_key(&(0x7f0000000180)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="3f8339fb1d18719b0b78effe4bd64521ee19b8fa188e96c29ae2610b0475d25b84a4fc32fa0d72a76f95be8e28bfff5027d23db6a44a17958167d4d62d56fec4e6128e143605d446fab0b5260abdf50c7fad17bde41a1486604e5fc480bc2627a9d386df8d8e9df868dab694d500f284e5f2de3f116bf2b69bc9ddec2c222569454584ee8cba0950d0ae4ff14696fcb5862f999385da28be00698b68ab6a9e5cd47d67d667", 0xa5, r2) [ 846.472669] ? ext4_dirty_inode+0x107/0x130 [ 846.473580] ? __mark_inode_dirty+0x12e/0xd40 [ 846.474543] generic_perform_write+0x279/0x4f0 [ 846.475534] ? page_cache_prev_miss+0x310/0x310 [ 846.476537] ? down_write_killable+0x180/0x180 [ 846.477522] ext4_buffered_write_iter+0x232/0x4a0 [ 846.478559] ? __lock_acquire+0xbb1/0x5b00 [ 846.479471] ext4_file_write_iter+0x3ab/0x1530 [ 846.480456] ? __lock_acquire+0x1657/0x5b00 [ 846.481392] ? ext4_file_read_iter+0x4c0/0x4c0 [ 846.482375] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 846.483500] new_sync_write+0x42c/0x660 [ 846.484368] ? new_sync_read+0x6f0/0x6f0 [ 846.485230] ? ksys_write+0x12d/0x260 [ 846.486048] ? lock_release+0x680/0x680 [ 846.486872] ? avc_policy_seqno+0x9/0x70 [ 846.487738] ? selinux_file_permission+0x92/0x520 [ 846.488780] vfs_write+0x7c0/0xb10 [ 846.489539] ksys_write+0x12d/0x260 [ 846.490309] ? __ia32_sys_read+0xb0/0xb0 [ 846.491423] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.492548] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.493648] do_syscall_64+0x33/0x40 [ 846.494436] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 846.495524] RIP: 0033:0x7f69c26bfb19 [ 846.496330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.500231] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 846.501844] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 846.503339] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 846.504860] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 846.506368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 846.507889] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:47:25 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 26) 05:47:25 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 29) 05:47:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 846.554999] FAULT_INJECTION: forcing a failure. [ 846.554999] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 846.556478] CPU: 1 PID: 6747 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 846.557270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 846.558220] Call Trace: [ 846.558532] dump_stack+0x107/0x167 [ 846.558959] should_fail.cold+0x5/0xa [ 846.559404] __alloc_pages_nodemask+0x182/0x600 [ 846.559950] ? add_mm_counter_fast+0x220/0x220 [ 846.560476] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 846.561167] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 846.561777] ? lock_downgrade+0x6d0/0x6d0 [ 846.562249] ? mark_held_locks+0x9e/0xe0 [ 846.562720] alloc_pages_vma+0xbb/0x410 [ 846.563182] handle_mm_fault+0x152f/0x3500 [ 846.563663] ? do_raw_spin_lock+0x121/0x260 [ 846.564165] ? rwlock_bug.part.0+0x90/0x90 [ 846.564646] ? __pmd_alloc+0x630/0x630 [ 846.565108] __get_user_pages+0x6ec/0x1620 [ 846.565603] ? follow_page_mask+0x1900/0x1900 [ 846.566121] ? down_read+0x10f/0x430 [ 846.566549] ? down_write+0x160/0x160 [ 846.566991] get_user_pages_unlocked+0x18a/0x690 [ 846.567537] ? internal_get_user_pages_fast+0xdce/0x2640 [ 846.568165] ? pin_user_pages_locked+0x7b0/0x7b0 [ 846.568715] internal_get_user_pages_fast+0x175f/0x2640 [ 846.569342] ? pin_user_pages_unlocked+0x80/0x80 [ 846.569895] ? trace_hardirqs_on+0x5b/0x180 [ 846.570393] get_user_pages_fast+0x66/0xa0 [ 846.570887] iov_iter_get_pages+0x297/0xf40 [ 846.571379] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 846.571953] ? mempool_resize+0x7d0/0x7d0 [ 846.572440] bio_iov_iter_get_pages+0x22a/0x1200 [ 846.572990] ? bvec_alloc+0x17e/0x2f0 [ 846.573429] ? bio_alloc_bioset+0x2a1/0x600 [ 846.573926] ? bio_add_pc_page+0x100/0x100 [ 846.574407] ? bvec_alloc+0x290/0x2f0 [ 846.574846] ? iov_iter_npages+0x1fd/0xa70 [ 846.575331] ? ext4_iomap_begin+0x1a0/0x700 [ 846.575837] iomap_dio_bio_actor+0x77a/0xef0 [ 846.576350] iomap_dio_actor+0x36f/0x560 [ 846.576822] iomap_apply+0x289/0x810 [ 846.577247] ? iomap_dio_rw+0x90/0x90 [ 846.577690] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 846.578348] ? delete_from_page_cache_batch+0xa30/0xa30 [ 846.578952] ? mark_held_locks+0x9e/0xe0 [ 846.579427] ? filemap_check_errors+0xa5/0x150 [ 846.579958] __iomap_dio_rw+0x6cd/0x1110 [ 846.580417] ? iomap_dio_rw+0x90/0x90 [ 846.580860] ? iomap_dio_bio_actor+0xef0/0xef0 [ 846.581382] ? down_read+0x10f/0x430 [ 846.581804] ? down_write+0x160/0x160 [ 846.582238] iomap_dio_rw+0x31/0x90 [ 846.582656] ext4_file_read_iter+0x2c7/0x4c0 [ 846.583159] new_sync_read+0x424/0x6f0 [ 846.583604] ? ksys_lseek+0x1b0/0x1b0 [ 846.584063] ? fsnotify_perm.part.0+0x22d/0x620 [ 846.584940] ? security_file_permission+0xb1/0xe0 [ 846.585499] vfs_read+0x4da/0x620 [ 846.585902] ksys_read+0x12d/0x260 [ 846.586312] ? vfs_write+0xb10/0xb10 [ 846.586740] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 846.587348] ? syscall_enter_from_user_mode+0x1d/0x50 [ 846.587961] do_syscall_64+0x33/0x40 [ 846.588393] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 846.588979] RIP: 0033:0x7fb97f666b19 [ 846.589406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.591499] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 846.592384] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 846.593203] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 846.594014] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 846.594834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 846.595655] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:47:38 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 28) 05:47:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:47:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 6) 05:47:38 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) sendmmsg$inet6(r2, &(0x7f0000001cc0)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2, 0xd7}, 0x1c, &(0x7f0000000040)=[{&(0x7f00000000c0)="c045835d48e2d7ea027d20e61d0dcf43664a8956f8a2d3319de8ae208450bf405414e93aa8210be6a8f845762dd5070f4a76ec20078874b6a53e044a770519fb782eb10371bfd2f26437e3615688c391f256c3806c9f62d101c168b6fd2c34fb2b4b0aa3669a3b981145d713585b049f9a0a6ad567d4702e7aca9b08d1dc7d3d722810e5959fba23f38bdbbd0806f5f61d852c84e0921b3a8d87294c", 0x9c}], 0x1, &(0x7f0000000180)=[@dontfrag={{0x14, 0x29, 0x3e, 0x26}}, @pktinfo={{0x24, 0x29, 0x32, {@private1={0xfc, 0x1, '\x00', 0x1}}}}], 0x40}}, {{&(0x7f00000001c0)={0xa, 0x4e22, 0xffffffff, @mcast1, 0x3ff}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000200)="1bdfced89e11ebe61350c7b4dc9df4e64b899a6c808d42d7c326f61d251941c13dd7d7e7c87c827df72494a1eb69e76ff487bf4998cc1a676a6310ddaddf17e27dca7abda22491a899606e54c5b7b7abb6b22c5c0d83af444a71ad07af241cee588d7ef1db850a7234809e10d48dcd4102a6d3429a936cda8670ade5638132", 0x7f}], 0x1}}, {{&(0x7f00000002c0)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c, &(0x7f00000009c0)=[{&(0x7f0000000300)="41dcd82e9ffc97e538fd338492e82b9f43e133566f76e74f975e20c9583d0a0ebf31bbbf729f29c0026144e6887d8cc1c1cce1f8064ea9dfe0", 0x39}, {&(0x7f0000000340)="8c362c27a649ddee3d738eae4731a34f1d2ea210dc6055575f9df93b4714ef82aed5fe70bbf96a102fe55fc396af1d8f6d539dc33662453b0d11cbdde108f018d73982390de074d3dcf38c6c109ea5f590c73c6acf52", 0x56}, {&(0x7f00000003c0)="d22f1c46835b1825e8a30880e1c17c01899ae4925ebd35a05f51e57e3f0427f1fa171c2190878a7db0f8aa481afb15b18dca4e3f6de754eaa404c670fb35786f9d17425d666545bbfad268731886cfa539f5b3787fba55aa381c2853a499ea4aa5a8058f951f922af9b7ac2e386cd04e1ecd77c400d4d75b3c14a05ac52d976ff411801fe11f3e6a3be0701570b63b65baecd4709ee79580fe7b0f583637d4", 0x9f}, {&(0x7f0000000480)="dac4732016d8ecb56f221855a58af9a46c604cfda2288ef895dea47611ea69bf9851aeccdee72f747a2435bc5af7f9a86311aee85fb0299f9a798cd5e74ea20e70a92b4ed7b360df78803e683b322a97f862c29a0c5364c1ab86a30c1d1bdb3003300cfa6f2e6503ccbb8b289eb87850d124813ab1828828273a1bc0c07c3b24bf1e6559bc0a1732c15fd5681dd6703a9737005f60298e9bdfbd99e1b0f14e82b099c90754d477e7db8a96f1539d88ded97f343d4c0d387d4f6097ad28ba0e2165a8003f03ed76528392b6b57798", 0xce}, {&(0x7f0000000580)="825910dc344f8b60468fa7c09506d5792d762c30e4dfec58ebcb7334479310ffd9ad5f111af04553a5960ec710f3872ed716712a2f136a5696c8e41c373d1d1b177fb317516435d1ce22240c287866ac9f64779cce1ac83971b6d3150e814ef89685325fc712ceb75c588b2cd0df493fc23178419dba375ecb344c4787776310d1ee12d7553f21a1456237", 0x8b}, {&(0x7f0000000640)="0a7756a2182743808c67f463924a90a9897835d35b189ed176e02c10e3883cb2b397e61403e98681f9e320a42cf0a6dbffbb6e3cf4c710a8db6824a511752ea14e1ba02819379aabc8a9bf326cbea37eba924f3fbf981b11e2b72ed4819125cda5245cdb4c6335b140fe302113aeb255f2b3c36635e0623f5bd0c397dea672af46dd1b0ae48d8d2df9d47a42a4584e605415e615cb16d4e9a55c532044e2d15fd66d663ef21a0ced58b96b2c65b40006a700ad916b1c634b3cbefa30b32ec1df42adb03612de110811640a3bf3732af5f02bac733bd2d9e2ba22fe", 0xdb}, {&(0x7f0000000740)="091f026ed9b6c49d9ba783e4271293f1e6bcb3b9dda9c6f93f18ca8f940208083256512784f204eac30aae43b99b07c1682d486ac4544540b53b156a0b6b747cb350", 0x42}, {&(0x7f00000007c0)="02b24347124b9a15e96adb81e415c446ce74b412251b7270f68c7b92b44ba8e6bd14a827ef21", 0x26}, {&(0x7f0000000800)="e0439fc599b0dd3a346c9c5b574e4dcc4f8799d381eb9f49afedfd1fdd9d425772390a769fc9a6978ccfeb5dd97b1af1e190ead61511181d2240f79401bba62bb4b416ac477dde7b6a0d1b290cb76d5cf396a7d010eedeee6aa08ebcc42ff34573e26baf3856a2a48b00538a3cb850185420c3226b4f00ed945992b5cfce74b0a74b587d6bc507c013472d9c", 0x8c}, {&(0x7f00000008c0)="b1fc887aff6e1ea1d9a420b2c53aa5ed72d396d61a1fdc1b39c7df8de1fb287a36daa4e56eea8ad04fd4f60caa6f6058791e4046507168a7380a564ff9db7d66dda72f3aced9e7ce3bf0135b7e748721de8083fe0248d8615961795516c9a8f2a1153bbaca24d8f6bf0f116f4a83e7a7bd3e14f2f6c51d96f89469e7499067bedefb691ea93def53f66277ed28c34cb1df16e031224cb7bffa624ebf73ff0aae26dfafebbe0e85ddaa811250e540f92047e1876be991834d0de433e8d3fd2560b7a0e25564c7e7a6f7b205b8e4d2cbe9d91a96156163602e9d8786b17073f30374d799af10d39531ee07c0b294886dda64c707", 0xf3}], 0xa, &(0x7f0000000a80)=[@rthdrdstopts={{0x38, 0x29, 0x37, {0x89, 0x3, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @padn={0x1, 0x1, [0x0]}, @pad1, @ra={0x5, 0x2, 0x9}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x1f}}, @rthdr={{0x88, 0x29, 0x39, {0x87, 0xe, 0x2, 0x80, 0x0, [@dev={0xfe, 0x80, '\x00', 0x36}, @loopback, @dev={0xfe, 0x80, '\x00', 0x37}, @local, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}]}}}, @rthdrdstopts={{0x1050, 0x29, 0x37, {0x2f, 0x206, '\x00', [@pad1, @generic={0x81, 0x1000, "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"}, @calipso={0x7, 0x10, {0x3, 0x2, 0x1, 0xff, [0x1]}}, @jumbo={0xc2, 0x4, 0x2}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @multicast1}}, @ra={0x5, 0x2, 0x4f}]}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x5c, 0xa, 0x1, 0x81, 0x0, [@local, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2]}}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x0, 0x2, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}]}}}, @rthdrdstopts={{0x80, 0x29, 0x37, {0x2c, 0xc, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x42}}, @calipso={0x7, 0x28, {0x3, 0x8, 0x9, 0x3, [0x1, 0x8, 0x7ae, 0xffff]}}, @hao={0xc9, 0x10, @loopback}, @ra={0x5, 0x2, 0x101}]}}}], 0x1240}}], 0x3, 0x20040081) 05:47:38 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x894c, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:47:38 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 27) 05:47:38 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd4(r0, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r1}}, 0x9) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) syz_io_uring_setup(0x6b44, &(0x7f00000001c0)={0x0, 0xb360, 0x20, 0x0, 0x244}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000240)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r4}}, 0x7ff) syz_io_uring_submit(0x0, r2, &(0x7f00000000c0)=@IORING_OP_WRITE={0x17, 0x2, 0x2004, @fd_index=0x1, 0x7ff, &(0x7f0000000000)="1362d15d33be2565e1cb1d5658111986f09de19d04832e1467d7436bec4a8a87b6722dd6896b5ac8c1dde9b22965beffa7c0ba7ffba650af9a4660abc428679db1c593c3", 0x44, 0x1a, 0x1, {0x0, r4}}, 0x8) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x303103, 0x0) read(r5, &(0x7f0000000000), 0x1b4000) 05:47:38 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) [ 859.437074] FAULT_INJECTION: forcing a failure. [ 859.437074] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 859.439670] CPU: 0 PID: 6771 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 859.439820] loop4: detected capacity change from 0 to 41948160 [ 859.441186] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.441193] Call Trace: [ 859.441223] dump_stack+0x107/0x167 [ 859.441247] should_fail.cold+0x5/0xa [ 859.441276] __alloc_pages_nodemask+0x182/0x600 [ 859.447691] ? add_mm_counter_fast+0x220/0x220 [ 859.448708] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 859.450037] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 859.451223] ? lock_downgrade+0x6d0/0x6d0 [ 859.452362] ? mark_held_locks+0x9e/0xe0 [ 859.453264] alloc_pages_vma+0xbb/0x410 [ 859.454146] handle_mm_fault+0x152f/0x3500 [ 859.455083] ? do_raw_spin_lock+0x121/0x260 [ 859.456039] ? rwlock_bug.part.0+0x90/0x90 [ 859.456971] ? __pmd_alloc+0x630/0x630 [ 859.457854] __get_user_pages+0x6ec/0x1620 [ 859.458798] ? follow_page_mask+0x1900/0x1900 [ 859.459785] ? down_read+0x10f/0x430 [ 859.460620] ? down_write+0x160/0x160 [ 859.461473] get_user_pages_unlocked+0x18a/0x690 [ 859.462521] ? internal_get_user_pages_fast+0xdce/0x2640 [ 859.463717] ? pin_user_pages_locked+0x7b0/0x7b0 [ 859.464784] internal_get_user_pages_fast+0x175f/0x2640 [ 859.465990] ? pin_user_pages_unlocked+0x80/0x80 [ 859.467034] ? trace_hardirqs_on+0x5b/0x180 [ 859.467995] get_user_pages_fast+0x66/0xa0 [ 859.468931] iov_iter_get_pages+0x297/0xf40 [ 859.469886] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 859.470964] ? mempool_resize+0x7d0/0x7d0 [ 859.471890] bio_iov_iter_get_pages+0x22a/0x1200 [ 859.472946] ? bvec_alloc+0x17e/0x2f0 [ 859.473787] ? bio_alloc_bioset+0x2a1/0x600 [ 859.474735] ? bio_add_pc_page+0x100/0x100 [ 859.475662] ? bvec_alloc+0x290/0x2f0 [ 859.476517] ? iov_iter_npages+0x1fd/0xa70 [ 859.477447] ? ext4_iomap_begin+0x1a0/0x700 [ 859.478401] iomap_dio_bio_actor+0x77a/0xef0 [ 859.479386] iomap_dio_actor+0x36f/0x560 [ 859.480300] iomap_apply+0x289/0x810 [ 859.481127] ? iomap_dio_rw+0x90/0x90 [ 859.481971] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 859.483247] ? delete_from_page_cache_batch+0xa30/0xa30 [ 859.484433] ? mark_held_locks+0x9e/0xe0 [ 859.484510] FAULT_INJECTION: forcing a failure. [ 859.484510] name failslab, interval 1, probability 0, space 0, times 0 [ 859.485337] ? filemap_check_errors+0xa5/0x150 [ 859.488912] __iomap_dio_rw+0x6cd/0x1110 [ 859.489797] ? iomap_dio_rw+0x90/0x90 [ 859.490652] ? iomap_dio_bio_actor+0xef0/0xef0 [ 859.491662] ? down_read+0x10f/0x430 [ 859.492484] ? down_write+0x160/0x160 [ 859.493326] iomap_dio_rw+0x31/0x90 [ 859.494127] ext4_file_read_iter+0x2c7/0x4c0 [ 859.495096] new_sync_read+0x424/0x6f0 [ 859.495967] ? ksys_lseek+0x1b0/0x1b0 [ 859.496821] ? fsnotify_perm.part.0+0x22d/0x620 [ 859.497846] ? security_file_permission+0xb1/0xe0 [ 859.498915] vfs_read+0x4da/0x620 [ 859.499684] ksys_read+0x12d/0x260 [ 859.500475] ? vfs_write+0xb10/0xb10 [ 859.501295] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 859.502444] ? syscall_enter_from_user_mode+0x1d/0x50 [ 859.503577] do_syscall_64+0x33/0x40 [ 859.504406] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 859.505529] RIP: 0033:0x7fb97f666b19 [ 859.506347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.510376] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 859.512071] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 859.513633] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 859.515199] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.516778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 859.518346] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 859.519943] CPU: 1 PID: 6772 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 859.521703] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.523688] Call Trace: [ 859.524322] dump_stack+0x107/0x167 [ 859.525186] should_fail.cold+0x5/0xa [ 859.526090] ? mempool_alloc+0x148/0x360 [ 859.527045] ? mempool_free_pages+0x20/0x20 [ 859.528068] should_failslab+0x5/0x20 [ 859.529018] kmem_cache_alloc+0x5b/0x310 [ 859.530023] ? mempool_free_pages+0x20/0x20 [ 859.531009] mempool_alloc+0x148/0x360 [ 859.531873] ? mempool_resize+0x7d0/0x7d0 [ 859.532870] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 859.534105] ? find_get_pages_range_tag+0x5c9/0xbf0 [ 859.535225] ? lock_chain_count+0x20/0x20 [ 859.536179] ? time64_to_tm+0x6d5/0x8d0 [ 859.537140] bio_alloc_bioset+0x36e/0x600 [ 859.538134] ? find_held_lock+0x2c/0x110 [ 859.539076] ? bvec_alloc+0x2f0/0x2f0 [ 859.539936] ? __fat_write_inode+0x641/0x990 [ 859.541019] ? lock_downgrade+0x6d0/0x6d0 [ 859.542018] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 859.543198] __sync_dirty_buffer+0x16a/0x3e0 [ 859.544271] __fat_write_inode+0x7ce/0x990 [ 859.545317] ? fat_direct_IO+0x380/0x380 [ 859.546291] ? do_raw_spin_lock+0x121/0x260 [ 859.547280] ? rwlock_bug.part.0+0x90/0x90 [ 859.548284] fat_write_inode+0x8f/0x180 [ 859.549245] __writeback_single_inode+0x843/0xb30 05:47:38 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8970, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 859.550415] writeback_single_inode+0x2ae/0x570 [ 859.551594] sync_inode_metadata+0xbf/0x100 [ 859.552646] ? sync_inode+0x20/0x20 [ 859.553524] ? down_write+0xe0/0x160 [ 859.554455] __generic_file_fsync+0x163/0x1f0 [ 859.555550] fat_file_fsync+0x73/0x200 [ 859.556501] ? fat_trim_fs+0xfc0/0xfc0 [ 859.557451] vfs_fsync_range+0x13d/0x230 [ 859.558442] generic_file_write_iter+0x19d/0x230 [ 859.559497] ? iov_iter_init+0x3c/0x130 [ 859.560464] new_sync_write+0x42c/0x660 [ 859.561430] ? new_sync_read+0x6f0/0x6f0 [ 859.562412] ? ksys_write+0x12d/0x260 [ 859.563340] ? lock_release+0x680/0x680 [ 859.564324] ? avc_policy_seqno+0x9/0x70 [ 859.565309] ? selinux_file_permission+0x92/0x520 [ 859.566500] vfs_write+0x7c0/0xb10 [ 859.567368] ksys_write+0x12d/0x260 [ 859.568262] ? __ia32_sys_read+0xb0/0xb0 [ 859.569254] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 859.570527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 859.571795] do_syscall_64+0x33/0x40 [ 859.572723] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 859.573980] RIP: 0033:0x7f69c26bfb19 [ 859.574888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.579434] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 859.581308] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 859.583060] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 859.584816] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.586358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.587908] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:47:39 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:47:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 7) 05:47:39 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x8, 0x50, r0, 0x0) syz_io_uring_complete(r1) read(r0, &(0x7f0000000000), 0x1b4000) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001280)={0x0, 0xfffffffffffffffb, 0x99, 0x6, @buffer={0x0, 0x1000, &(0x7f00000000c0)=""/4096}, &(0x7f00000010c0)="6cf4bebcc44a7c7c1694bb2c970685f1236b7e58f722cdd663a030174599cf5a0bd9b8563ae4eeab9ff0ddcf2addd2de72164f8804a545ff8654e10a701933646e189ebb734616d1019660fdd71a5aca693f50598082fb06722e6b11b5b1cc6b86337828613bf3c0b53a110ec5e310b88023bb49fe98524b4794fa2325fc128a70c2df1856990dc06ac50f5b3584e8645ba897776b2cd57857", &(0x7f0000001180)=""/213, 0x9, 0x21}) 05:47:39 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:47:39 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8971, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 859.748545] FAULT_INJECTION: forcing a failure. [ 859.748545] name failslab, interval 1, probability 0, space 0, times 0 [ 859.752192] CPU: 0 PID: 6788 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 859.753641] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.755396] Call Trace: [ 859.755981] dump_stack+0x107/0x167 [ 859.756756] should_fail.cold+0x5/0xa [ 859.757562] ? create_object.isra.0+0x3a/0xa30 [ 859.758521] should_failslab+0x5/0x20 [ 859.759323] kmem_cache_alloc+0x5b/0x310 [ 859.760192] ? _raw_spin_unlock_irq+0x1f/0x30 [ 859.761145] create_object.isra.0+0x3a/0xa30 [ 859.762071] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 859.763150] kmem_cache_alloc+0x159/0x310 [ 859.764049] ext4_init_io_end+0x23/0x180 [ 859.764906] ext4_writepages+0x8ec/0x3350 [ 859.765790] ? slab_free_freelist_hook+0xa9/0x180 [ 859.766809] ? __ext4_journal_stop+0xde/0x1f0 [ 859.767752] ? ext4_da_write_end+0x21e/0x9c0 [ 859.768696] ? generic_perform_write+0x2bf/0x4f0 [ 859.769702] ? vfs_write+0x7c0/0xb10 [ 859.770483] ? ksys_write+0x12d/0x260 [ 859.771304] ? lock_chain_count+0x20/0x20 [ 859.772189] ? lock_acquire+0x197/0x470 [ 859.773030] ? find_held_lock+0x2c/0x110 [ 859.773884] ? __ext4_mark_inode_dirty+0x770/0x770 [ 859.774937] ? mark_held_locks+0x9e/0xe0 [ 859.775805] ? trace_hardirqs_on+0x5b/0x180 [ 859.776726] ? kmem_cache_free+0xa7/0x2d0 [ 859.777609] ? __kasan_slab_free+0x122/0x160 [ 859.778547] ? slab_free_freelist_hook+0xa9/0x180 [ 859.779571] ? jbd2_journal_stop+0x61f/0xdc0 [ 859.780510] ? kmem_cache_free+0x249/0x2d0 [ 859.781428] ? __ext4_mark_inode_dirty+0x770/0x770 [ 859.782471] do_writepages+0xee/0x2a0 [ 859.783281] ? page_writeback_cpu_online+0x20/0x20 [ 859.784333] ? __block_commit_write.constprop.0.isra.0+0x255/0x2e0 [ 859.785656] ? unlock_page+0xf1/0x180 [ 859.786471] ? __wb_update_bandwidth.constprop.0+0xe00/0xe00 [ 859.787697] __filemap_fdatawrite_range+0x24b/0x2f0 [ 859.788762] ? delete_from_page_cache_batch+0xa30/0xa30 [ 859.789899] ? generic_perform_write+0x37d/0x4f0 [ 859.790912] file_write_and_wait_range+0xb6/0x130 [ 859.791938] ext4_sync_file+0x225/0xde0 [ 859.792785] ? ext4_getfsmap+0x990/0x990 [ 859.793654] vfs_fsync_range+0x13d/0x230 [ 859.794518] ext4_buffered_write_iter+0x34b/0x4a0 [ 859.795535] ? __lock_acquire+0xbb1/0x5b00 [ 859.796441] ext4_file_write_iter+0x3ab/0x1530 [ 859.797409] ? __lock_acquire+0x1657/0x5b00 [ 859.798336] ? ext4_file_read_iter+0x4c0/0x4c0 [ 859.799306] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 859.800428] new_sync_write+0x42c/0x660 [ 859.801271] ? new_sync_read+0x6f0/0x6f0 [ 859.802125] ? ksys_write+0x12d/0x260 [ 859.802935] ? lock_release+0x680/0x680 [ 859.803781] ? avc_policy_seqno+0x9/0x70 [ 859.804645] ? selinux_file_permission+0x92/0x520 [ 859.805678] vfs_write+0x7c0/0xb10 [ 859.806433] ksys_write+0x12d/0x260 [ 859.807207] ? __ia32_sys_read+0xb0/0xb0 [ 859.808072] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 859.808702] FAULT_INJECTION: forcing a failure. [ 859.808702] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 859.809176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 859.813057] do_syscall_64+0x33/0x40 [ 859.813845] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 859.814935] RIP: 0033:0x7f69c26bfb19 [ 859.815723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 859.819613] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 859.821225] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 859.822732] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 859.824249] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.825754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.827265] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 [ 859.828815] CPU: 1 PID: 6792 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 859.830475] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 859.832347] Call Trace: [ 859.833000] dump_stack+0x107/0x167 [ 859.833893] should_fail.cold+0x5/0xa [ 859.834856] __alloc_pages_nodemask+0x182/0x600 [ 859.836015] ? add_mm_counter_fast+0x220/0x220 [ 859.837128] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 859.838598] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 859.839891] ? lock_downgrade+0x6d0/0x6d0 [ 859.840925] ? mark_held_locks+0x9e/0xe0 [ 859.841940] alloc_pages_vma+0xbb/0x410 [ 859.842927] handle_mm_fault+0x152f/0x3500 05:47:39 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 28) [ 859.843972] ? do_raw_spin_lock+0x121/0x260 [ 859.845143] ? rwlock_bug.part.0+0x90/0x90 [ 859.846190] ? __pmd_alloc+0x630/0x630 [ 859.847181] __get_user_pages+0x6ec/0x1620 [ 859.848279] ? follow_page_mask+0x1900/0x1900 [ 859.849398] ? down_read+0x10f/0x430 [ 859.850326] ? down_write+0x160/0x160 [ 859.851289] get_user_pages_unlocked+0x18a/0x690 [ 859.852476] ? internal_get_user_pages_fast+0xdce/0x2640 [ 859.854260] ? pin_user_pages_locked+0x7b0/0x7b0 [ 859.855607] internal_get_user_pages_fast+0x175f/0x2640 [ 859.856992] ? pin_user_pages_unlocked+0x80/0x80 [ 859.858198] ? trace_hardirqs_on+0x5b/0x180 [ 859.859111] get_user_pages_fast+0x66/0xa0 [ 859.860024] iov_iter_get_pages+0x297/0xf40 [ 859.861170] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 859.862323] ? mempool_resize+0x7d0/0x7d0 [ 859.863211] bio_iov_iter_get_pages+0x22a/0x1200 [ 859.864225] ? bvec_alloc+0x17e/0x2f0 [ 859.865028] ? bio_alloc_bioset+0x2a1/0x600 [ 859.865933] ? bio_add_pc_page+0x100/0x100 [ 859.866832] ? bvec_alloc+0x290/0x2f0 [ 859.867655] ? iov_iter_npages+0x1fd/0xa70 [ 859.868558] ? ext4_iomap_begin+0x1a0/0x700 [ 859.869482] iomap_dio_bio_actor+0x77a/0xef0 [ 859.870440] iomap_dio_actor+0x36f/0x560 [ 859.871309] iomap_apply+0x289/0x810 [ 859.872108] ? iomap_dio_rw+0x90/0x90 [ 859.872932] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 859.874177] ? delete_from_page_cache_batch+0xa30/0xa30 [ 859.875325] ? mark_held_locks+0x9e/0xe0 [ 859.876221] ? filemap_check_errors+0xa5/0x150 [ 859.877203] __iomap_dio_rw+0x6cd/0x1110 [ 859.878078] ? iomap_dio_rw+0x90/0x90 [ 859.878924] ? iomap_dio_bio_actor+0xef0/0xef0 [ 859.879929] ? down_read+0x10f/0x430 [ 859.880748] ? down_write+0x160/0x160 [ 859.881584] iomap_dio_rw+0x31/0x90 [ 859.882379] ext4_file_read_iter+0x2c7/0x4c0 [ 859.883334] new_sync_read+0x424/0x6f0 [ 859.884193] ? ksys_lseek+0x1b0/0x1b0 [ 859.885038] ? fsnotify_perm.part.0+0x22d/0x620 [ 859.886047] ? security_file_permission+0xb1/0xe0 [ 859.887109] vfs_read+0x4da/0x620 [ 859.887876] ksys_read+0x12d/0x260 [ 859.888665] ? vfs_write+0xb10/0xb10 [ 859.889481] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 859.890638] ? syscall_enter_from_user_mode+0x1d/0x50 [ 859.891782] do_syscall_64+0x33/0x40 [ 859.892620] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 859.893749] RIP: 0033:0x7fb97f666b19 [ 859.894578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 05:47:39 executing program 3: syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000140)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f00000000c0)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) [ 859.898707] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 859.900551] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 859.902165] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 05:47:39 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8980, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 859.903763] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 859.905476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 859.907179] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 859.920512] udc-core: couldn't find an available UDC or it's busy [ 859.922150] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 859.946894] udc-core: couldn't find an available UDC or it's busy [ 859.948281] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 05:47:39 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x8000, 0x1) read(r0, &(0x7f0000000000), 0x1b4000) open(&(0x7f0000000000)='./file0\x00', 0x100, 0x41) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x88) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x80000001, 0x7, &(0x7f0000001640)=[{&(0x7f0000000200)="f807fff1a4bd9e4410fbecbb6e2d214a70b39cce65a2ab46121f24b0c2a63b4b5a57d8950442346686fd19764787013786d9a5faf91998ff6f9119930f9f9a73da16fbf609fac17a7aa2575b49a5571847af142ae062476ee459300d52f2c87e6eac6fdfdad42463e5ef3b7915d8ddec322337d84b8cda89432531a4b8247c44ea165ad150d77a7b7b724d969b692d5473644aa036b3701263675e05c8973ffdf6e14c34f55fd628ef1d2329d36dc29c1089862b6fd6581dd04527b310e6cef4a83d0aa269b42da7bb391982c7090c", 0xcf, 0x7ce0000000000000}, {&(0x7f0000000300)="863378ca20d533a2a506f75f472cd63db059f96212d9ccf06126275f38ad024289a5aa3fb5a12bc2f248edc2a92a9ec8a423ed728e964971e6bd1ca925632453ee64767036f3d2967cc28995a5a32a6b1561c5acc44d4ba945e642155318ade704e8a7a22070290b7ca5a7b2cc3506b42b25ce392959f946126a68e46caa4983baf77e3b1acae5b9c0193ef288b41280069e3c68b2a6dc4e5f68b1f7e803d75f1b042c513f7cf500c75212b8f0900112b410f7d26e2e6794502b71118cfba6a65698cfce3e58ab9328a2e0ed4767", 0xce, 0x9}, {&(0x7f0000000400)="f2d52b793475abe8992d8516b4ab0e6f948de596be191e06746ee53478c2f74fcc7468369320c49465a50d11da46e0a6b59c792c", 0x34, 0xfe61}, {&(0x7f0000000440)="95279a3c9501e204f1627f6f2b1a0438eea74c240ff24962f13e7a9a42743c7c18ca45bfde10ad546e5443f94135a175123901cd170af9081db29a8d4c5c9b72d1701577d0943ed8dd5843ff6105af1c662fdcf7224d6bee7309bcbb1ff1f9bf154cbd6a4e12798540804ea4bb08639d323159ebead008acf4679604f1e818c8abce66", 0x83}, {&(0x7f0000000500)="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", 0x1000, 0x7}, {&(0x7f0000001500)="fb422782cfde1d395b54a671025e035e3a1f699132f44da6b30a9f882a8d64097508129efc6e47e2eb0405d6d29dcb5ad015bfe8f2ab3d1934993516aff63029806c675c428e68b0d6d5cff5dcf082cb4da5b17971d0bfb8e191f8c3dd20d3df5f391cccdbb0938b17d6bfc8a78214f7ee570e55162df83bc97230583d97026bf431c7d813c4e74472fa909de19e09482cb67e642f5f43b51b7a174fe51b498f2de86bf06fe73785dd7b8d8e5eba7a3baff0a0743f064b2dcfcca4e8ab268f39676a317337eac36e6f33b7cbc111f96883", 0xd1, 0x1}, {&(0x7f0000001600)="3787eb0b4b311e328241fd3c0c1f9c7d", 0x10, 0xfffffffffffffe01}], 0x10000, &(0x7f0000001700)={[{@fat=@tz_utc}, {@nodots}, {@dots}], [{@permit_directio}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@measure}, {@uid_lt}, {@smackfstransmute={'smackfstransmute', 0x3d, '!'}}, {@fsmagic={'fsmagic', 0x3d, 0x2}}]}) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r4, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r3, r4) fcntl$addseals(r4, 0x409, 0xc) syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1a7, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)) syz_io_uring_submit(r5, 0x0, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x5, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000001280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2, 0x2, {0xa, 0x4e23, 0x7fffffff, @rand_addr=' \x01\x00', 0x400}}}}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r7}}, 0x7ff) syz_io_uring_submit(r5, 0x0, &(0x7f00000017c0)=@IORING_OP_FADVISE={0x18, 0x1, 0x0, @fd=r2, 0xfffffffffffffffe, 0x0, 0x7, 0x4, 0x1, {0x0, r7}}, 0xb) [ 860.001984] udc-core: couldn't find an available UDC or it's busy [ 860.003395] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 860.517122] udc-core: couldn't find an available UDC or it's busy [ 860.518760] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 860.522617] udc-core: couldn't find an available UDC or it's busy [ 860.524291] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 860.528300] udc-core: couldn't find an available UDC or it's busy [ 860.530116] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 05:47:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x100000) 05:47:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 8) 05:47:52 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) r4 = openat$random(0xffffffffffffff9c, &(0x7f0000000240), 0xe00, 0x0) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000300)=""/249, 0xf9}], 0x1, &(0x7f0000000640)=""/237, 0xed}, 0x12022) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd=r4, 0x0, 0x0, 0x40, 0xb, 0x0, {0x0, 0x0, r2}}, 0x9) r5 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r6, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r5, r6) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r7, 0x0) syz_mount_image$vfat(&(0x7f0000000780), &(0x7f00000007c0)='./file0\x00', 0x8, 0x3, &(0x7f0000000980)=[{&(0x7f0000000800)="b37fe4595bd03051e012516afa0235c99085eb025c699e81", 0x18, 0x5}, {&(0x7f0000000840)="b5b6da74df1554b711789b31f9536873c9193392e4486f94e355ad18f2f49ff19f2e9993688df03b96e498494474b0828b28d89f3920009e5d0d3edd0d39d17d8a1b6c2c9a037218e05877b363b68851542193b214de64567ae50a05866f7ea0c9cb7f9a4e10cd6ea680d887e5b2124ca6142ae946016d039aafb90b2f882ca041e083a92c58b1974f4809c9e949b52c330593c93ce859007b1f1b73627717b7b4c7142f092b85e8c5bc552440a0f116ee8e5f743ffbbb", 0xb7, 0x3}, {&(0x7f0000000900)="dfcd26aefb0ec81c46076b784f9a9c3e37b5f83cfba00d305401393a9c93fe6c32b848e96900f7fef4f3bd24b8f3bd9374713963d25cc026aff26b9d5e580c57f78e1aba6f15d63c6ca150012844625c3e0420f99c29338ab549a406ac2ceaf1834e1d2889410f6933b2baa6ff8bbd8865b80219c3384fa2acda74a8", 0x7c, 0x80df}], 0x88044, &(0x7f0000000a00)={[{@utf8}, {@rodir}, {@shortname_lower}, {@uni_xlate}, {@shortname_lower}, {@fat=@usefree}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@euid_eq={'euid', 0x3d, r7}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r5}, './file0\x00'}) read(r0, &(0x7f0000000000), 0x1b4000) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0\x00'}) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x40000, &(0x7f0000000ac0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',version=9p2000.L,mmap,posixacl,version=9p2000,dfltgid=', @ANYRESHEX=r8, @ANYBLOB="2c6e5300001075175df025f36cb87e27b5c57f19ec6b666f376e657200"/42, @ANYRESDEC=0xee00, @ANYBLOB="2c686173682c7375626a5f726f6c653db48274eff3cb6826c2eeef3af1d93f1928ae1bcca39d4e53744f6dfb4d2c666f776e65723c", @ANYRESDEC=r9, @ANYBLOB=',pcr=00000000000000000038,\x00']) [ 873.226086] FAULT_INJECTION: forcing a failure. [ 873.226086] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 873.227625] CPU: 1 PID: 6821 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 873.228466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.229477] Call Trace: [ 873.229812] dump_stack+0x107/0x167 [ 873.230273] should_fail.cold+0x5/0xa [ 873.230748] __alloc_pages_nodemask+0x182/0x600 [ 873.231321] ? add_mm_counter_fast+0x220/0x220 [ 873.231888] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 873.232652] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 873.233297] ? lock_downgrade+0x6d0/0x6d0 [ 873.233809] ? mark_held_locks+0x9e/0xe0 [ 873.234310] alloc_pages_vma+0xbb/0x410 [ 873.234802] handle_mm_fault+0x152f/0x3500 [ 873.235330] ? do_raw_spin_lock+0x121/0x260 [ 873.235858] ? rwlock_bug.part.0+0x90/0x90 [ 873.236379] ? __pmd_alloc+0x630/0x630 [ 873.236871] __get_user_pages+0x6ec/0x1620 [ 873.237395] ? follow_page_mask+0x1900/0x1900 [ 873.237940] ? down_read+0x10f/0x430 [ 873.238396] ? down_write+0x160/0x160 [ 873.238866] get_user_pages_unlocked+0x18a/0x690 [ 873.239454] ? internal_get_user_pages_fast+0xdce/0x2640 [ 873.240116] ? pin_user_pages_locked+0x7b0/0x7b0 [ 873.240712] internal_get_user_pages_fast+0x175f/0x2640 [ 873.241380] ? pin_user_pages_unlocked+0x80/0x80 [ 873.242177] ? trace_hardirqs_on+0x5b/0x180 05:47:52 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) recvmmsg$unix(r2, &(0x7f0000002280)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000004c0)=[{&(0x7f0000000240)=""/240, 0xf0}, {&(0x7f0000000340)=""/62, 0x3e}, {&(0x7f0000000380)=""/51, 0x33}, {&(0x7f00000003c0)=""/222, 0xde}], 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="3f700092093084ff4df0e3d042c8b4e200977124", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x58}}, {{&(0x7f0000000580)=@abs, 0x6e, &(0x7f0000001600)=[{&(0x7f0000000600)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001640)=""/64, 0x40}], 0x1, &(0x7f00000016c0)=ANY=[@ANYBLOB="1c0101eeff01000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x58}}, {{&(0x7f0000001740)=@abs, 0x6e, &(0x7f0000001840)=[{&(0x7f00000017c0)=""/93, 0x5d}], 0x1, &(0x7f0000001880)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f00000018c0), 0x6e, &(0x7f00000020c0)=[{&(0x7f0000001940)=""/236, 0xec}, {&(0x7f0000001a40)=""/237, 0xed}, {&(0x7f0000001b40)=""/251, 0xfb}, {&(0x7f0000001c40)=""/132, 0x84}, {&(0x7f0000001d00)=""/19, 0x13}, {&(0x7f0000001e00)=""/145, 0x91}, {&(0x7f0000001ec0)=""/200, 0xc8}, {&(0x7f0000001d40)=""/54, 0x36}, {&(0x7f0000001fc0)=""/114, 0x72}, {&(0x7f0000002040)=""/114, 0x72}], 0xa, &(0x7f0000002180)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}], 0x5, 0x2061, &(0x7f00000023c0)) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = signalfd4(r5, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r7, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r6}}, 0x9) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x9, 0x3, 0x0, 0x0, 0x100, 0x10, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x64}, 0x200, 0x8, 0x7fff, 0x5, 0x8, 0x0, 0x7ff, 0x0, 0x400, 0x0, 0xc00000000}, r4, 0xa, r6, 0x3) syz_io_uring_submit(0x0, r3, &(0x7f0000000040)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1}, 0x8) r8 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = signalfd4(r8, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r10 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) io_uring_enter(0xffffffffffffffff, 0x6fc7, 0x285f, 0x0, &(0x7f0000002480)={[0x6]}, 0x8) syz_io_uring_submit(0x0, r10, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r9}}, 0x9) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x810, r9, 0x0) signalfd4(r0, &(0x7f0000000000)={[0xef]}, 0x8, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:47:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x100000) 05:47:52 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8981, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:47:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 29) 05:47:52 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 873.242757] get_user_pages_fast+0x66/0xa0 [ 873.243405] iov_iter_get_pages+0x297/0xf40 [ 873.243938] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 873.244552] ? mempool_resize+0x7d0/0x7d0 [ 873.245065] bio_iov_iter_get_pages+0x22a/0x1200 [ 873.245658] ? bvec_alloc+0x17e/0x2f0 [ 873.246131] ? bio_alloc_bioset+0x2a1/0x600 [ 873.246673] ? bio_add_pc_page+0x100/0x100 [ 873.247194] ? bvec_alloc+0x290/0x2f0 [ 873.247666] ? iov_iter_npages+0x1fd/0xa70 [ 873.248192] ? ext4_iomap_begin+0x1a0/0x700 [ 873.248732] iomap_dio_bio_actor+0x77a/0xef0 [ 873.249308] iomap_dio_actor+0x36f/0x560 [ 873.249963] iomap_apply+0x289/0x810 [ 873.250556] ? iomap_dio_rw+0x90/0x90 [ 873.251196] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 873.251894] ? delete_from_page_cache_batch+0xa30/0xa30 [ 873.252545] ? mark_held_locks+0x9e/0xe0 [ 873.253049] ? filemap_check_errors+0xa5/0x150 [ 873.253599] __iomap_dio_rw+0x6cd/0x1110 [ 873.254083] ? iomap_dio_rw+0x90/0x90 [ 873.254554] ? iomap_dio_bio_actor+0xef0/0xef0 [ 873.255108] ? down_read+0x10f/0x430 [ 873.255555] ? down_write+0x160/0x160 [ 873.256016] iomap_dio_rw+0x31/0x90 [ 873.256501] ext4_file_read_iter+0x2c7/0x4c0 [ 873.257256] new_sync_read+0x424/0x6f0 [ 873.257725] ? ksys_lseek+0x1b0/0x1b0 [ 873.258200] ? fsnotify_perm.part.0+0x22d/0x620 [ 873.258948] ? security_file_permission+0xb1/0xe0 [ 873.259532] vfs_read+0x4da/0x620 [ 873.259953] ksys_read+0x12d/0x260 [ 873.260392] ? vfs_write+0xb10/0xb10 [ 873.260848] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 873.261481] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.262102] do_syscall_64+0x33/0x40 [ 873.262550] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.263165] RIP: 0033:0x7fb97f666b19 [ 873.263613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.265864] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 873.266794] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 873.267660] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 873.268533] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.269400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 873.270268] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 873.277883] loop4: detected capacity change from 0 to 41948160 05:47:52 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:47:52 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 30) [ 873.363765] FAULT_INJECTION: forcing a failure. [ 873.363765] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 873.365258] CPU: 1 PID: 6831 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 873.366058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.367035] Call Trace: [ 873.367350] dump_stack+0x107/0x167 [ 873.367779] should_fail.cold+0x5/0xa [ 873.368238] __alloc_pages_nodemask+0x182/0x600 [ 873.368782] ? add_mm_counter_fast+0x220/0x220 [ 873.369315] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 873.370019] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 873.370636] ? lock_downgrade+0x6d0/0x6d0 [ 873.371119] ? mark_held_locks+0x9e/0xe0 [ 873.371598] alloc_pages_vma+0xbb/0x410 [ 873.372067] handle_mm_fault+0x152f/0x3500 [ 873.372568] ? do_raw_spin_lock+0x121/0x260 [ 873.373073] ? rwlock_bug.part.0+0x90/0x90 [ 873.373565] ? __pmd_alloc+0x630/0x630 [ 873.374032] __get_user_pages+0x6ec/0x1620 [ 873.374533] ? follow_page_mask+0x1900/0x1900 [ 873.375058] ? down_read+0x10f/0x430 [ 873.375494] ? down_write+0x160/0x160 [ 873.375945] get_user_pages_unlocked+0x18a/0x690 [ 873.376507] ? internal_get_user_pages_fast+0xdce/0x2640 [ 873.377139] ? pin_user_pages_locked+0x7b0/0x7b0 [ 873.377700] internal_get_user_pages_fast+0x175f/0x2640 [ 873.378347] ? pin_user_pages_unlocked+0x80/0x80 [ 873.378917] ? trace_hardirqs_on+0x5b/0x180 [ 873.379430] get_user_pages_fast+0x66/0xa0 [ 873.379933] iov_iter_get_pages+0x297/0xf40 [ 873.380444] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 873.381013] ? mempool_resize+0x7d0/0x7d0 [ 873.381501] bio_iov_iter_get_pages+0x22a/0x1200 [ 873.382052] ? bvec_alloc+0x17e/0x2f0 [ 873.382494] ? bio_alloc_bioset+0x2a1/0x600 [ 873.382994] ? bio_add_pc_page+0x100/0x100 [ 873.383481] ? bvec_alloc+0x290/0x2f0 [ 873.383923] ? iov_iter_npages+0x1fd/0xa70 [ 873.384428] ? ext4_iomap_begin+0x1a0/0x700 [ 873.384937] iomap_dio_bio_actor+0x77a/0xef0 [ 873.385459] iomap_dio_actor+0x36f/0x560 [ 873.385934] iomap_apply+0x289/0x810 [ 873.386367] ? iomap_dio_rw+0x90/0x90 [ 873.386808] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 873.387481] ? delete_from_page_cache_batch+0xa30/0xa30 [ 873.388107] ? mark_held_locks+0x9e/0xe0 [ 873.388593] ? filemap_check_errors+0xa5/0x150 [ 873.389124] __iomap_dio_rw+0x6cd/0x1110 [ 873.389593] ? iomap_dio_rw+0x90/0x90 [ 873.390046] ? iomap_dio_bio_actor+0xef0/0xef0 [ 873.390581] ? down_read+0x10f/0x430 [ 873.391012] ? down_write+0x160/0x160 [ 873.391458] iomap_dio_rw+0x31/0x90 [ 873.391886] ext4_file_read_iter+0x2c7/0x4c0 [ 873.392404] new_sync_read+0x424/0x6f0 [ 873.392860] ? ksys_lseek+0x1b0/0x1b0 [ 873.393315] ? fsnotify_perm.part.0+0x22d/0x620 [ 873.393866] ? security_file_permission+0xb1/0xe0 [ 873.394436] vfs_read+0x4da/0x620 [ 873.394842] ksys_read+0x12d/0x260 [ 873.395251] ? vfs_write+0xb10/0xb10 [ 873.395685] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 873.396303] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.396912] do_syscall_64+0x33/0x40 [ 873.397341] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.397929] RIP: 0033:0x7fb97f666b19 [ 873.398357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.400496] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 873.401377] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 873.402202] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 873.403026] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.403846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 873.404675] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 873.406951] FAULT_INJECTION: forcing a failure. [ 873.406951] name failslab, interval 1, probability 0, space 0, times 0 [ 873.410251] CPU: 0 PID: 6822 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 873.412005] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 873.413866] Call Trace: [ 873.414461] dump_stack+0x107/0x167 [ 873.415281] should_fail.cold+0x5/0xa [ 873.416145] ? mempool_alloc+0x148/0x360 [ 873.417050] ? mempool_free_pages+0x20/0x20 [ 873.418012] should_failslab+0x5/0x20 [ 873.418863] kmem_cache_alloc+0x5b/0x310 [ 873.419778] ? mempool_free_pages+0x20/0x20 [ 873.420751] mempool_alloc+0x148/0x360 [ 873.421632] ? mempool_resize+0x7d0/0x7d0 [ 873.422561] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 873.423747] ? writeback_single_inode+0x358/0x570 [ 873.424835] ? reacquire_held_locks+0x229/0x4e0 [ 873.425874] ? writeback_single_inode+0x358/0x570 [ 873.426961] bio_alloc_bioset+0x36e/0x600 [ 873.427892] ? bvec_alloc+0x2f0/0x2f0 [ 873.428753] ? sync_mapping_buffers+0x3e0/0xcf0 [ 873.429796] ? lock_downgrade+0x6d0/0x6d0 [ 873.430730] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 873.431834] write_dirty_buffer+0xcb/0x180 [ 873.432795] sync_mapping_buffers+0x3ed/0xcf0 [ 873.433805] ? __breadahead+0x140/0x140 [ 873.434716] ? __generic_file_fsync+0x8a/0x1f0 [ 873.435743] fat_file_fsync+0x13b/0x200 [ 873.436635] ? fat_trim_fs+0xfc0/0xfc0 [ 873.437507] vfs_fsync_range+0x13d/0x230 [ 873.438420] generic_file_write_iter+0x19d/0x230 [ 873.439475] ? iov_iter_init+0x3c/0x130 [ 873.440384] new_sync_write+0x42c/0x660 [ 873.441287] ? new_sync_read+0x6f0/0x6f0 [ 873.442198] ? ksys_write+0x12d/0x260 [ 873.443054] ? lock_release+0x680/0x680 [ 873.443944] ? avc_policy_seqno+0x9/0x70 [ 873.444863] ? selinux_file_permission+0x92/0x520 [ 873.445959] vfs_write+0x7c0/0xb10 [ 873.446765] ksys_write+0x12d/0x260 [ 873.447582] ? __ia32_sys_read+0xb0/0xb0 [ 873.448506] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 873.449680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 873.450838] do_syscall_64+0x33/0x40 [ 873.451673] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 873.452828] RIP: 0033:0x7f69c26bfb19 [ 873.453661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 873.457787] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 873.459495] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 873.461098] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 873.462695] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 873.464295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 873.465886] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:47:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x13e000) 05:47:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4007) 05:47:52 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd4(r0, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r1}}, 0x9) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r4}}, 0x7ff) syz_io_uring_submit(0x0, r2, &(0x7f0000000040)=@IORING_OP_OPENAT={0x12, 0x1, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000000)='./file0\x00', 0x20, 0xae000, 0x23456, {0x0, r4}}, 0x7fff) r5 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = signalfd4(r6, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) rt_sigtimedwait(&(0x7f00000000c0)={[0x4]}, &(0x7f00000001c0), &(0x7f0000000100), 0x8) syz_io_uring_submit(0x0, r8, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r7}}, 0x9) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x20010, r7, 0x8000000) read(r5, &(0x7f0000000000), 0x1b4000) 05:48:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 9) 05:48:04 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4007) 05:48:04 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r3, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r2, r3) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1fc, 0x0, 0x0, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x1d4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "3c26d6ac8456c0eea2fc9596f9edda8ade49acc0edef9ca5be"}}, @TIPC_NLA_NODE_ID={0xb7, 0x3, "b30049a7a46e5cedef326f89afa49baea9dc08c04f2f49e70d71811eb318185bb2043fc73b45ba87acdcbd13e82dfd697c893a7393618df97bd84d0f2696bf3134421e9c3a34450d3a7abd0f65e0e84946c28252277923f74ac3526e16893a332474aca0a190ca76ac23ef3697b912442b797f084ea6c09fe3dfe1a7cdb6196c52ea0c740af6a1275c16a7708ce4c8457a507ebe836b8d1f2e3a758f1a67ae6688a7a2e515d98885a533e4fa935b994732fd45"}, @TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "7f2f5883aebc29dcb2e5f122b0962c9a02684fd7247193"}}, @TIPC_NLA_NODE_KEY={0x40, 0x4, {'gcm(aes)\x00', 0x18, "4453065d4dcc83477f995bc700ae4b69146ce1639e3b5103"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "aa1b92413d5c3d8bfa09bc4696e436c3745a4f04ebcab03c55dad76420de1ce6"}}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3}]}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x40000}, 0x810) getsockopt$sock_timeval(r1, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r0, r1) poll(&(0x7f0000000000)=[{r0, 0x2000}, {0xffffffffffffffff, 0x2028}], 0x2, 0xfffffffa) r4 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r4, &(0x7f0000000000), 0x1b4000) 05:48:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 31) 05:48:04 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:48:04 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b400f) 05:48:04 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f00000000c0)=""/102400, 0x19000) accept4(0xffffffffffffffff, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f00000190c0)=0x80, 0x800) [ 884.854844] FAULT_INJECTION: forcing a failure. [ 884.854844] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 884.856304] CPU: 0 PID: 6856 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 884.857079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 884.858017] Call Trace: [ 884.858330] dump_stack+0x107/0x167 [ 884.858747] should_fail.cold+0x5/0xa [ 884.858841] loop4: detected capacity change from 0 to 41948160 [ 884.859224] __alloc_pages_nodemask+0x182/0x600 [ 884.861201] ? add_mm_counter_fast+0x220/0x220 [ 884.861855] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 884.862622] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 884.863396] ? lock_downgrade+0x6d0/0x6d0 [ 884.863997] ? mark_held_locks+0x9e/0xe0 [ 884.864590] alloc_pages_vma+0xbb/0x410 [ 884.865162] handle_mm_fault+0x152f/0x3500 [ 884.865770] ? do_raw_spin_lock+0x121/0x260 [ 884.866386] ? rwlock_bug.part.0+0x90/0x90 [ 884.866916] ? __pmd_alloc+0x630/0x630 [ 884.867497] __get_user_pages+0x6ec/0x1620 [ 884.867992] ? follow_page_mask+0x1900/0x1900 [ 884.868509] ? down_read+0x10f/0x430 [ 884.869006] ? down_write+0x160/0x160 [ 884.869543] ? mark_held_locks+0x9e/0xe0 [ 884.870133] get_user_pages_unlocked+0x18a/0x690 [ 884.870830] ? pin_user_pages_locked+0x7b0/0x7b0 [ 884.871519] ? internal_get_user_pages_fast+0x9ba/0x2640 [ 884.872311] internal_get_user_pages_fast+0x175f/0x2640 [ 884.873079] ? pin_user_pages_unlocked+0x80/0x80 [ 884.873654] ? trace_hardirqs_on+0x5b/0x180 [ 884.874150] get_user_pages_fast+0x66/0xa0 [ 884.874633] iov_iter_get_pages+0x297/0xf40 [ 884.875122] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 884.875680] ? mempool_resize+0x7d0/0x7d0 [ 884.876303] bio_iov_iter_get_pages+0x22a/0x1200 [ 884.876988] ? bvec_alloc+0x17e/0x2f0 [ 884.877533] ? bio_alloc_bioset+0x2a1/0x600 [ 884.878080] ? bio_add_pc_page+0x100/0x100 [ 884.878688] ? bvec_alloc+0x290/0x2f0 [ 884.879238] ? iov_iter_npages+0x1fd/0xa70 [ 884.879865] ? ext4_iomap_begin+0x1a0/0x700 [ 884.880495] iomap_dio_bio_actor+0x77a/0xef0 [ 884.881138] iomap_dio_actor+0x36f/0x560 [ 884.881728] iomap_apply+0x289/0x810 [ 884.882182] ? iomap_dio_rw+0x90/0x90 [ 884.882737] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 884.883558] ? delete_from_page_cache_batch+0xa30/0xa30 [ 884.884316] ? mark_held_locks+0x9e/0xe0 [ 884.884854] ? filemap_check_errors+0xa5/0x150 [ 884.885424] __iomap_dio_rw+0x6cd/0x1110 [ 884.885885] ? iomap_dio_rw+0x90/0x90 [ 884.886331] ? iomap_dio_bio_actor+0xef0/0xef0 [ 884.886987] ? down_read+0x10f/0x430 [ 884.887515] ? down_write+0x160/0x160 [ 884.888061] iomap_dio_rw+0x31/0x90 [ 884.888581] ext4_file_read_iter+0x2c7/0x4c0 [ 884.889213] new_sync_read+0x424/0x6f0 [ 884.889768] ? ksys_lseek+0x1b0/0x1b0 [ 884.890322] ? fsnotify_perm.part.0+0x22d/0x620 [ 884.890911] ? security_file_permission+0xb1/0xe0 [ 884.891606] vfs_read+0x4da/0x620 [ 884.892082] ksys_read+0x12d/0x260 [ 884.892564] ? vfs_write+0xb10/0xb10 [ 884.893001] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 884.893749] ? syscall_enter_from_user_mode+0x1d/0x50 [ 884.894479] do_syscall_64+0x33/0x40 [ 884.894500] FAULT_INJECTION: forcing a failure. [ 884.894500] name failslab, interval 1, probability 0, space 0, times 0 [ 884.895039] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 884.898040] RIP: 0033:0x7fb97f666b19 [ 884.898580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 884.901053] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 884.901955] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 884.902746] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 884.903538] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 884.904339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 884.905343] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 884.906323] CPU: 1 PID: 6863 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 884.907778] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 884.909551] Call Trace: [ 884.910132] dump_stack+0x107/0x167 05:48:04 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b400f) [ 884.910933] should_fail.cold+0x5/0xa [ 884.911903] ? create_object.isra.0+0x3a/0xa30 [ 884.912899] should_failslab+0x5/0x20 [ 884.913713] kmem_cache_alloc+0x5b/0x310 [ 884.914603] create_object.isra.0+0x3a/0xa30 [ 884.915550] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 884.916658] kmem_cache_alloc+0x159/0x310 [ 884.917557] ? mempool_free_pages+0x20/0x20 [ 884.918489] mempool_alloc+0x148/0x360 [ 884.919326] ? mempool_resize+0x7d0/0x7d0 [ 884.920222] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 884.921370] ? writeback_single_inode+0x358/0x570 [ 884.922404] ? reacquire_held_locks+0x229/0x4e0 [ 884.923398] ? writeback_single_inode+0x358/0x570 [ 884.924450] bio_alloc_bioset+0x36e/0x600 [ 884.925346] ? bvec_alloc+0x2f0/0x2f0 [ 884.926165] ? sync_mapping_buffers+0x3e0/0xcf0 [ 884.927170] ? lock_downgrade+0x6d0/0x6d0 [ 884.928065] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 884.929136] write_dirty_buffer+0xcb/0x180 [ 884.930043] sync_mapping_buffers+0x3ed/0xcf0 [ 884.931014] ? __breadahead+0x140/0x140 [ 884.931875] ? __generic_file_fsync+0x8a/0x1f0 [ 884.932864] fat_file_fsync+0x13b/0x200 [ 884.933722] ? fat_trim_fs+0xfc0/0xfc0 [ 884.934564] vfs_fsync_range+0x13d/0x230 [ 884.935443] generic_file_write_iter+0x19d/0x230 [ 884.936473] ? iov_iter_init+0x3c/0x130 [ 884.937334] new_sync_write+0x42c/0x660 [ 884.938192] ? new_sync_read+0x6f0/0x6f0 [ 884.939050] ? ksys_write+0x12d/0x260 [ 884.939853] ? lock_release+0x680/0x680 [ 884.940708] ? avc_policy_seqno+0x9/0x70 [ 884.941574] ? selinux_file_permission+0x92/0x520 [ 884.942628] vfs_write+0x7c0/0xb10 [ 884.943392] ksys_write+0x12d/0x260 [ 884.944162] ? __ia32_sys_read+0xb0/0xb0 [ 884.945038] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 884.946177] ? syscall_enter_from_user_mode+0x1d/0x50 [ 884.947295] do_syscall_64+0x33/0x40 [ 884.948100] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 884.949187] RIP: 0033:0x7f69c26bfb19 [ 884.949995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 884.953972] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 884.955620] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 884.957154] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 884.958682] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 884.960201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 884.961726] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:48:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b402f) 05:48:21 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x5, 0x3, &(0x7f0000000240)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="656001495e644c4129baecd4a06629bc32cab0d2528c8e723726b063e8fca24d922a51fe9dfa1be08a400fb93dab8263575992f245b33a83e4ad05ee7bc4e0f5496249951c21e0c31f", 0x49, 0x7}, {&(0x7f0000000180)="6b49a20c74895d095f46d291913d0520f1686db0e4a196475525f3edbaf1a00767ff4ff711c1a2b3a33b412793a405e876d60583b7150916179c3e713052002b00cb239e3afd854f561321812482f7c2ecd629e0f3a7b04db144df0197c6686a02962d53222c6abe5d93b7f4d28ea4ed3e5625ca641dfb3cc0ef6424d3bb720b32d689dde996b4cc2751a6b5674802c1bbd5e6b272261e4424ebde7f700b06ff3cdadcaf9c55beb8761e", 0xaa, 0x1}], 0x220040, &(0x7f00000002c0)={[{'$}'}, {'&\x01{{@\\#\\#![!'}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_STATX={0x15, 0x2, 0x0, r1, &(0x7f0000000300), &(0x7f0000000400)='./file0\x00', 0x200, 0x2000, 0x1, {0x0, r2}}, 0x7f) 05:48:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 32) 05:48:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4073) 05:48:21 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8983, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x123100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:48:21 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:48:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 10) [ 902.041081] loop4: detected capacity change from 0 to 41948160 [ 902.041137] FAULT_INJECTION: forcing a failure. [ 902.041137] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 902.044898] CPU: 1 PID: 6882 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 902.046270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 902.047948] Call Trace: [ 902.048484] dump_stack+0x107/0x167 [ 902.049232] should_fail.cold+0x5/0xa [ 902.050011] __alloc_pages_nodemask+0x182/0x600 [ 902.050953] ? add_mm_counter_fast+0x220/0x220 [ 902.051881] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 902.053102] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 902.054158] ? lock_downgrade+0x6d0/0x6d0 [ 902.054989] ? mark_held_locks+0x9e/0xe0 [ 902.055833] alloc_pages_vma+0xbb/0x410 [ 902.056654] handle_mm_fault+0x152f/0x3500 [ 902.057515] ? do_raw_spin_lock+0x121/0x260 [ 902.058383] ? rwlock_bug.part.0+0x90/0x90 [ 902.059232] ? __pmd_alloc+0x630/0x630 [ 902.060042] __get_user_pages+0x6ec/0x1620 [ 902.060906] ? follow_page_mask+0x1900/0x1900 [ 902.061821] ? down_read+0x10f/0x430 [ 902.062562] ? down_write+0x160/0x160 [ 902.063349] get_user_pages_unlocked+0x18a/0x690 [ 902.064299] ? internal_get_user_pages_fast+0xdce/0x2640 [ 902.065403] ? pin_user_pages_locked+0x7b0/0x7b0 [ 902.066370] internal_get_user_pages_fast+0x175f/0x2640 [ 902.067480] ? pin_user_pages_unlocked+0x80/0x80 [ 902.068439] ? trace_hardirqs_on+0x5b/0x180 [ 902.069323] get_user_pages_fast+0x66/0xa0 [ 902.070196] iov_iter_get_pages+0x297/0xf40 [ 902.071066] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 902.072050] ? mempool_resize+0x7d0/0x7d0 [ 902.072907] bio_iov_iter_get_pages+0x22a/0x1200 [ 902.073888] ? bvec_alloc+0x17e/0x2f0 [ 902.074655] ? bio_alloc_bioset+0x2a1/0x600 [ 902.075517] ? bio_add_pc_page+0x100/0x100 [ 902.076364] ? bvec_alloc+0x290/0x2f0 [ 902.077148] ? iov_iter_npages+0x1fd/0xa70 [ 902.078000] ? ext4_iomap_begin+0x1a0/0x700 [ 902.078885] iomap_dio_bio_actor+0x77a/0xef0 [ 902.079784] iomap_dio_actor+0x36f/0x560 [ 902.080621] iomap_apply+0x289/0x810 [ 902.081382] ? iomap_dio_rw+0x90/0x90 [ 902.082154] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 902.083335] ? delete_from_page_cache_batch+0xa30/0xa30 [ 902.084397] ? mark_held_locks+0x9e/0xe0 [ 902.085244] ? filemap_check_errors+0xa5/0x150 [ 902.086186] __iomap_dio_rw+0x6cd/0x1110 [ 902.087002] ? iomap_dio_rw+0x90/0x90 [ 902.087786] ? iomap_dio_bio_actor+0xef0/0xef0 [ 902.088733] ? down_read+0x10f/0x430 [ 902.089492] ? down_write+0x160/0x160 [ 902.090282] iomap_dio_rw+0x31/0x90 [ 902.091025] ext4_file_read_iter+0x2c7/0x4c0 [ 902.091978] new_sync_read+0x424/0x6f0 [ 902.092971] ? ksys_lseek+0x1b0/0x1b0 [ 902.093753] ? fsnotify_perm.part.0+0x22d/0x620 [ 902.094706] ? security_file_permission+0xb1/0xe0 [ 902.095693] vfs_read+0x4da/0x620 [ 902.096405] ksys_read+0x12d/0x260 [ 902.097141] ? vfs_write+0xb10/0xb10 [ 902.097897] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 902.098978] ? syscall_enter_from_user_mode+0x1d/0x50 [ 902.100028] do_syscall_64+0x33/0x40 [ 902.100798] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 902.102066] RIP: 0033:0x7fb97f666b19 [ 902.102952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 902.106911] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 902.108476] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 902.109958] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 902.111400] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 902.112844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 902.114311] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:48:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b403e) 05:48:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1da688) 05:48:21 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8990, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x40, 0x4) read(r0, &(0x7f0000000000), 0x1b4000) 05:48:21 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 33) [ 902.190595] FAULT_INJECTION: forcing a failure. [ 902.190595] name failslab, interval 1, probability 0, space 0, times 0 [ 902.193096] CPU: 0 PID: 6883 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 902.194535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 902.196294] Call Trace: [ 902.196867] dump_stack+0x107/0x167 [ 902.197635] should_fail.cold+0x5/0xa [ 902.198444] ? mempool_alloc+0x148/0x360 [ 902.199309] ? mempool_free_pages+0x20/0x20 [ 902.200226] should_failslab+0x5/0x20 [ 902.201051] kmem_cache_alloc+0x5b/0x310 [ 902.201933] ? mempool_free_pages+0x20/0x20 [ 902.202847] mempool_alloc+0x148/0x360 [ 902.203678] ? mempool_resize+0x7d0/0x7d0 [ 902.204575] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 902.205680] ? lock_acquire+0x197/0x470 [ 902.206523] ? find_held_lock+0x2c/0x110 [ 902.207405] bio_alloc_bioset+0x36e/0x600 [ 902.208281] ? bvec_alloc+0x2f0/0x2f0 [ 902.209092] ? sync_mapping_buffers+0x3e0/0xcf0 [ 902.210076] ? lock_downgrade+0x6d0/0x6d0 [ 902.210957] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 902.211994] write_dirty_buffer+0xcb/0x180 [ 902.212887] sync_mapping_buffers+0x3ed/0xcf0 [ 902.213848] ? __breadahead+0x140/0x140 [ 902.214715] ? __generic_file_fsync+0x8a/0x1f0 [ 902.215681] fat_file_fsync+0x13b/0x200 [ 902.216535] ? fat_trim_fs+0xfc0/0xfc0 [ 902.217360] vfs_fsync_range+0x13d/0x230 [ 902.218231] generic_file_write_iter+0x19d/0x230 [ 902.219260] ? iov_iter_init+0x3c/0x130 [ 902.220109] new_sync_write+0x42c/0x660 [ 902.220974] ? new_sync_read+0x6f0/0x6f0 [ 902.221835] ? ksys_write+0x12d/0x260 [ 902.222660] ? lock_release+0x680/0x680 [ 902.223496] ? avc_policy_seqno+0x9/0x70 [ 902.224349] ? selinux_file_permission+0x92/0x520 [ 902.225397] vfs_write+0x7c0/0xb10 [ 902.226166] ksys_write+0x12d/0x260 [ 902.226948] ? __ia32_sys_read+0xb0/0xb0 [ 902.227821] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 902.228941] ? syscall_enter_from_user_mode+0x1d/0x50 [ 902.230029] do_syscall_64+0x33/0x40 [ 902.230824] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 902.231915] RIP: 0033:0x7f69c26bfb19 [ 902.232715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 902.236630] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 902.238252] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 902.239778] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 902.241309] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 902.242839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 902.244363] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 [ 902.277188] FAULT_INJECTION: forcing a failure. [ 902.277188] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 902.279661] CPU: 1 PID: 6901 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 902.281038] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 902.282707] Call Trace: [ 902.283239] dump_stack+0x107/0x167 [ 902.283974] should_fail.cold+0x5/0xa [ 902.284760] __alloc_pages_nodemask+0x182/0x600 [ 902.285712] ? add_mm_counter_fast+0x220/0x220 [ 902.286820] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 902.288126] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 902.289192] ? lock_downgrade+0x6d0/0x6d0 [ 902.290038] ? mark_held_locks+0x9e/0xe0 [ 902.290862] alloc_pages_vma+0xbb/0x410 [ 902.291676] handle_mm_fault+0x152f/0x3500 [ 902.292535] ? do_raw_spin_lock+0x121/0x260 [ 902.293432] ? rwlock_bug.part.0+0x90/0x90 [ 902.294284] ? __pmd_alloc+0x630/0x630 [ 902.295095] __get_user_pages+0x6ec/0x1620 [ 902.295955] ? follow_page_mask+0x1900/0x1900 [ 902.296883] ? down_read+0x10f/0x430 [ 902.297638] ? down_write+0x160/0x160 [ 902.298417] get_user_pages_unlocked+0x18a/0x690 [ 902.299391] ? internal_get_user_pages_fast+0xdce/0x2640 [ 902.300476] ? pin_user_pages_locked+0x7b0/0x7b0 [ 902.301476] internal_get_user_pages_fast+0x175f/0x2640 [ 902.302596] ? pin_user_pages_unlocked+0x80/0x80 [ 902.303558] ? trace_hardirqs_on+0x5b/0x180 [ 902.304433] get_user_pages_fast+0x66/0xa0 [ 902.305309] iov_iter_get_pages+0x297/0xf40 [ 902.306192] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 902.307179] ? mempool_resize+0x7d0/0x7d0 [ 902.308035] bio_iov_iter_get_pages+0x22a/0x1200 [ 902.309013] ? bvec_alloc+0x17e/0x2f0 [ 902.310029] ? bio_alloc_bioset+0x2a1/0x600 [ 902.311099] ? bio_add_pc_page+0x100/0x100 [ 902.311960] ? bvec_alloc+0x290/0x2f0 [ 902.312744] ? iov_iter_npages+0x1fd/0xa70 [ 902.313602] ? ext4_iomap_begin+0x1a0/0x700 [ 902.314663] iomap_dio_bio_actor+0x77a/0xef0 [ 902.315576] iomap_dio_actor+0x36f/0x560 [ 902.316404] iomap_apply+0x289/0x810 [ 902.317177] ? iomap_dio_rw+0x90/0x90 [ 902.317937] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 902.319233] ? delete_from_page_cache_batch+0xa30/0xa30 [ 902.320361] ? mark_held_locks+0x9e/0xe0 [ 902.321193] ? filemap_check_errors+0xa5/0x150 [ 902.322114] __iomap_dio_rw+0x6cd/0x1110 [ 902.322931] ? iomap_dio_rw+0x90/0x90 [ 902.323726] ? iomap_dio_bio_actor+0xef0/0xef0 [ 902.324652] ? down_read+0x10f/0x430 [ 902.325401] ? down_write+0x160/0x160 [ 902.326186] iomap_dio_rw+0x31/0x90 [ 902.327003] ext4_file_read_iter+0x2c7/0x4c0 [ 902.328035] new_sync_read+0x424/0x6f0 [ 902.329032] ? ksys_lseek+0x1b0/0x1b0 [ 902.329898] ? fsnotify_perm.part.0+0x22d/0x620 [ 902.330839] ? security_file_permission+0xb1/0xe0 [ 902.331817] vfs_read+0x4da/0x620 [ 902.332527] ksys_read+0x12d/0x260 [ 902.333250] ? vfs_write+0xb10/0xb10 [ 902.334000] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 902.335056] ? syscall_enter_from_user_mode+0x1d/0x50 [ 902.336091] do_syscall_64+0x33/0x40 [ 902.336844] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 902.337867] RIP: 0033:0x7fb97f666b19 [ 902.338608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 902.342309] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 902.343870] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 902.345315] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 902.346749] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 902.348173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 902.349613] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:48:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1da688) 05:48:21 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8992, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:21 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x1, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) splice(r1, &(0x7f0000000040)=0x1, r0, &(0x7f00000000c0)=0x3, 0x5, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:48:21 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x201b4000) 05:48:21 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:48:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 11) [ 902.488087] FAULT_INJECTION: forcing a failure. [ 902.488087] name failslab, interval 1, probability 0, space 0, times 0 [ 902.490510] CPU: 1 PID: 6917 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 902.491875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 902.493603] Call Trace: [ 902.494145] dump_stack+0x107/0x167 [ 902.494886] should_fail.cold+0x5/0xa [ 902.495688] ? create_object.isra.0+0x3a/0xa30 [ 902.496816] should_failslab+0x5/0x20 [ 902.497576] kmem_cache_alloc+0x5b/0x310 [ 902.498404] create_object.isra.0+0x3a/0xa30 [ 902.499291] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 902.500327] kmem_cache_alloc+0x159/0x310 [ 902.501182] jbd2__journal_start+0x190/0x7e0 [ 902.502070] __ext4_journal_start_sb+0x214/0x390 [ 902.503028] ext4_writepages+0x102d/0x3350 [ 902.503888] ? __ext4_journal_stop+0xde/0x1f0 [ 902.504787] ? ext4_da_write_end+0x21e/0x9c0 [ 902.505676] ? generic_perform_write+0x2bf/0x4f0 [ 902.506626] ? ksys_write+0x12d/0x260 [ 902.507398] ? lock_chain_count+0x20/0x20 [ 902.508242] ? lock_acquire+0x197/0x470 [ 902.509057] ? find_held_lock+0x2c/0x110 [ 902.509876] ? __ext4_mark_inode_dirty+0x770/0x770 [ 902.510874] ? mark_held_locks+0x9e/0xe0 [ 902.511696] ? trace_hardirqs_on+0x5b/0x180 [ 902.512584] ? kmem_cache_free+0xa7/0x2d0 [ 902.513424] ? __kasan_slab_free+0x122/0x160 [ 902.514320] ? slab_free_freelist_hook+0xa9/0x180 [ 902.515431] ? jbd2_journal_stop+0x61f/0xdc0 [ 902.516539] ? kmem_cache_free+0x249/0x2d0 [ 902.517478] ? __ext4_mark_inode_dirty+0x770/0x770 [ 902.518454] do_writepages+0xee/0x2a0 [ 902.519234] ? page_writeback_cpu_online+0x20/0x20 [ 902.520215] ? __block_commit_write.constprop.0.isra.0+0x255/0x2e0 [ 902.521480] ? unlock_page+0xf1/0x180 [ 902.522246] ? __wb_update_bandwidth.constprop.0+0xe00/0xe00 [ 902.523402] __filemap_fdatawrite_range+0x24b/0x2f0 [ 902.524401] ? delete_from_page_cache_batch+0xa30/0xa30 [ 902.525499] ? generic_perform_write+0x37d/0x4f0 [ 902.526445] file_write_and_wait_range+0xb6/0x130 [ 902.527618] ext4_sync_file+0x225/0xde0 [ 902.528413] ? ext4_getfsmap+0x990/0x990 [ 902.529250] vfs_fsync_range+0x13d/0x230 [ 902.530081] ext4_buffered_write_iter+0x34b/0x4a0 [ 902.531052] ? __lock_acquire+0xbb1/0x5b00 [ 902.531918] ext4_file_write_iter+0x3ab/0x1530 [ 902.532841] ? __lock_acquire+0x1657/0x5b00 [ 902.533725] ? ext4_file_read_iter+0x4c0/0x4c0 [ 902.534652] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 902.535717] new_sync_write+0x42c/0x660 [ 902.536520] ? new_sync_read+0x6f0/0x6f0 [ 902.537340] ? ksys_write+0x12d/0x260 [ 902.538117] ? lock_release+0x680/0x680 [ 902.538921] ? avc_policy_seqno+0x9/0x70 [ 902.539733] ? selinux_file_permission+0x92/0x520 [ 902.540727] vfs_write+0x7c0/0xb10 [ 902.541453] ksys_write+0x12d/0x260 [ 902.542188] ? __ia32_sys_read+0xb0/0xb0 [ 902.543016] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 902.544094] ? syscall_enter_from_user_mode+0x1d/0x50 [ 902.545143] do_syscall_64+0x33/0x40 [ 902.545897] entry_SYSCALL_64_after_hwframe+0x67/0xd1 05:48:21 executing program 5: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000700)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c040000", @ANYRES16=0x0, @ANYBLOB="020028bd7000fddbdf250100000018010c803c000b8008000a00dca500000800090001df653208000a0044dc000008000a006861000008000a0066730000080009002a9f433d08000a00ffb600001c000b8008000900c47d72130800050053bf000008000a005073000024000b8008000900c395102808000a00f9fe00000800090017e3c336080009001417334b14000b8008000a00d452000008000a00eb9300000c000b8008000900039e514f14000b8008000900d55d196d08000900deceb2612c000b8008000a000e71000008000a009c97000008000a0047b0000008000a0026bd000008000900a986166c04000b8034000b8008000a004b7e00000800090060b9ae300800090023ee312c08000a00e457000008000a005771000008000900e0203404080001000200000014000480050003000700000005000300050000000800020002000000900008802c000780080005005e80f34908000500c7f2ca52080006009900000008000500c3589c5b080005004961b60f4c00078008000600f800000008000600c1000000080006000000000008000500317cc74e080006003700000008000500dce9f147080005003410450b080006001700000008000500c2d88d2b14000780080005009b8849100800060089000000b0000c802c000b8008000a0046dd000008000900673f680308000a00d60c000008000a009921000008000900a9bcb61c14000b80080009001e84b77508000900c4e4905414000b80080009005a612b120800090084c8977e1c000b8008000a00c37f0000080009000c15f15d080009007bc33c273c000b8008000a006b89000008000a0048fa000008000a00e6a0000008000900c7dcb53408000900b2f8003a08000a004f33000008000900bf93df4a7c0008803c000780080006007c0000000800050067589a3f080006009100000008000500babd2a59080006007d0000000800050007b3a36608000600650000003c0007800800050013793429080005007212fe6008000600aa00000008000600fd000000080006002c000000080005009af3f23108000600d8000000400108805400078008000600fe00000008000600db00000008000500eea17017080006007700000008000600f300000008000500a038c74708000500228f1d0b08000500d43213760800050035d4a63b08000600f00000002400078008000600ed00000008000500b20b883308000500ead0847f08000500b174702924000780080006001b000000080005002fee62730800050039782e2508000500a8c344301c000780080006000c00000008000600b1000000080005005b5efb7a1c000780080005004e210a020800050098aa423208000600050000004400078008000500afe6424708000500a993315c080006007c00000008000500076ec811080006008b0000000800050010251b00080005006378e72a0800050078f29a332400078008000500464c260608000600c7000000080006008a000000080006008c000000"], 0x44c}, 0x1, 0x0, 0x0, 0x20000050}, 0x20000000) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) openat(r0, &(0x7f0000000200)='./file0\x00', 0x8040, 0x88) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f00000001c0)={0x1, 0x1, 0x6, 0x1, 0xffffffffffffffff}) copy_file_range(r0, 0x0, r2, &(0x7f00000000c0)=0x8, 0x10000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000100)=ANY=[@ANYBLOB="532900f200fdff", @ANYRESOCT=r2, @ANYBLOB="08000000000000002e2f292a9a080000000000000066696c653008"]) openat(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0xe) read(r0, &(0x7f0000000000), 0x1b4000) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x30, r2, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000001, 0x1010, r2, 0x10000000) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = signalfd4(r6, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r8 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r8, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r7}}, 0x9) dup(r7) syz_io_uring_submit(r4, r5, &(0x7f0000000040)=@IORING_OP_NOP={0x0, 0x1}, 0x2) [ 902.547167] RIP: 0033:0x7f69c26bfb19 [ 902.548018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 902.551761] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 902.553335] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 902.554800] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 902.556229] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 902.557679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 902.559105] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:48:22 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 34) [ 902.666001] FAULT_INJECTION: forcing a failure. [ 902.666001] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 902.668622] CPU: 1 PID: 6922 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 902.670017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 902.671691] Call Trace: [ 902.672228] dump_stack+0x107/0x167 [ 902.672984] should_fail.cold+0x5/0xa [ 902.673756] __alloc_pages_nodemask+0x182/0x600 [ 902.674694] ? add_mm_counter_fast+0x220/0x220 [ 902.675611] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 902.676837] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 902.677896] ? lock_downgrade+0x6d0/0x6d0 [ 902.678722] ? mark_held_locks+0x9e/0xe0 [ 902.679554] alloc_pages_vma+0xbb/0x410 [ 902.680363] handle_mm_fault+0x152f/0x3500 [ 902.681222] ? do_raw_spin_lock+0x121/0x260 [ 902.682118] ? rwlock_bug.part.0+0x90/0x90 [ 902.682967] ? __pmd_alloc+0x630/0x630 [ 902.683783] __get_user_pages+0x6ec/0x1620 [ 902.684669] ? follow_page_mask+0x1900/0x1900 [ 902.685577] ? down_read+0x10f/0x430 [ 902.686343] ? down_write+0x160/0x160 [ 902.687137] get_user_pages_unlocked+0x18a/0x690 [ 902.688086] ? internal_get_user_pages_fast+0xdce/0x2640 [ 902.689181] ? pin_user_pages_locked+0x7b0/0x7b0 [ 902.690169] internal_get_user_pages_fast+0x175f/0x2640 [ 902.691293] ? pin_user_pages_unlocked+0x80/0x80 [ 902.692251] ? trace_hardirqs_on+0x5b/0x180 [ 902.693136] get_user_pages_fast+0x66/0xa0 [ 902.693995] iov_iter_get_pages+0x297/0xf40 [ 902.694864] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 902.695855] ? mempool_resize+0x7d0/0x7d0 [ 902.696715] bio_iov_iter_get_pages+0x22a/0x1200 [ 902.697665] ? bvec_alloc+0x17e/0x2f0 [ 902.698453] ? bio_alloc_bioset+0x2a1/0x600 [ 902.699317] ? bio_add_pc_page+0x100/0x100 [ 902.700168] ? bvec_alloc+0x290/0x2f0 [ 902.700938] ? iov_iter_npages+0x1fd/0xa70 [ 902.701791] ? ext4_iomap_begin+0x1a0/0x700 [ 902.702665] iomap_dio_bio_actor+0x77a/0xef0 [ 902.703573] iomap_dio_actor+0x36f/0x560 [ 902.704401] iomap_apply+0x289/0x810 [ 902.705163] ? iomap_dio_rw+0x90/0x90 [ 902.705942] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 902.707108] ? delete_from_page_cache_batch+0xa30/0xa30 [ 902.708164] ? mark_held_locks+0x9e/0xe0 [ 902.709012] ? filemap_check_errors+0xa5/0x150 [ 902.709936] __iomap_dio_rw+0x6cd/0x1110 [ 902.710754] ? iomap_dio_rw+0x90/0x90 [ 902.711534] ? iomap_dio_bio_actor+0xef0/0xef0 [ 902.712466] ? down_read+0x10f/0x430 [ 902.713214] ? down_write+0x160/0x160 [ 902.714001] iomap_dio_rw+0x31/0x90 [ 902.714742] ext4_file_read_iter+0x2c7/0x4c0 [ 902.715627] new_sync_read+0x424/0x6f0 [ 902.716413] ? ksys_lseek+0x1b0/0x1b0 [ 902.717217] ? fsnotify_perm.part.0+0x22d/0x620 [ 902.718170] ? security_file_permission+0xb1/0xe0 [ 902.719171] vfs_read+0x4da/0x620 [ 902.719870] ksys_read+0x12d/0x260 [ 902.720596] ? vfs_write+0xb10/0xb10 [ 902.721354] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 902.722413] ? syscall_enter_from_user_mode+0x1d/0x50 [ 902.723462] do_syscall_64+0x33/0x40 [ 902.724213] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 902.725267] RIP: 0033:0x7fb97f666b19 [ 902.726017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 902.729822] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 902.731422] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 902.732951] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 902.734441] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 902.735936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 902.737465] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:48:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 35) 05:48:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x8, 0x4) 05:48:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 12) 05:48:34 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x201b4000) 05:48:34 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) [ 914.659137] FAULT_INJECTION: forcing a failure. [ 914.659137] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 914.660653] CPU: 0 PID: 6940 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 914.661518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 914.662558] Call Trace: [ 914.662903] dump_stack+0x107/0x167 [ 914.663354] should_fail.cold+0x5/0xa [ 914.663837] __alloc_pages_nodemask+0x182/0x600 [ 914.664412] ? add_mm_counter_fast+0x220/0x220 [ 914.664985] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 914.665736] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 914.666395] ? lock_downgrade+0x6d0/0x6d0 [ 914.666927] ? mark_held_locks+0x9e/0xe0 [ 914.667432] alloc_pages_vma+0xbb/0x410 [ 914.667934] handle_mm_fault+0x152f/0x3500 [ 914.668452] ? do_raw_spin_lock+0x121/0x260 [ 914.669008] ? rwlock_bug.part.0+0x90/0x90 [ 914.669531] ? __pmd_alloc+0x630/0x630 [ 914.670028] __get_user_pages+0x6ec/0x1620 [ 914.670557] ? follow_page_mask+0x1900/0x1900 [ 914.671107] ? down_read+0x10f/0x430 [ 914.671563] ? down_write+0x160/0x160 [ 914.671786] loop4: detected capacity change from 0 to 41948160 [ 914.672046] get_user_pages_unlocked+0x18a/0x690 [ 914.673894] ? internal_get_user_pages_fast+0xdce/0x2640 [ 914.674558] ? pin_user_pages_locked+0x7b0/0x7b0 [ 914.675153] internal_get_user_pages_fast+0x175f/0x2640 [ 914.675824] ? pin_user_pages_unlocked+0x80/0x80 [ 914.676405] ? trace_hardirqs_on+0x5b/0x180 [ 914.676995] get_user_pages_fast+0x66/0xa0 [ 914.677689] iov_iter_get_pages+0x297/0xf40 [ 914.678223] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 914.678822] ? mempool_resize+0x7d0/0x7d0 [ 914.679340] bio_iov_iter_get_pages+0x22a/0x1200 [ 914.679924] ? bvec_alloc+0x17e/0x2f0 [ 914.680392] ? bio_alloc_bioset+0x2a1/0x600 [ 914.680928] ? bio_add_pc_page+0x100/0x100 [ 914.681448] ? bvec_alloc+0x290/0x2f0 [ 914.681915] ? iov_iter_npages+0x1fd/0xa70 [ 914.682435] ? ext4_iomap_begin+0x1a0/0x700 [ 914.682971] iomap_dio_bio_actor+0x77a/0xef0 [ 914.683519] iomap_dio_actor+0x36f/0x560 [ 914.684025] iomap_apply+0x289/0x810 [ 914.684483] ? iomap_dio_rw+0x90/0x90 [ 914.684964] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 914.685683] ? delete_from_page_cache_batch+0xa30/0xa30 [ 914.686343] ? mark_held_locks+0x9e/0xe0 [ 914.686860] ? filemap_check_errors+0xa5/0x150 [ 914.687423] __iomap_dio_rw+0x6cd/0x1110 [ 914.687921] ? iomap_dio_rw+0x90/0x90 [ 914.688402] ? iomap_dio_bio_actor+0xef0/0xef0 [ 914.688973] ? down_read+0x10f/0x430 [ 914.689428] ? down_write+0x160/0x160 [ 914.689904] iomap_dio_rw+0x31/0x90 [ 914.690351] ext4_file_read_iter+0x2c7/0x4c0 [ 914.690905] new_sync_read+0x424/0x6f0 [ 914.691379] ? ksys_lseek+0x1b0/0x1b0 [ 914.691863] ? fsnotify_perm.part.0+0x22d/0x620 [ 914.692433] ? security_file_permission+0xb1/0xe0 [ 914.693051] vfs_read+0x4da/0x620 [ 914.693477] ksys_read+0x12d/0x260 [ 914.693915] ? vfs_write+0xb10/0xb10 [ 914.694370] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 914.695015] ? syscall_enter_from_user_mode+0x1d/0x50 [ 914.695646] do_syscall_64+0x33/0x40 [ 914.696105] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 914.696748] RIP: 0033:0x7fb97f666b19 [ 914.697204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.699437] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 914.700363] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 05:48:34 executing program 2: fchmod(0xffffffffffffffff, 0xc5) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x4000, 0x1) read(r0, &(0x7f00000000c0)=""/102400, 0x19000) 05:48:34 executing program 5: stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@local, 0x4e20, 0x0, 0x4e20, 0x7f, 0xa, 0xa0, 0x80, 0x87, 0x0, r0}, {0x1, 0x3f, 0x8, 0x7, 0x97b0, 0xfffffffffffffffd, 0x1, 0x1d1d4c0}, {0x5, 0x6, 0xc22, 0x7f}, 0x7, 0x6e6bbe, 0x1, 0x0, 0x1, 0x1}, {{@in=@multicast1, 0x4d5, 0x3c}, 0x2, @in6=@empty, 0x3507, 0x4, 0x2, 0x9, 0x925a000, 0xfffffffd, 0x9}}, 0xe8) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) sendmsg$NL80211_CMD_GET_COALESCE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x30, 0x0, 0x0, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x6f}, @val={0x8}, @val={0xc, 0x99, {0x7, 0x1d}}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x200002, 0x0) r3 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f00000002c0)=@get={0x1, &(0x7f0000000280)=""/26, 0xffffffff}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b40)={0x14, r4, 0x20, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r4, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x240440c1}, 0x40004) [ 914.701370] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 914.702250] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.703121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 914.703985] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:48:34 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8994, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 914.743607] FAULT_INJECTION: forcing a failure. [ 914.743607] name failslab, interval 1, probability 0, space 0, times 0 [ 914.745087] CPU: 0 PID: 6939 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 914.745903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 914.746891] Call Trace: [ 914.747208] dump_stack+0x107/0x167 [ 914.747642] should_fail.cold+0x5/0xa [ 914.748095] ? mempool_alloc+0x148/0x360 [ 914.748579] ? mempool_free_pages+0x20/0x20 [ 914.749118] should_failslab+0x5/0x20 [ 914.749727] kmem_cache_alloc+0x5b/0x310 [ 914.750222] ? mempool_free_pages+0x20/0x20 [ 914.750732] mempool_alloc+0x148/0x360 [ 914.751198] ? mempool_resize+0x7d0/0x7d0 [ 914.751691] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 914.752313] ? lock_acquire+0x197/0x470 [ 914.752799] ? find_held_lock+0x2c/0x110 [ 914.753291] bio_alloc_bioset+0x36e/0x600 [ 914.753783] ? bvec_alloc+0x2f0/0x2f0 [ 914.754240] ? sync_mapping_buffers+0x3e0/0xcf0 [ 914.754791] ? lock_downgrade+0x6d0/0x6d0 [ 914.755287] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 914.755870] write_dirty_buffer+0xcb/0x180 [ 914.756373] sync_mapping_buffers+0x3ed/0xcf0 [ 914.756914] ? __breadahead+0x140/0x140 [ 914.757398] ? __generic_file_fsync+0x8a/0x1f0 [ 914.757957] fat_file_fsync+0x13b/0x200 [ 914.758423] ? fat_trim_fs+0xfc0/0xfc0 [ 914.758888] vfs_fsync_range+0x13d/0x230 [ 914.759367] generic_file_write_iter+0x19d/0x230 [ 914.759924] ? iov_iter_init+0x3c/0x130 [ 914.760398] new_sync_write+0x42c/0x660 [ 914.760883] ? new_sync_read+0x6f0/0x6f0 [ 914.761360] ? ksys_write+0x12d/0x260 [ 914.761813] ? lock_release+0x680/0x680 [ 914.762285] ? avc_policy_seqno+0x9/0x70 [ 914.762771] ? selinux_file_permission+0x92/0x520 [ 914.763353] vfs_write+0x7c0/0xb10 [ 914.763777] ksys_write+0x12d/0x260 [ 914.764212] ? __ia32_sys_read+0xb0/0xb0 [ 914.764710] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 914.765336] ? syscall_enter_from_user_mode+0x1d/0x50 [ 914.765948] do_syscall_64+0x33/0x40 [ 914.766391] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 914.767001] RIP: 0033:0x7f69c26bfb19 [ 914.767438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.769609] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 914.770502] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 914.771344] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 914.772181] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.773027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 914.773877] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:48:34 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:48:34 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) read(r0, &(0x7f0000000000), 0x1b4000) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f00000000c0)={0x100000001, 0x9, 0x5, 0x1000, 0x4, [{0x4, 0x7, 0x101, '\x00', 0x1400}, {0x0, 0x5, 0x4, '\x00', 0x1490}, {0x9, 0x1, 0xa5, '\x00', 0xc02}, {0x8000, 0x401, 0x4, '\x00', 0x100a}]}) 05:48:34 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) openat(r0, &(0x7f0000000000)='./file0\x00', 0x1f13c1, 0x1) 05:48:34 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0xffffff3f, 0x0, 0xff, 0x8, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) syz_io_uring_setup(0x7dd5, &(0x7f00000001c0)={0x0, 0xe463, 0x20, 0x3, 0x1e3, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000280)) r5 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000002c0), 0x2, 0x0) r6 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r7, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r6, r7) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000300)=@IORING_OP_SPLICE={0x1e, 0x0, 0x0, @fd=r5, 0x2, {0x0, r6}, 0x0, 0xc, 0x0, {0x0, r8, r0}}, 0x6) openat(r2, &(0x7f0000000000)='./file0\x00', 0x200000, 0x4) ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, &(0x7f0000000040)) creat(&(0x7f0000000100)='./file0\x00', 0x102) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@local, 0x78}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@remote}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x4, 0x1f, 0x0, 0x2, 0x12, @private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x1, 0x40, 0x7940, 0x100}}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r7, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000480)={0x130, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_PAUSE_HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}, @ETHTOOL_A_PAUSE_TX={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_PAUSE_RX={0x5, 0x3, 0x1}, @ETHTOOL_A_PAUSE_RX={0x5}]}, 0x130}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) 05:48:34 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8995, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:34 executing program 5: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5}}, './file0\x00'}) r1 = openat(r0, &(0x7f0000000080)='./file1\x00', 0x40400, 0x1c) read(r1, &(0x7f0000000000), 0x1b4000) 05:48:34 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a0, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:47 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:48:47 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a1, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:47 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 36) 05:48:47 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r1, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r0, r1) read(r1, &(0x7f00000000c0)=""/102395, 0x18ffb) [ 928.289964] FAULT_INJECTION: forcing a failure. [ 928.289964] name fail_page_alloc, interval 1, probability 0, space 0, times 0 05:48:47 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) syz_io_uring_setup(0x273f, &(0x7f0000000000)={0x0, 0xade0, 0x20, 0x1, 0x29d, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x4000010, r0, 0x10000000) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x200000f, 0x80010, r0, 0x8000000) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = signalfd4(r4, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r6, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r5}}, 0x9) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r8}}, 0x7ff) syz_io_uring_submit(r3, r6, &(0x7f00000001c0)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ff9000/0x7000)=nil, 0x7000, 0xf, 0x1, {0x0, r8}}, 0x800) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x0, 0x989680}, 0x1, 0x1, 0x0, {0x0, r9}}, 0x400) 05:48:47 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x200, 0x0) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000140)=""/188, 0xbc}, {&(0x7f0000000200)=""/45, 0x2d}, {&(0x7f0000000240)=""/230, 0xe6}, {&(0x7f0000000340)=""/178, 0xb2}], 0x4, 0x0, 0xfffff224) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x400) read(r1, &(0x7f0000000000), 0x1b4000) 05:48:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 13) 05:48:47 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x7ff000, @private2, 0x1}, 0x1c) r1 = signalfd4(r0, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_setup(0x4c24, &(0x7f00000000c0)={0x0, 0x71ac, 0x34, 0x1, 0x82, 0x0, r1}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r1}}, 0x9) r3 = openat(r1, &(0x7f0000000080)='/proc/self/exe\x00', 0x147182, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) r4 = openat$incfs(r3, &(0x7f0000000000)='.log\x00', 0x501000, 0x0) openat(r4, &(0x7f0000000040)='./file0\x00', 0x40, 0x4) [ 928.292497] CPU: 0 PID: 6982 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 928.294086] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 928.295837] Call Trace: [ 928.296408] dump_stack+0x107/0x167 [ 928.297195] should_fail.cold+0x5/0xa [ 928.298007] __alloc_pages_nodemask+0x182/0x600 [ 928.298998] ? add_mm_counter_fast+0x220/0x220 [ 928.299970] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 928.301259] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 928.302374] ? lock_downgrade+0x6d0/0x6d0 [ 928.303255] ? mark_held_locks+0x9e/0xe0 [ 928.304123] alloc_pages_vma+0xbb/0x410 [ 928.304982] handle_mm_fault+0x152f/0x3500 [ 928.305871] ? do_raw_spin_lock+0x121/0x260 [ 928.306776] ? rwlock_bug.part.0+0x90/0x90 [ 928.307668] ? __pmd_alloc+0x630/0x630 [ 928.308511] __get_user_pages+0x6ec/0x1620 [ 928.309428] ? follow_page_mask+0x1900/0x1900 [ 928.310373] ? down_read+0x10f/0x430 [ 928.311155] ? down_write+0x160/0x160 [ 928.311968] get_user_pages_unlocked+0x18a/0x690 [ 928.312977] ? internal_get_user_pages_fast+0xdce/0x2640 [ 928.314119] ? pin_user_pages_locked+0x7b0/0x7b0 [ 928.315127] internal_get_user_pages_fast+0x175f/0x2640 [ 928.316279] ? pin_user_pages_unlocked+0x80/0x80 [ 928.317283] ? trace_hardirqs_on+0x5b/0x180 [ 928.318194] get_user_pages_fast+0x66/0xa0 [ 928.319088] iov_iter_get_pages+0x297/0xf40 [ 928.320000] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 928.321042] ? mempool_resize+0x7d0/0x7d0 [ 928.321924] bio_iov_iter_get_pages+0x22a/0x1200 [ 928.322927] ? bvec_alloc+0x17e/0x2f0 [ 928.323737] ? bio_alloc_bioset+0x2a1/0x600 [ 928.324645] ? bio_add_pc_page+0x100/0x100 [ 928.325546] ? bvec_alloc+0x290/0x2f0 [ 928.326349] ? iov_iter_npages+0x1fd/0xa70 [ 928.327239] ? ext4_iomap_begin+0x1a0/0x700 [ 928.328155] iomap_dio_bio_actor+0x77a/0xef0 [ 928.329114] iomap_dio_actor+0x36f/0x560 [ 928.329980] iomap_apply+0x289/0x810 [ 928.330766] ? iomap_dio_rw+0x90/0x90 [ 928.331568] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 928.332787] ? delete_from_page_cache_batch+0xa30/0xa30 [ 928.333912] ? mark_held_locks+0x9e/0xe0 [ 928.334776] ? filemap_check_errors+0xa5/0x150 [ 928.335747] __iomap_dio_rw+0x6cd/0x1110 [ 928.336598] ? iomap_dio_rw+0x90/0x90 [ 928.337428] ? iomap_dio_bio_actor+0xef0/0xef0 [ 928.338397] ? down_read+0x10f/0x430 [ 928.339176] ? down_write+0x160/0x160 [ 928.339985] iomap_dio_rw+0x31/0x90 [ 928.340760] ext4_file_read_iter+0x2c7/0x4c0 [ 928.341704] new_sync_read+0x424/0x6f0 [ 928.342526] ? ksys_lseek+0x1b0/0x1b0 [ 928.343340] ? fsnotify_perm.part.0+0x22d/0x620 [ 928.344321] ? security_file_permission+0xb1/0xe0 [ 928.345356] vfs_read+0x4da/0x620 [ 928.346098] ksys_read+0x12d/0x260 [ 928.346847] ? vfs_write+0xb10/0xb10 [ 928.347633] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 928.348737] ? syscall_enter_from_user_mode+0x1d/0x50 [ 928.349837] do_syscall_64+0x33/0x40 [ 928.350619] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 928.351695] RIP: 0033:0x7fb97f666b19 [ 928.352474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 928.356345] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 928.357962] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 928.359456] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 928.360964] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.362460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 928.363958] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:48:47 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a2, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:47 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:48:47 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 37) [ 928.426138] loop4: detected capacity change from 0 to 41948160 05:48:47 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:48:47 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a3, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:47 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, &(0x7f0000000640)={{0x1, 0x1, 0x18}, './file0\x00'}) read(r0, &(0x7f0000000000), 0x1b4000) syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1a7, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)) syz_io_uring_submit(r2, 0x0, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x5, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000001280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2, 0x2, {0xa, 0x4e23, 0x7fffffff, @rand_addr=' \x01\x00', 0x400}}}}, 0x0) r3 = syz_io_uring_complete(r2) syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1a7, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)) ioctl$AUTOFS_IOC_CATATONIC(0xffffffffffffffff, 0x9362, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x5, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000001280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2, 0x2, {0xa, 0x4e23, 0x7fffffff, @rand_addr=' \x01\x00', 0x400}}}}, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = signalfd4(r5, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r7, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r6}}, 0x9) syz_io_uring_submit(r4, r7, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x1, 0x6000, @fd=r0, 0x10000, 0x0, 0x0, 0x1, 0x1}, 0x97a2) sendmsg$NL80211_CMD_GET_SURVEY(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="75c04b7abe8600000920007aafa5b3b0c59e9bced9e026f08ec0af62dd6450131f1ef5b828f0b3715f650fe17c747dc4fcd8cd1c030000001ad6b58bade46934d7b7a4f06574e2190ad5fef6803af61bcec1b463549f4524c35ff0a8ba81750d294fe4e1f27c97dd9948ef4a8648eceb97de5b09a7008db7367cc20956ad7ca9e65566b558d3c1eb756a86b68de2e8a8489cf8846c2ae925a2a787da0fde77a54f28fadd", @ANYRES16=0x0, @ANYBLOB="00032bbd7000fcdbdf25320000000c0099000700000078000000"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x4040040) [ 928.507142] FAULT_INJECTION: forcing a failure. [ 928.507142] name failslab, interval 1, probability 0, space 0, times 0 [ 928.508583] CPU: 1 PID: 6996 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 928.509394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 928.510370] Call Trace: [ 928.510694] dump_stack+0x107/0x167 [ 928.511139] should_fail.cold+0x5/0xa [ 928.511598] ? create_object.isra.0+0x3a/0xa30 [ 928.512137] should_failslab+0x5/0x20 [ 928.512588] kmem_cache_alloc+0x5b/0x310 [ 928.513081] create_object.isra.0+0x3a/0xa30 [ 928.513597] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 928.514199] kmem_cache_alloc+0x159/0x310 [ 928.514694] ? mempool_free_pages+0x20/0x20 [ 928.515200] mempool_alloc+0x148/0x360 [ 928.515667] ? mempool_resize+0x7d0/0x7d0 [ 928.515914] FAULT_INJECTION: forcing a failure. [ 928.515914] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 928.516160] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 928.516188] ? lock_acquire+0x197/0x470 [ 928.519674] ? find_held_lock+0x2c/0x110 [ 928.520145] bio_alloc_bioset+0x36e/0x600 [ 928.520620] ? bvec_alloc+0x2f0/0x2f0 [ 928.521064] ? sync_mapping_buffers+0x3e0/0xcf0 [ 928.521593] ? lock_downgrade+0x6d0/0x6d0 [ 928.522079] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 928.522640] write_dirty_buffer+0xcb/0x180 [ 928.523122] sync_mapping_buffers+0x3ed/0xcf0 [ 928.523635] ? __breadahead+0x140/0x140 [ 928.524099] ? __generic_file_fsync+0x8a/0x1f0 [ 928.524624] fat_file_fsync+0x13b/0x200 [ 928.525079] ? fat_trim_fs+0xfc0/0xfc0 [ 928.525524] vfs_fsync_range+0x13d/0x230 [ 928.525990] generic_file_write_iter+0x19d/0x230 [ 928.526524] ? iov_iter_init+0x3c/0x130 [ 928.526978] new_sync_write+0x42c/0x660 [ 928.527431] ? new_sync_read+0x6f0/0x6f0 [ 928.527888] ? ksys_write+0x12d/0x260 [ 928.528325] ? lock_release+0x680/0x680 [ 928.528779] ? avc_policy_seqno+0x9/0x70 [ 928.529249] ? selinux_file_permission+0x92/0x520 [ 928.529806] vfs_write+0x7c0/0xb10 [ 928.530212] ksys_write+0x12d/0x260 [ 928.530627] ? __ia32_sys_read+0xb0/0xb0 [ 928.531097] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 928.531693] ? syscall_enter_from_user_mode+0x1d/0x50 [ 928.532282] do_syscall_64+0x33/0x40 [ 928.532707] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 928.533296] RIP: 0033:0x7f69c26bfb19 [ 928.533722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 928.535818] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 928.536685] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 928.537502] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 928.538316] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.539124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 928.539931] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 [ 928.540771] CPU: 0 PID: 7010 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 928.542230] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 928.543972] Call Trace: [ 928.544535] dump_stack+0x107/0x167 [ 928.545314] should_fail.cold+0x5/0xa [ 928.546127] __alloc_pages_nodemask+0x182/0x600 [ 928.547111] ? add_mm_counter_fast+0x220/0x220 [ 928.548079] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 928.549357] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 928.550470] ? lock_downgrade+0x6d0/0x6d0 [ 928.551345] ? mark_held_locks+0x9e/0xe0 [ 928.552211] alloc_pages_vma+0xbb/0x410 [ 928.553062] handle_mm_fault+0x152f/0x3500 [ 928.553957] ? do_raw_spin_lock+0x121/0x260 [ 928.554865] ? rwlock_bug.part.0+0x90/0x90 [ 928.555763] ? __pmd_alloc+0x630/0x630 [ 928.556617] __get_user_pages+0x6ec/0x1620 [ 928.557536] ? follow_page_mask+0x1900/0x1900 [ 928.558484] ? down_read+0x10f/0x430 [ 928.559269] ? down_write+0x160/0x160 [ 928.560094] get_user_pages_unlocked+0x18a/0x690 [ 928.561103] ? internal_get_user_pages_fast+0xdce/0x2640 [ 928.562250] ? pin_user_pages_locked+0x7b0/0x7b0 [ 928.563259] internal_get_user_pages_fast+0x175f/0x2640 [ 928.564417] ? pin_user_pages_unlocked+0x80/0x80 [ 928.565422] ? trace_hardirqs_on+0x5b/0x180 [ 928.566340] get_user_pages_fast+0x66/0xa0 [ 928.567237] iov_iter_get_pages+0x297/0xf40 [ 928.568152] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 928.569198] ? mempool_resize+0x7d0/0x7d0 [ 928.570085] bio_iov_iter_get_pages+0x22a/0x1200 [ 928.571088] ? bvec_alloc+0x17e/0x2f0 [ 928.571894] ? bio_alloc_bioset+0x2a1/0x600 [ 928.572805] ? bio_add_pc_page+0x100/0x100 [ 928.573704] ? bvec_alloc+0x290/0x2f0 [ 928.574509] ? iov_iter_npages+0x1fd/0xa70 [ 928.575398] ? ext4_iomap_begin+0x1a0/0x700 [ 928.576320] iomap_dio_bio_actor+0x77a/0xef0 [ 928.577270] iomap_dio_actor+0x36f/0x560 [ 928.578132] iomap_apply+0x289/0x810 [ 928.578921] ? iomap_dio_rw+0x90/0x90 [ 928.579727] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 928.580949] ? delete_from_page_cache_batch+0xa30/0xa30 [ 928.582065] ? mark_held_locks+0x9e/0xe0 [ 928.582931] ? filemap_check_errors+0xa5/0x150 [ 928.583900] __iomap_dio_rw+0x6cd/0x1110 [ 928.584753] ? iomap_dio_rw+0x90/0x90 [ 928.585584] ? iomap_dio_bio_actor+0xef0/0xef0 [ 928.586549] ? down_read+0x10f/0x430 [ 928.587335] ? down_write+0x160/0x160 [ 928.588144] iomap_dio_rw+0x31/0x90 [ 928.588927] ext4_file_read_iter+0x2c7/0x4c0 [ 928.589858] new_sync_read+0x424/0x6f0 [ 928.590682] ? ksys_lseek+0x1b0/0x1b0 [ 928.591502] ? fsnotify_perm.part.0+0x22d/0x620 [ 928.592485] ? security_file_permission+0xb1/0xe0 [ 928.593515] vfs_read+0x4da/0x620 [ 928.594252] ksys_read+0x12d/0x260 [ 928.594997] ? vfs_write+0xb10/0xb10 [ 928.595784] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 928.596890] ? syscall_enter_from_user_mode+0x1d/0x50 [ 928.597978] do_syscall_64+0x33/0x40 [ 928.598766] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 928.599841] RIP: 0033:0x7fb97f666b19 [ 928.600622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 928.604477] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 928.606088] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 928.607589] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 928.609109] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.610613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 928.612116] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:48:48 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:48:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 14) 05:48:48 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x21) read(r0, &(0x7f0000000000), 0x1b4000) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="10171a0007002e2f66696c6530100000e06e37e00ec016ad83f5441229ea06e396b4ca0f43de0eaca85d87452105439d8f4352626110e162b52c7665526cd725e9ecb8064ea355a35c568b2026bd12ab07c75c22ea72bf384ce096855e22b00942519e2e2453052c5908c96c58f05aecc248edec43c5cf73eb5d0ec91147d60000022caf3712d4a5983d130629338d3b31a57adf2b7cdb3fe6b60dc0bceefb7b6a2d942f773623"], 0x10) r1 = inotify_init() r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r3}}, 0x9) openat(r3, &(0x7f0000000040)='./file0\x00', 0x0, 0x10) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x5, 0x9a}) sendfile(r0, r1, &(0x7f0000000000)=0x6, 0x2) 05:48:48 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 05:48:48 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = signalfd4(r4, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000002, 0x50, r6, 0x4584c000) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r7, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r5}}, 0x9) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00fvle0\x00\x00\x00\x00\x00']) dup2(r1, r2) read(r0, &(0x7f0000000000), 0x1b4000) [ 928.698986] loop4: detected capacity change from 0 to 41948160 [ 928.712476] FAULT_INJECTION: forcing a failure. [ 928.712476] name failslab, interval 1, probability 0, space 0, times 0 [ 928.713824] CPU: 1 PID: 7017 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 928.714599] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 928.715546] Call Trace: [ 928.715851] dump_stack+0x107/0x167 [ 928.716270] should_fail.cold+0x5/0xa [ 928.716705] ? mempool_alloc+0x148/0x360 [ 928.717176] ? mempool_free_pages+0x20/0x20 [ 928.717666] should_failslab+0x5/0x20 [ 928.718100] kmem_cache_alloc+0x5b/0x310 [ 928.718566] ? mempool_free_pages+0x20/0x20 [ 928.719051] mempool_alloc+0x148/0x360 [ 928.719494] ? mempool_resize+0x7d0/0x7d0 [ 928.719963] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 928.720560] ? lock_acquire+0x197/0x470 [ 928.721014] ? find_held_lock+0x2c/0x110 [ 928.721485] bio_alloc_bioset+0x36e/0x600 [ 928.721957] ? bvec_alloc+0x2f0/0x2f0 [ 928.722392] ? sync_mapping_buffers+0x3e0/0xcf0 [ 928.722920] ? lock_downgrade+0x6d0/0x6d0 [ 928.723394] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 928.723951] write_dirty_buffer+0xcb/0x180 [ 928.724428] sync_mapping_buffers+0x3ed/0xcf0 [ 928.724945] ? __breadahead+0x140/0x140 [ 928.725405] ? __generic_file_fsync+0x8a/0x1f0 [ 928.725927] fat_file_fsync+0x13b/0x200 [ 928.726374] ? fat_trim_fs+0xfc0/0xfc0 [ 928.726819] vfs_fsync_range+0x13d/0x230 [ 928.727285] generic_file_write_iter+0x19d/0x230 [ 928.727818] ? iov_iter_init+0x3c/0x130 [ 928.728276] new_sync_write+0x42c/0x660 [ 928.728728] ? new_sync_read+0x6f0/0x6f0 [ 928.729195] ? ksys_write+0x12d/0x260 [ 928.729627] ? lock_release+0x680/0x680 [ 928.730076] ? avc_policy_seqno+0x9/0x70 [ 928.730535] ? selinux_file_permission+0x92/0x520 [ 928.731092] vfs_write+0x7c0/0xb10 [ 928.731506] ksys_write+0x12d/0x260 [ 928.731927] ? __ia32_sys_read+0xb0/0xb0 [ 928.732400] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 928.733013] ? syscall_enter_from_user_mode+0x1d/0x50 [ 928.733599] do_syscall_64+0x33/0x40 [ 928.734022] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 928.734610] RIP: 0033:0x7f69c26bfb19 [ 928.735037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 928.737143] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 928.738012] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 928.738819] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 928.739633] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 928.740438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 928.741255] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:49:01 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 38) 05:49:01 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x40049409, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 15) 05:49:01 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r1, 0xf507, 0x0) 05:49:01 executing program 2: read(0xffffffffffffffff, &(0x7f0000000000)=""/5, 0x5) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd4(r0, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r1}}, 0x9) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/82) 05:49:01 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x0) 05:49:01 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) syz_io_uring_setup(0x220e, &(0x7f0000000000)={0x0, 0x8400, 0x4, 0x3, 0x2d0, 0x0, r0}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000000c0), &(0x7f0000000180)=0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000140)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x4004, @fd_index=0xa, 0xeac, 0x0, 0x0, 0x1d, 0x1, {0x2}}, 0x1bc) read(r0, &(0x7f0000000000), 0x1b4000) rename(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 05:49:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = signalfd4(r0, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r1}}, 0x9) r3 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x541107, 0x0) read(r3, &(0x7f0000000000), 0x1b4000) [ 942.383098] FAULT_INJECTION: forcing a failure. [ 942.383098] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 942.386603] CPU: 0 PID: 7037 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 942.388583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 942.389556] loop4: detected capacity change from 0 to 41948160 [ 942.390701] Call Trace: [ 942.390731] dump_stack+0x107/0x167 [ 942.390764] should_fail.cold+0x5/0xa [ 942.394534] __alloc_pages_nodemask+0x182/0x600 [ 942.395719] ? add_mm_counter_fast+0x220/0x220 [ 942.396899] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 942.398437] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 942.399772] ? lock_downgrade+0x6d0/0x6d0 [ 942.400824] ? mark_held_locks+0x9e/0xe0 [ 942.401876] alloc_pages_vma+0xbb/0x410 [ 942.402896] handle_mm_fault+0x152f/0x3500 [ 942.403973] ? do_raw_spin_lock+0x121/0x260 [ 942.405078] ? rwlock_bug.part.0+0x90/0x90 [ 942.406153] ? __pmd_alloc+0x630/0x630 [ 942.407175] __get_user_pages+0x6ec/0x1620 [ 942.408265] ? follow_page_mask+0x1900/0x1900 [ 942.409417] ? down_read+0x10f/0x430 [ 942.410373] ? down_write+0x160/0x160 [ 942.411362] get_user_pages_unlocked+0x18a/0x690 [ 942.412574] ? internal_get_user_pages_fast+0xdce/0x2640 [ 942.413965] ? pin_user_pages_locked+0x7b0/0x7b0 [ 942.415190] internal_get_user_pages_fast+0x175f/0x2640 [ 942.416590] ? pin_user_pages_unlocked+0x80/0x80 [ 942.417805] ? trace_hardirqs_on+0x5b/0x180 [ 942.418911] get_user_pages_fast+0x66/0xa0 [ 942.419991] iov_iter_get_pages+0x297/0xf40 [ 942.421107] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 942.422268] ? mempool_resize+0x7d0/0x7d0 [ 942.423162] bio_iov_iter_get_pages+0x22a/0x1200 [ 942.424175] ? bvec_alloc+0x17e/0x2f0 [ 942.424989] ? bio_alloc_bioset+0x2a1/0x600 [ 942.425918] ? bio_add_pc_page+0x100/0x100 [ 942.426820] ? bvec_alloc+0x290/0x2f0 [ 942.427500] FAULT_INJECTION: forcing a failure. [ 942.427500] name failslab, interval 1, probability 0, space 0, times 0 [ 942.427632] ? iov_iter_npages+0x1fd/0xa70 [ 942.427661] ? ext4_iomap_begin+0x1a0/0x700 [ 942.431802] iomap_dio_bio_actor+0x77a/0xef0 [ 942.432754] iomap_dio_actor+0x36f/0x560 [ 942.433636] iomap_apply+0x289/0x810 [ 942.434432] ? iomap_dio_rw+0x90/0x90 [ 942.435247] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 942.436476] ? delete_from_page_cache_batch+0xa30/0xa30 [ 942.437618] ? mark_held_locks+0x9e/0xe0 [ 942.438496] ? filemap_check_errors+0xa5/0x150 [ 942.439486] __iomap_dio_rw+0x6cd/0x1110 [ 942.440351] ? iomap_dio_rw+0x90/0x90 [ 942.441195] ? iomap_dio_bio_actor+0xef0/0xef0 [ 942.442176] ? down_read+0x10f/0x430 [ 942.442957] ? down_write+0x160/0x160 [ 942.443779] iomap_dio_rw+0x31/0x90 [ 942.444547] ext4_file_read_iter+0x2c7/0x4c0 [ 942.445503] new_sync_read+0x424/0x6f0 [ 942.446323] ? ksys_lseek+0x1b0/0x1b0 [ 942.447152] ? fsnotify_perm.part.0+0x22d/0x620 [ 942.448136] ? security_file_permission+0xb1/0xe0 [ 942.449183] vfs_read+0x4da/0x620 [ 942.449925] ksys_read+0x12d/0x260 [ 942.450686] ? vfs_write+0xb10/0xb10 [ 942.451478] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 942.452597] ? syscall_enter_from_user_mode+0x1d/0x50 [ 942.453695] do_syscall_64+0x33/0x40 [ 942.454490] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 942.455568] RIP: 0033:0x7fb97f666b19 [ 942.456360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 942.460241] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 942.461879] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 942.463396] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 942.464921] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 942.466452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 942.467976] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 942.469548] CPU: 1 PID: 7042 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 942.471064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 942.472869] Call Trace: [ 942.473459] dump_stack+0x107/0x167 [ 942.474252] should_fail.cold+0x5/0xa [ 942.475082] ? mempool_alloc+0x148/0x360 [ 942.475957] ? mempool_free_pages+0x20/0x20 [ 942.476888] should_failslab+0x5/0x20 [ 942.477716] kmem_cache_alloc+0x5b/0x310 [ 942.478601] ? mempool_free_pages+0x20/0x20 [ 942.479532] mempool_alloc+0x148/0x360 [ 942.480378] ? mempool_resize+0x7d0/0x7d0 [ 942.481285] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 942.482413] ? _raw_spin_unlock_irq+0x1f/0x30 [ 942.483389] ? trace_hardirqs_on+0x5b/0x180 [ 942.484314] ? finish_task_switch+0x1a4/0x5d0 [ 942.485284] ? __switch_to+0x572/0xf70 [ 942.486102] ? __switch_to_asm+0x3a/0x60 [ 942.486988] bio_alloc_bioset+0x36e/0x600 [ 942.487866] ? bvec_alloc+0x2f0/0x2f0 [ 942.488697] ? io_schedule_timeout+0x140/0x140 [ 942.489666] ? lock_downgrade+0x6d0/0x6d0 [ 942.490567] submit_bh_wbc.constprop.0+0x1b8/0x780 [ 942.491606] write_dirty_buffer+0xcb/0x180 [ 942.492518] sync_mapping_buffers+0x3ed/0xcf0 [ 942.493504] ? __breadahead+0x140/0x140 [ 942.494383] ? __generic_file_fsync+0x8a/0x1f0 [ 942.495378] fat_file_fsync+0x13b/0x200 [ 942.496237] ? fat_trim_fs+0xfc0/0xfc0 [ 942.497089] vfs_fsync_range+0x13d/0x230 [ 942.497972] generic_file_write_iter+0x19d/0x230 [ 942.498991] ? iov_iter_init+0x3c/0x130 [ 942.499857] new_sync_write+0x42c/0x660 [ 942.500722] ? new_sync_read+0x6f0/0x6f0 [ 942.501607] ? ksys_write+0x12d/0x260 [ 942.502443] ? lock_release+0x680/0x680 [ 942.503318] ? avc_policy_seqno+0x9/0x70 [ 942.504194] ? selinux_file_permission+0x92/0x520 [ 942.505268] vfs_write+0x7c0/0xb10 [ 942.506040] ksys_write+0x12d/0x260 [ 942.506830] ? __ia32_sys_read+0xb0/0xb0 [ 942.507722] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 942.508869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 942.509999] do_syscall_64+0x33/0x40 [ 942.510823] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 942.511945] RIP: 0033:0x7f69c26bfb19 [ 942.512754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 942.516763] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 942.518422] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 942.519966] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 942.521513] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 942.523057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 942.524594] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:49:02 executing program 2: ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000040)=0x20) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/194, 0xc2, 0x10001, &(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:02 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x40086602, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:02 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x0) 05:49:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 16) [ 942.739990] FAULT_INJECTION: forcing a failure. [ 942.739990] name failslab, interval 1, probability 0, space 0, times 0 [ 942.743306] CPU: 0 PID: 7067 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 942.744795] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 942.746608] Call Trace: [ 942.747185] dump_stack+0x107/0x167 [ 942.747980] should_fail.cold+0x5/0xa [ 942.748810] ? ext4_find_extent+0xa77/0xd70 [ 942.749750] should_failslab+0x5/0x20 [ 942.750575] __kmalloc+0x72/0x390 [ 942.751326] ? mark_lock+0xf5/0x2df0 [ 942.752141] ext4_find_extent+0xa77/0xd70 [ 942.753063] ext4_ext_map_blocks+0x1c8/0x5880 [ 942.754052] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 942.755203] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 942.756343] ? __lock_acquire+0x1657/0x5b00 [ 942.757295] ? ext4_ext_release+0x10/0x10 [ 942.758203] ? ext4_map_blocks+0x5cd/0x1910 [ 942.759152] ? lock_release+0x680/0x680 [ 942.760017] ? ext4_es_lookup_extent+0x485/0xa80 [ 942.761057] ? lock_downgrade+0x6d0/0x6d0 [ 942.761981] ? down_write+0xe0/0x160 [ 942.762789] ? down_write_killable+0x180/0x180 [ 942.763793] ext4_map_blocks+0x63f/0x1910 [ 942.764706] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 942.765682] ? trace_hardirqs_on+0x5b/0x180 [ 942.766623] ? kmem_cache_alloc+0x2a6/0x310 [ 942.767569] ext4_writepages+0x19bf/0x3350 [ 942.768492] ? lock_chain_count+0x20/0x20 [ 942.769403] ? ext4_da_write_end+0x21e/0x9c0 [ 942.770353] ? generic_perform_write+0x2bf/0x4f0 [ 942.771379] ? ksys_write+0x12d/0x260 [ 942.772232] ? __ext4_mark_inode_dirty+0x770/0x770 [ 942.773329] ? kmem_cache_free+0xa7/0x2d0 [ 942.774239] ? find_held_lock+0x2c/0x110 [ 942.775133] ? finish_task_switch+0x126/0x5d0 [ 942.776118] ? mark_held_locks+0x9e/0xe0 [ 942.777004] ? __ext4_mark_inode_dirty+0x770/0x770 [ 942.778068] do_writepages+0xee/0x2a0 [ 942.778897] ? page_writeback_cpu_online+0x20/0x20 [ 942.779952] ? finish_task_switch+0xef/0x5d0 [ 942.780899] ? __switch_to+0x572/0xf70 [ 942.781743] ? __switch_to_asm+0x3a/0x60 [ 942.782623] ? __schedule+0x82c/0x1ea0 [ 942.783471] ? __wb_update_bandwidth.constprop.0+0xe00/0xe00 [ 942.784716] __filemap_fdatawrite_range+0x24b/0x2f0 [ 942.785811] ? delete_from_page_cache_batch+0xa30/0xa30 [ 942.786974] ? generic_perform_write+0x37d/0x4f0 [ 942.788006] file_write_and_wait_range+0xb6/0x130 [ 942.789063] ext4_sync_file+0x225/0xde0 [ 942.789929] ? ext4_getfsmap+0x990/0x990 [ 942.790811] vfs_fsync_range+0x13d/0x230 [ 942.791698] ext4_buffered_write_iter+0x34b/0x4a0 [ 942.792741] ? __lock_acquire+0xbb1/0x5b00 [ 942.793665] ext4_file_write_iter+0x3ab/0x1530 [ 942.794657] ? __lock_acquire+0x1657/0x5b00 [ 942.795604] ? ext4_file_read_iter+0x4c0/0x4c0 [ 942.796601] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 942.797758] new_sync_write+0x42c/0x660 [ 942.798622] ? new_sync_read+0x6f0/0x6f0 [ 942.799496] ? ksys_write+0x12d/0x260 [ 942.800324] ? lock_release+0x680/0x680 [ 942.801191] ? avc_policy_seqno+0x9/0x70 [ 942.802069] ? selinux_file_permission+0x92/0x520 [ 942.803129] vfs_write+0x7c0/0xb10 [ 942.803902] ksys_write+0x12d/0x260 [ 942.804688] ? __ia32_sys_read+0xb0/0xb0 [ 942.805579] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 942.806709] ? syscall_enter_from_user_mode+0x1d/0x50 [ 942.807827] do_syscall_64+0x33/0x40 [ 942.808631] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 942.809745] RIP: 0033:0x7f69c26bfb19 [ 942.810545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 942.814523] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 942.816184] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 942.817751] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 942.819305] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 942.820861] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 942.822419] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:49:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 39) 05:49:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f00000000c0)=""/102392, 0x18ff8) r1 = fcntl$dupfd(r0, 0x406, r0) mknodat(r1, &(0x7f0000000000)='./file0\x00', 0x8000, 0x400000) 05:49:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 17) 05:49:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000100)=""/102393, 0x18ff9) openat(0xffffffffffffffff, &(0x7f0000019a40)='./file0\x00', 0x208000, 0x10) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) pwritev2(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="afb570e2241efa68b52cfdb174bf6a", 0xf}], 0x1, 0xffffffff, 0x2, 0x7) mount(&(0x7f0000019100)=@nullb, &(0x7f0000019140)='./file0\x00', &(0x7f0000019180)='dax\x00', 0x2820821, &(0x7f00000191c0)='\xaa)\x00') 05:49:14 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x0) 05:49:14 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}, 0x2580}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = signalfd4(r0, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r1}}, 0x9) ioctl$RTC_PIE_ON(r1, 0x7005) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0x7, 0x10001}}, './file0\x00'}) ioctl$PTP_PIN_SETFUNC2(r4, 0x40603d10, &(0x7f00000000c0)={'\x00', 0x9, 0x9a246897236ff7f2, 0x200}) read(r3, &(0x7f0000000000), 0x1b4000) 05:49:14 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x40087602, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:14 executing program 5: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, r0, 0x1, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000001}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4ee}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9e59}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x5}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x20004801) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x64, r0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8000}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6}]}]}, 0x64}}, 0x40040) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) r2 = openat$incfs(r1, &(0x7f0000000200)='.pending_reads\x00', 0x40000, 0x1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000000380)=0xe8) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x9301c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}, 0x8221}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = signalfd4(r5, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r7, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r6}}, 0x9) sendmsg$nl_generic(r2, &(0x7f0000000600)={&(0x7f0000000240), 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x1c4, 0x1c, 0x4, 0x70bd28, 0x25dfdbfd, {0x16}, [@generic="d24e05340582052dbb", @nested={0x18a, 0x19, 0x0, 0x1, [@typed={0x8, 0x43, 0x0, 0x0, @uid=r3}, @generic="e44b66cd577609e69c42cac1ab696708192652a1c982dea3a7ccaabfea9e65b98bf7aee0feb2163974e5091892c1ebdb66f23d551e3369cf", @typed={0x4, 0x85}, @generic="084068e2a93f4e29136fc07c260b01ea22415d1cfdaad82dde40fa2eff1faf3b0db93c5b273037e1c48c2c4aa55ec12422a394bd32d03471efca63d3b2602d3dcc3ce5ba4eeb46e5300c763bd3751b1943cc39c3a79af2db83d5b9afe698c51cc8255179773ef86c", @typed={0x8, 0x80, 0x0, 0x0, @u32=0xfff}, @generic="18232d18656726618e3163b5f6c52378a16b306019dd37f5869759840e83862c8a357c3873307deccc943a6ee4f16af20157181dba57c15cdaf57b9ee681a67c1b62197378cc4754492c3a63f11e12c52502a198d561252fabd2636892a064666e9108e3d5d9b99a923ecb4ceb2de0f3fbb08e5c8150bfe44095320c", @generic="0256a75a7c2391002987dc8372f50226f59722f02d4e6259f85950d2adff3a3116ca738e05db2aa0e6ad8019e29cae0b3e411e5919d8879e4238f3baf3e6f6af33419a7fd0252e0b23c2", @typed={0xc, 0x80, 0x0, 0x0, @u64=0x5}]}, @typed={0x8, 0x27, 0x0, 0x0, @ipv4=@empty}, @typed={0x8, 0x1b, 0x0, 0x0, @uid=r4}, @typed={0x8, 0x79, 0x0, 0x0, @fd=r6}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x48040}, 0x40040) [ 955.399244] FAULT_INJECTION: forcing a failure. [ 955.399244] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 955.401787] CPU: 0 PID: 7084 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 955.403246] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 955.405237] Call Trace: [ 955.405802] dump_stack+0x107/0x167 [ 955.406580] should_fail.cold+0x5/0xa [ 955.407404] __alloc_pages_nodemask+0x182/0x600 [ 955.408407] ? add_mm_counter_fast+0x220/0x220 [ 955.409394] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 955.410679] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 955.411801] ? lock_downgrade+0x6d0/0x6d0 [ 955.412685] ? mark_held_locks+0x9e/0xe0 [ 955.413583] alloc_pages_vma+0xbb/0x410 [ 955.414439] handle_mm_fault+0x152f/0x3500 [ 955.415341] ? do_raw_spin_lock+0x121/0x260 [ 955.416255] ? rwlock_bug.part.0+0x90/0x90 [ 955.417172] ? __pmd_alloc+0x630/0x630 [ 955.418039] __get_user_pages+0x6ec/0x1620 [ 955.418969] ? follow_page_mask+0x1900/0x1900 [ 955.419921] ? down_read+0x10f/0x430 [ 955.420712] ? down_write+0x160/0x160 [ 955.421549] get_user_pages_unlocked+0x18a/0x690 [ 955.422558] ? internal_get_user_pages_fast+0xdce/0x2640 [ 955.423710] ? pin_user_pages_locked+0x7b0/0x7b0 [ 955.424734] internal_get_user_pages_fast+0x175f/0x2640 [ 955.425908] ? pin_user_pages_unlocked+0x80/0x80 [ 955.426922] ? trace_hardirqs_on+0x5b/0x180 [ 955.427850] get_user_pages_fast+0x66/0xa0 [ 955.428752] iov_iter_get_pages+0x297/0xf40 [ 955.429681] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 955.430722] ? mempool_resize+0x7d0/0x7d0 [ 955.431613] bio_iov_iter_get_pages+0x22a/0x1200 [ 955.432625] ? bvec_alloc+0x17e/0x2f0 [ 955.433452] ? bio_alloc_bioset+0x2a1/0x600 [ 955.434367] ? bio_add_pc_page+0x100/0x100 [ 955.435264] ? bvec_alloc+0x290/0x2f0 [ 955.436076] ? iov_iter_npages+0x1fd/0xa70 [ 955.436979] ? ext4_iomap_begin+0x1a0/0x700 [ 955.437913] iomap_dio_bio_actor+0x77a/0xef0 [ 955.438864] iomap_dio_actor+0x36f/0x560 [ 955.439713] iomap_apply+0x289/0x810 [ 955.440515] ? iomap_dio_rw+0x90/0x90 [ 955.441310] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 955.442537] ? delete_from_page_cache_batch+0xa30/0xa30 [ 955.443639] ? mark_held_locks+0x9e/0xe0 [ 955.444513] ? filemap_check_errors+0xa5/0x150 [ 955.445475] __iomap_dio_rw+0x6cd/0x1110 [ 955.446338] ? iomap_dio_rw+0x90/0x90 [ 955.447159] ? iomap_dio_bio_actor+0xef0/0xef0 [ 955.448138] ? down_read+0x10f/0x430 [ 955.448914] ? down_write+0x160/0x160 [ 955.449744] iomap_dio_rw+0x31/0x90 [ 955.450525] ext4_file_read_iter+0x2c7/0x4c0 [ 955.451466] new_sync_read+0x424/0x6f0 [ 955.452294] ? ksys_lseek+0x1b0/0x1b0 [ 955.453118] ? fsnotify_perm.part.0+0x22d/0x620 [ 955.454124] ? security_file_permission+0xb1/0xe0 [ 955.455159] vfs_read+0x4da/0x620 [ 955.455903] ksys_read+0x12d/0x260 [ 955.456659] ? vfs_write+0xb10/0xb10 [ 955.457469] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 955.458585] ? syscall_enter_from_user_mode+0x1d/0x50 [ 955.459685] do_syscall_64+0x33/0x40 [ 955.460475] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 955.461633] RIP: 0033:0x7fb97f666b19 [ 955.462547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 955.466458] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 955.468078] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 955.469605] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 955.471115] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 955.472628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 955.474163] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 955.486775] loop4: detected capacity change from 0 to 41948160 05:49:14 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) write$P9_RREADLINK(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1000000017020007002e2f66696c65309159780431649c86af80c7945a339fdb6baacfba10d08804fc8137543a827ba8bde98c89f23e336d50e2b860e5817b7615cac1777578d0b14e23196180a8c49c892cfe55694a90b353b61945163c52379787a1e30033425a8d1e2bf3495b13d85e5196756b0c0529e15bb273941219f36d6de794482568679da21d9bc28bc85630de095568b7f846a5697c714aa4ecebdcccc7a3f3b01409bda8"], 0x10) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:14 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x4020940d, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:14 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) syz_io_uring_setup(0x60e, &(0x7f0000000000)={0x0, 0x76b2, 0x2, 0x2, 0x66, 0x0, r0}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff0000/0xc000)=nil, &(0x7f00000000c0), &(0x7f0000000100)=0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f0000000180)=@IORING_OP_OPENAT={0x12, 0x4, 0x0, r0, 0x0, &(0x7f0000000140)='./file0\x00', 0x80, 0x400000, 0x12345, {0x0, r2}}, 0x200) [ 955.528944] FAULT_INJECTION: forcing a failure. [ 955.528944] name failslab, interval 1, probability 0, space 0, times 0 [ 955.530558] CPU: 1 PID: 7088 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 955.531488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 955.532616] Call Trace: [ 955.532979] dump_stack+0x107/0x167 [ 955.533482] should_fail.cold+0x5/0xa [ 955.534001] ? _raw_spin_unlock_irqrestore+0x38/0x40 [ 955.534690] ? create_object.isra.0+0x3a/0xa30 [ 955.535304] should_failslab+0x5/0x20 [ 955.535828] kmem_cache_alloc+0x5b/0x310 [ 955.536378] create_object.isra.0+0x3a/0xa30 [ 955.536968] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 955.537669] kmem_cache_alloc+0x159/0x310 [ 955.538241] ? mempool_free_pages+0x20/0x20 [ 955.538821] mempool_alloc+0x148/0x360 [ 955.539350] ? mempool_resize+0x7d0/0x7d0 [ 955.539912] ? do_raw_spin_unlock+0x4f/0x220 [ 955.540505] ? _raw_spin_unlock+0x1a/0x30 [ 955.541062] ? sync_mapping_buffers+0x933/0xcf0 [ 955.541702] bio_alloc_bioset+0x36e/0x600 [ 955.542263] ? bvec_alloc+0x2f0/0x2f0 [ 955.542781] blkdev_issue_flush+0x20/0x1a0 [ 955.543350] fat_file_fsync+0x19f/0x200 [ 955.543885] ? fat_trim_fs+0xfc0/0xfc0 [ 955.544422] vfs_fsync_range+0x13d/0x230 [ 955.544992] generic_file_write_iter+0x19d/0x230 [ 955.545629] ? iov_iter_init+0x3c/0x130 [ 955.546164] new_sync_write+0x42c/0x660 [ 955.546702] ? new_sync_read+0x6f0/0x6f0 [ 955.547246] ? ksys_write+0x12d/0x260 [ 955.547764] ? lock_release+0x680/0x680 [ 955.548299] ? avc_policy_seqno+0x9/0x70 [ 955.548847] ? selinux_file_permission+0x92/0x520 [ 955.549513] vfs_write+0x7c0/0xb10 [ 955.549995] ksys_write+0x12d/0x260 [ 955.550491] ? __ia32_sys_read+0xb0/0xb0 [ 955.551042] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 955.551750] ? syscall_enter_from_user_mode+0x1d/0x50 [ 955.552458] do_syscall_64+0x33/0x40 [ 955.552960] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 955.553652] RIP: 0033:0x7f69c26bfb19 [ 955.554148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 955.556626] RSP: 002b:00007f69bfc35188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 955.557650] RAX: ffffffffffffffda RBX: 00007f69c27d2f60 RCX: 00007f69c26bfb19 [ 955.558610] RDX: 0000000000000016 RSI: 0000000020000200 RDI: 0000000000000003 [ 955.559561] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 955.560524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 955.561507] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:49:15 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 05:49:15 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x80086601, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:15 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 40) 05:49:15 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x40000) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:15 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2642, 0x20) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1', "2e561556df86edbec542d34617cb10ec2998740d53cc9d9c66268cca5c062c6ddcb59e94263229b31330f58162035027cc62d070a56e137451c42a6e57923c9743aac1487e684ce29a365f8324ef2fe638"}, 0x55) r1 = syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0xd95, 0x3, &(0x7f0000001300)=[{&(0x7f0000000140)="d70b511448cc84136c386fffb8ddf0719631d221e56b2af542d5119a1753b64f417cff0033012860211215cc2d3b3d1f81a6b6f9d1af6082eff4495aa85af58c3c70469ef28f8549e0c64bbe65cd5e7e0af469a817940b587d28481264bb4ee7a6d7ecc15c58f201a97ab5a1f559cde14170133fab863d992d02005d844f8effcbaf7f7d8dc3c5f982d6190858d1464346a574354c6975fec570e2eaf56ccbd81d1712810c4cc051575a58db7d1e3bf68976f8b7b3252e05ff138ae4d4b0bdd9b835e05b37c3b4f6cf6007cc2de0b8c1554f1d046947aefbcb5efcea24b9a513fd1241e6ec847532a50e9ccef6cb8434", 0xf0, 0xca6}, {&(0x7f0000000240)="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", 0x1000, 0x400}, {&(0x7f0000001240)="d8868f4b16a39fad1f4d4cedacde5508d8804dcecaad858df29968c4e0a30d3c67c53a13dd1f7db73997c7576cf18a8f443e6fc6a16e2a3222de8afa0e3cdb06cf7c45df46c26f7fa554e0cbe94bdb314e5936c191c0d75655aada9789b611e0b1894fe55572a82411e7cb823ae777e518232b918b960b97a5642bde96bf6d4abb6d6e823344ca", 0x87, 0x9}], 0x8, &(0x7f0000001380)={[{'syz1'}], [{@fsmagic}, {@fowner_eq}, {@appraise_type}, {@uid_lt={'uid<', 0xee01}}, {@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '%$#^}'}}, {@measure}, {@subj_role={'subj_role', 0x3d, '}$][\x1c)(#\x03'}}, {@euid_lt}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000001440)) read(r0, &(0x7f0000000000), 0x1b4000) [ 955.680369] FAULT_INJECTION: forcing a failure. [ 955.680369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 955.681914] CPU: 1 PID: 7115 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 955.682775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 955.683804] Call Trace: [ 955.684142] dump_stack+0x107/0x167 [ 955.684607] should_fail.cold+0x5/0xa [ 955.685094] __alloc_pages_nodemask+0x182/0x600 [ 955.685683] ? add_mm_counter_fast+0x220/0x220 [ 955.686256] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 955.687020] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 955.687686] ? lock_downgrade+0x6d0/0x6d0 [ 955.688207] ? mark_held_locks+0x9e/0xe0 [ 955.688726] alloc_pages_vma+0xbb/0x410 [ 955.689233] handle_mm_fault+0x152f/0x3500 [ 955.689766] ? do_raw_spin_lock+0x121/0x260 [ 955.690317] ? rwlock_bug.part.0+0x90/0x90 [ 955.690854] ? __pmd_alloc+0x630/0x630 [ 955.691363] __get_user_pages+0x6ec/0x1620 [ 955.691908] ? follow_page_mask+0x1900/0x1900 [ 955.692484] ? down_read+0x10f/0x430 [ 955.692946] ? down_write+0x160/0x160 [ 955.693443] get_user_pages_unlocked+0x18a/0x690 [ 955.694043] ? internal_get_user_pages_fast+0xdce/0x2640 [ 955.694720] ? pin_user_pages_locked+0x7b0/0x7b0 [ 955.695321] internal_get_user_pages_fast+0x175f/0x2640 [ 955.696016] ? pin_user_pages_unlocked+0x80/0x80 [ 955.696626] ? trace_hardirqs_on+0x5b/0x180 [ 955.697172] get_user_pages_fast+0x66/0xa0 [ 955.697714] iov_iter_get_pages+0x297/0xf40 [ 955.698251] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 955.698866] ? mempool_resize+0x7d0/0x7d0 [ 955.699385] bio_iov_iter_get_pages+0x22a/0x1200 [ 955.699977] ? bvec_alloc+0x17e/0x2f0 [ 955.700457] ? bio_alloc_bioset+0x2a1/0x600 [ 955.700992] ? bio_add_pc_page+0x100/0x100 [ 955.701528] ? bvec_alloc+0x290/0x2f0 [ 955.702003] ? iov_iter_npages+0x1fd/0xa70 [ 955.702528] ? ext4_iomap_begin+0x1a0/0x700 [ 955.703067] iomap_dio_bio_actor+0x77a/0xef0 [ 955.703621] iomap_dio_actor+0x36f/0x560 [ 955.704128] iomap_apply+0x289/0x810 [ 955.704593] ? iomap_dio_rw+0x90/0x90 [ 955.705071] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 955.705795] ? delete_from_page_cache_batch+0xa30/0xa30 [ 955.706469] ? mark_held_locks+0x9e/0xe0 [ 955.706979] ? filemap_check_errors+0xa5/0x150 [ 955.707563] __iomap_dio_rw+0x6cd/0x1110 [ 955.708074] ? iomap_dio_rw+0x90/0x90 [ 955.708560] ? iomap_dio_bio_actor+0xef0/0xef0 [ 955.709143] ? down_read+0x10f/0x430 [ 955.709615] ? down_write+0x160/0x160 [ 955.710091] iomap_dio_rw+0x31/0x90 [ 955.710544] ext4_file_read_iter+0x2c7/0x4c0 [ 955.711091] new_sync_read+0x424/0x6f0 [ 955.711576] ? ksys_lseek+0x1b0/0x1b0 [ 955.712069] ? fsnotify_perm.part.0+0x22d/0x620 [ 955.712650] ? security_file_permission+0xb1/0xe0 [ 955.713270] vfs_read+0x4da/0x620 [ 955.713704] ksys_read+0x12d/0x260 [ 955.714147] ? vfs_write+0xb10/0xb10 [ 955.714612] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 955.715264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 955.715896] do_syscall_64+0x33/0x40 [ 955.716367] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 955.716996] RIP: 0033:0x7fb97f666b19 [ 955.717464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 955.719735] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 955.720678] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 955.721569] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 955.722450] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 955.723337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 955.724217] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:49:28 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 41) 05:49:28 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 05:49:28 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x107b80, 0x101) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) (fail_nth: 18) 05:49:28 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x80087601, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f00000000c0)="c77e934591e7ad02e99d14668aa4f55acf5625cfcf5b1596fa4816a2a19ecc79763278d319df4f08a0162d1eebc14114fdc177f35579369314c84b590aa0c3c28eaea71b1d71cdeb1adb895e3faa8d6b26805b09a9af1274d34234263bf44b4d6094877f3cc51d8a085dbc2c307f05e9ddaefab919c2bbcda4451d3f1a545bd406276ce5bcab5d29a2c63aa27a5c89aa9242aa60fd506dc41874b3f3fa6a8545e307e88b9305", 0xa6}, {&(0x7f0000000180)="92cedd0304ad9a8e9c264733400f0e909f3b3630b221740816e47c4da8092edbb4f78fb59ba7f2c88bdc8cc8002371b7f88dc7416eb1c6e7aa55ff96c80a13c70b28c14778b68afcdd40e5dbb3644ee6262a8fc680352538496a5a5852e7a541125ef6e141d7cbe244493c3ca1e5ca078c550698ae19dcd79610fabc3a4591200a70d7bc97c7bb3aa096181ae905dabcb114e63f199a839ea732abf2316c4eb8d747eef838bcf233db92a35d78ed3e1825c95b5ca2d909f38f43b53a8d80c6498e519930f255017634af189100c0ff51808d40f5e0da3e7d865375ff6f4817d0f84036217e4182a421ef16b84cdb6c9ee6", 0xf1}, {}, {&(0x7f0000000280)="a75f9dfbd251802928477ed492d4b17c0913a4641cec7e4699562e558c84cc41f4c13b02b3de0fca1e61283f32b2ea76ae8a928d3a363493201ae765df985308d74a0752a293c19ae72fc83f15648713478f6ff189c3c75f7c119bdb14fd92fba03830787d6354474e1a68851ce5ab296f945d43b9aae95c114e1887d83cf34a60f45e3da9aa8979132cf5bca33acbb59e625f672b9b439bf9d702b77d25143805de8c81f5e7b1a9ce6dc51ea3e7abe8b1ca415e3bdb8e1697bd2360e598de84", 0xc0}, {&(0x7f0000000040)="248a0b7ad7dc2d8b530052fda960185f12104f247a0f5f31f238fc6ccb33ef07", 0x20}, {&(0x7f0000000340)="0961167f9f790137f5d800f57aa8ef36035ce01c514ad7e541d0304c3d0d888537f54827452cc28d647340036947aae4c5546b5c6db9c9de2212119093e129397786a455825ed5916daaefee7a55c56eabb4103ba042948d87f09d1b6f4f399760d75a5bbc61c16943e64b82ab04a31057d90f9a23c3a99aa96b1b301b02f7ca2ab8f14bee9fe0c2972098c78063b88d71e5e6895099383e59b3405310aaecc3d8c51008ddcd23802ebcd63c81273dcc1c4071a0f3362a5501b35ff462f53035ae0aa62298493033b0101646c46835593697cff8fc8c9ed90de3311c2599b12281", 0xe1}, {&(0x7f0000000440)="b404a2bc63c0c9ba035dc66fd58163313323021a2ed43f70131b4c56e044858037ee8affb7a66bc90822b1fdbcc6122b65de929cba938033a06dda5c84bc34280a4a8393d775abc3ef9b8576c4501a1283a2cf9c97580283b8a4d42aab0fe3bcf69eac1edf9847c0a925e2ea39c9073195783fafd0eb3043647ac50e867cac5072c2c1d6102b128c31289c1404febe4773bd5b0e29eb46e87d7d5523397f218d6fb6975b17b37fbf9437ef7511c30f20a17a23ac048ce2d3ca3341c85890470ec9824b22b4083ed2e14be12056f9dff86ebd6577880607dd8f23bafe6703703ae0099bb2694843cee6ebb9f7952b1c41fdad47c22f51", 0xf6}, {&(0x7f0000000540)="42cb8aa084b1387e19714a027c788f60de439a7f921e417e8c419506c3b427f7ac074fe9e9ad58edd75ecdcfcd379ed83eb690f1da1c8837b4139e38bd84f84afd0a62a68a33d84908c63e846c5ec191dc4869731c795888f0e26117483bcbe77aa6004da07da66684f5cc45f7706196c9f3f9a5bb6e14af2e9a18ea13884e89a106eb4c4f48a7aa97af3588d0e0aaec54b0c86b6798fe9a49a703a641774f9abaaed30a4d260473364bc0826aeeaf3028621b78a5dc8f463895b96d2843", 0xbe}, {&(0x7f0000000600)="7066fcb518927f760c9157f47a5d298fa2ed7c68cce7515e10d2135123ae211ae341f8b1549c593026a85dd389b2e1323312d8769e94fd89a3451d84795ed0deb6e3b087770ae1de70dfe2c818c9aa76cf3d6f870e02d1b657cbfe42d088394ca21b5f909bfc0ea10d7052dc00354f3579238f5a89a18e182c5f812fc299940873659a97fdb5d268e8c3af4e034860805640fa76833065e8e2d321b688835a43ffca399d122d5d2bac4622e1033f28aeea7c81b1d1b1ca689e23a18568", 0xbd}], 0x9, 0x1, 0x6) 05:49:28 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x84c, 0x8, &(0x7f0000000680)=[{&(0x7f00000000c0)="04ebe7d2b71d978ec6166137e4a5d8990958f5c232f98748e68f14fd158f54a611287f8fdb0731b304e9e0f9825db53cf8b3e97da0f2a99fe351aaaed4b43ed2fee8dcf5d1c845e95a802718dbae499ffe5453672d953a889460406021dbba497f62bdfe593d989348791255af21c38c16314a3caf66de6b", 0x78, 0x6}, {&(0x7f0000000140)="c648a67a55914bad74d38ef5653beaee068de2ea1178f5aa5d25c98c75cc6169f75ce8ffa0b423608fc1977beeee704e9ebcbd20fd20e8d62e583120c1518e9770bbaa80b5920e3bb97916c31f63229c93b88eced4542d5cd2bbbe96ddab18fb68e950615026613e38a4bed6e4a493e21e60a5a85328d17d13a58375b73ecf54453e59fd8412ddbb0e0e58fea91697ed3ff2908d2753e23253ac1b43571052d233003812a51326b53f10109a5d250bf99043bda74905037195e4ba33c69f550be4a182c1cb29ec8a9c7ecd50", 0xcc, 0x9}, {&(0x7f0000000240)="33f39871756536a66ed4f731b621204c231d15b2222d21fc2421042f17220fb9769b1ed6f5d22b0fd17f4639b007ca85f7ebabd9980149351e9749bee99b428d86c01801cb53c9b359dfb0161c3c5fc4a47bd2504b0008ff61162cdd421a81abce54135c4871768d1ab5d6655567c1e84fab932b7f7c938410b780bed852de292db3fa5c7745881c426dff8992", 0x8d, 0x2}, {&(0x7f0000000300)="0b894be3bfa51925a88c86652be22163f92a1d02df3bc7eb23c3b4ced2e035aeb6f029a1723486e187f329369a795c3aff2b9c72a6e456de90955ccf870a558feb4d7e3eaf0d5be0a9e7ff6975c3f45759f9c623272588f1d14bc47c8028530f55da55dbca19778922356ce0518e02df6e820b5562ef520eeb41014060eb1130003b7c98de5279cfcabf7a150f56179cfa09bd36fa39b0", 0x97, 0x1}, {&(0x7f00000003c0)="a34f8afabc0c0953dcfb75a9bab30298dd54787c52f3e4f24c8790e7841f8257895eea25d3f0cc358df9b61b91b32bd1110dd8df60496082f1e627c27d3faa2892acf090eb89e3c9d699f26b980c24fe1172", 0x52, 0x3}, {&(0x7f0000000440)="4d8521f9587fbeffa7d14ad37e817d58ed8f201a7d3558f7f6f43053d8598b07821d05758506e00581f2bbc298f1ceab1589e080d5cbf2c90cdc0f224a62c3c21d52439da9ec2d8897f378415f910907f27149232aa4dc38b261a60b151c5b265748933761b99b253290feb89c08ccb96a0f31f16dcfa9f9d122fa5eca9209e8ccce618f6965636cbdee7dda09ff79863f4dddd18f68b3cd4484", 0x9a, 0x6}, {&(0x7f0000000500)="03caf88cbb227dcddc0a1957941f45a9e919e6f3d84e5515e56eb5f0d2a8a9e8e0172c7c7e2c8468f1f749a3f86765899ee975b8121bc8ffc321cc42c5c367441bd667b4d04083343afadc84", 0x4c, 0xff}, {&(0x7f0000000580)="c8ff877e1ca0bd08290387a0bcf090f7d0d7aa73df61beb5dab183e9c8ae7f1998c0cafa9afe2d5e32937429eee4bef908a842f6fd30b4ee85694a9c9eb143da193c4df26848dc4ec733017c4bc8cf805f1e49886f943202e2829b70306cca5de68affdc7c9584cd9192992a046d032def73433cad8acbba3580cfe3cff86343daff1e5dad0198d8d0b7dc2dc400c34e0557b0c24b9bd0fe19eb6fbff8982ae3c19d6be88af080ee555817d4aaad5899bd42b89103eb07cd4bd04f3403346d50b079d6c7a22e417d1c1016f5ae95671b2c5daaef3a4a7f094a32cc", 0xdb, 0x200}], 0x800c11, &(0x7f0000000740)={[{@uid={'uid', 0x3d, 0xee01}}, {@nr_inodes={'nr_inodes', 0x3d, [0x33, 0x38, 0x6d, 0x30, 0x36, 0x37, 0x25]}}, {@huge_never}, {@mpol={'mpol', 0x3d, {'local', '', @void}}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@nr_blocks={'nr_blocks', 0x3d, [0x65]}}, {@size={'size', 0x3d, [0x78, 0x36, 0x33]}}], [{@pcr={'pcr', 0x3d, 0x2}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@euid_lt}]}) statx(r1, &(0x7f0000000800)='./file0\x00', 0x4000, 0x800, &(0x7f0000000840)) read(r0, &(0x7f0000000000), 0x1b4000) write$P9_RREADLINK(r0, &(0x7f0000000940)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 05:49:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5000008, 0x100010, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r0, &(0x7f0000000000)=0x80, &(0x7f00000000c0)=@rc={0x1f, @none}, 0x0, 0x800}, 0x1a) read(r0, &(0x7f0000000000), 0x1b4000) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r3, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r2, r3) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) statx(r0, &(0x7f0000000280)='./file0\x00', 0x100, 0x4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x100001, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}, {@dfltuid={'dfltuid', 0x3d, r4}}, {@dfltuid}, {@access_uid={'access', 0x3d, 0xee01}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@access_client}], [{@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@subj_user}, {@appraise}, {@audit}, {@fowner_gt={'fowner>', 0xee01}}, {@uid_lt={'uid<', r5}}, {@appraise}, {@fowner_gt={'fowner>', r6}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@subj_user={'subj_user', 0x3d, '\x00'}}]}}) [ 969.188714] FAULT_INJECTION: forcing a failure. [ 969.188714] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 969.191295] CPU: 0 PID: 7132 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 969.192719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 969.194433] Call Trace: [ 969.194982] dump_stack+0x107/0x167 [ 969.195743] should_fail.cold+0x5/0xa [ 969.196543] __alloc_pages_nodemask+0x182/0x600 [ 969.197526] ? add_mm_counter_fast+0x220/0x220 [ 969.198482] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 969.199725] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 969.200820] ? lock_downgrade+0x6d0/0x6d0 [ 969.201688] ? mark_held_locks+0x9e/0xe0 [ 969.202538] alloc_pages_vma+0xbb/0x410 [ 969.203372] handle_mm_fault+0x152f/0x3500 [ 969.204245] ? do_raw_spin_lock+0x121/0x260 [ 969.205222] ? rwlock_bug.part.0+0x90/0x90 [ 969.206415] ? __pmd_alloc+0x630/0x630 [ 969.207243] __get_user_pages+0x6ec/0x1620 [ 969.208116] ? follow_page_mask+0x1900/0x1900 [ 969.209039] ? down_read+0x10f/0x430 [ 969.209829] ? down_write+0x160/0x160 [ 969.210626] get_user_pages_unlocked+0x18a/0x690 [ 969.211594] ? internal_get_user_pages_fast+0xdce/0x2640 [ 969.212708] ? pin_user_pages_locked+0x7b0/0x7b0 [ 969.213707] internal_get_user_pages_fast+0x175f/0x2640 [ 969.214823] ? pin_user_pages_unlocked+0x80/0x80 [ 969.215830] ? trace_hardirqs_on+0x5b/0x180 [ 969.216715] get_user_pages_fast+0x66/0xa0 [ 969.217594] iov_iter_get_pages+0x297/0xf40 [ 969.218477] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 969.219493] ? mempool_resize+0x7d0/0x7d0 [ 969.220369] bio_iov_iter_get_pages+0x22a/0x1200 [ 969.221349] ? bvec_alloc+0x17e/0x2f0 [ 969.222136] ? bio_alloc_bioset+0x2a1/0x600 [ 969.223023] ? bio_add_pc_page+0x100/0x100 05:49:28 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x80108906, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 969.223895] ? bvec_alloc+0x290/0x2f0 [ 969.224837] ? iov_iter_npages+0x1fd/0xa70 [ 969.225747] ? ext4_iomap_begin+0x1a0/0x700 [ 969.226672] iomap_dio_bio_actor+0x77a/0xef0 [ 969.227625] iomap_dio_actor+0x36f/0x560 [ 969.228495] iomap_apply+0x289/0x810 [ 969.229287] ? iomap_dio_rw+0x90/0x90 [ 969.230107] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 969.231323] ? delete_from_page_cache_batch+0xa30/0xa30 [ 969.232443] ? mark_held_locks+0x9e/0xe0 [ 969.233317] ? filemap_check_errors+0xa5/0x150 [ 969.234308] __iomap_dio_rw+0x6cd/0x1110 [ 969.235166] ? iomap_dio_rw+0x90/0x90 [ 969.235984] ? iomap_dio_bio_actor+0xef0/0xef0 [ 969.236953] ? down_read+0x10f/0x430 [ 969.237746] ? down_write+0x160/0x160 [ 969.238556] iomap_dio_rw+0x31/0x90 [ 969.239324] ext4_file_read_iter+0x2c7/0x4c0 [ 969.240260] new_sync_read+0x424/0x6f0 [ 969.241082] ? ksys_lseek+0x1b0/0x1b0 [ 969.241910] ? fsnotify_perm.part.0+0x22d/0x620 [ 969.242892] ? security_file_permission+0xb1/0xe0 [ 969.243935] vfs_read+0x4da/0x620 [ 969.244675] ksys_read+0x12d/0x260 [ 969.245431] ? vfs_write+0xb10/0xb10 [ 969.246221] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 969.247321] ? syscall_enter_from_user_mode+0x1d/0x50 [ 969.248413] do_syscall_64+0x33/0x40 [ 969.249196] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 969.250280] RIP: 0033:0x7fb97f666b19 [ 969.251064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 969.254925] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 969.256534] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 969.258044] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 969.259554] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 969.261065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 969.262587] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 969.281344] loop4: detected capacity change from 0 to 41948160 [ 969.332251] FAULT_INJECTION: forcing a failure. [ 969.332251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 969.334882] CPU: 1 PID: 7140 Comm: syz-executor.4 Not tainted 5.10.246 #1 [ 969.336333] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 969.338094] Call Trace: [ 969.338670] dump_stack+0x107/0x167 [ 969.339452] should_fail.cold+0x5/0xa [ 969.340275] _copy_to_user+0x2e/0x180 [ 969.341099] simple_read_from_buffer+0xcc/0x160 [ 969.342111] proc_fail_nth_read+0x198/0x230 [ 969.343044] ? proc_sessionid_read+0x230/0x230 [ 969.344014] ? security_file_permission+0xb1/0xe0 [ 969.345058] ? proc_sessionid_read+0x230/0x230 [ 969.346043] vfs_read+0x228/0x620 [ 969.346792] ksys_read+0x12d/0x260 [ 969.347566] ? vfs_write+0xb10/0xb10 [ 969.348371] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 969.349504] ? syscall_enter_from_user_mode+0x1d/0x50 [ 969.350602] do_syscall_64+0x33/0x40 [ 969.351394] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 969.352483] RIP: 0033:0x7f69c267269c [ 969.353267] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 969.357145] RSP: 002b:00007f69bfc35170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 969.358758] RAX: ffffffffffffffda RBX: 0000000000000016 RCX: 00007f69c267269c [ 969.360265] RDX: 000000000000000f RSI: 00007f69bfc351e0 RDI: 0000000000000006 [ 969.361783] RBP: 00007f69bfc351d0 R08: 0000000000000000 R09: 0000000000000000 [ 969.363288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 969.364798] R13: 00007ffdb68c537f R14: 00007f69bfc35300 R15: 0000000000022000 05:49:28 executing program 2: ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000000)=""/106) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000200)={&(0x7f0000000100)=""/215, 0xd7, 0x5, 0xffffffff}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r3}}, 0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9}, 0x9) r5 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r6, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r5, r6) r7 = inotify_init() ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x5, 0x9a}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r9}}, 0x7ff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000700)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x17d, &(0x7f00000006c0)=[r6, r7], 0x2, 0x0, 0x0, {0x0, r9}}, 0x5) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000740)={0x29c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xfc6, 0x5a}}}}, [@NL80211_ATTR_FRAME_MATCH={0x1a, 0x5b, "d021dccce6b6418812598844d1d4f538c1e6030efb8e"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xffd1}, @NL80211_ATTR_FRAME_MATCH={0xc7, 0x5b, "5ee50fb6fd990dea00d1dd2d60bb8900d935c48e3a0874157c44158985050e1ce5095da858d35fa238793736c67e02fc4d4512eabbddb7e1666c645fec956532e76edafa90e9f009657a500253d73bfdc2de8cbcf093b3214180a90d4249d6794b89be696b311822932501b55b4580fa3d052b3fa2ea6efce6b792ca18f6e4a0ad2eb3c0e0d7dc80f0da2d570671879d1fdfecac10de1d4ccfacf00b09ac9e249ed3e1516e06a2c706cec5ee2f63c2e8dcf982bd3d2868fac120518fbe9e274ce1088a"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x401}, @NL80211_ATTR_FRAME_MATCH={0x74, 0x5b, "c3446a7e2900f01a7259beb814b83318298424920952d4fa122c95da2d273327d96fb14a6b5b3cc087c452137427fc2bffff84aa78588799bcde1f7086e7d78a016cc1084b4f8147f38210301b12f2103b5d5c6ffa2e2733b0c4841916ec6faac929e64fc617a5a720cd172b5a0cc357"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xb1}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_MATCH={0xf3, 0x5b, "ac839546c4ecbce2c268deef1d731cf4f1d5f8966560f66493c5703a147712610faa1f5d9d93c7b0a79949356f1561c527cbc607698b768e11e7430e8a9f29c036db3628112762e0a0719c37409a2976130e4c8650438aeb138b6dfbfe7f8a3fd0d879c61a5199833244d3d5cffa6c9d313eb516b0037dd89e802a5d4d8dedd65c24010ff13871da1138a821a6941efe2499a0cac1da2a8af8c51115d19ba769c9d87553c93fc3716275f9235e5390f4e7a0842eca1037d9104a1d0ace8caad9b7215198865608b356e722ffa223ac82adb04a142adda70f3f1a846ddfb14bb834301f058caf50c3fcfeaf7f9c3a06"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xa834}]}, 0x29c}}, 0x1) 05:49:28 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = inotify_init() ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x5, 0x9a}) fsetxattr$security_selinux(r1, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:run_init_exec_t:s0\x00', 0x25, 0x1) 05:49:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) io_uring_setup(0x7a8a, &(0x7f00000000c0)={0x0, 0x652, 0x0, 0x1, 0x2be, 0x0, r0}) r1 = syz_open_dev$vcsn(&(0x7f0000000140), 0x40, 0x2) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) write$binfmt_elf64(r0, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x7c, 0x7, 0x1f, 0x20, 0x3, 0x3, 0x3e, 0x3ff, 0x144, 0x40, 0x298, 0x401, 0x0, 0x38, 0x1, 0x9, 0x1, 0x5c6}, [{0x60000000, 0x4, 0x5, 0x2, 0x6, 0xfffffffffffffff8, 0x2, 0x3}, {0x70000000, 0xb212, 0x0, 0x0, 0x9, 0xfffffffffffff932, 0x4, 0x3}], "780bdeed259a8ee0b3f3e932c35eddecff11ca7b805d92225a004fe8a69d89bb17d606eca79de4de1113745158c29597af57efa86fe54ed57b22fcb92ae5c31a94223838f1dabba5e956d111d39fa46431e23808b5673ba45e59c36a594841cd7f67ffc931a67afddef3170ecbe0eeffb22283facbfbc349b2537dc5173466bb344ce40aa269324c6c406c5b26f805a400e5ae765bf613dff95a45ad29f249a4938c1fcf12379509e09a68acc0e81a3a247d39c373766bbc0e261aa35990800ae1e61380a8d904e32b73fd31a61fdb03bb1c0502ad76e6197a36794760060f7ac16aae14128006c6bcdee7d95e0d13cc8dacfb0f1f8eede440"}, 0x1a9) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)=0x0) syz_open_procfs(r5, &(0x7f0000000400)='net/psched\x00') syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r3}}, 0x9) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/228, 0xe4}], 0x2) read(r1, &(0x7f0000000040)=""/12, 0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x30100, 0x0) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) 05:49:28 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x3f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}, 0x1c) r2 = socket$packet(0x11, 0x2, 0x300) pread64(r0, &(0x7f00000000c0)=""/86, 0x56, 0xffff) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f0000000380), 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x4, 0x4}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 05:49:28 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x80108907, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:28 executing program 5: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendto(r0, &(0x7f00000000c0)="485cf1d91f46f26684e541bcae99ccb6171133c0e495fe93c1363db25da184576c5991e42ae9818af548c960f8d55234d170a45f9d180762f3a319e26c64ee0975e20a", 0x43, 0x200080c0, &(0x7f0000000140)=@un=@file={0x1, './file0\x00'}, 0x80) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = signalfd4(r5, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r7, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r6}}, 0x9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000600)=0x3, 0x4) r8 = signalfd4(r4, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r9 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r9, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r8}}, 0x9) r10 = syz_open_dev$hidraw(&(0x7f0000000040), 0x7, 0x400) ioctl$BTRFS_IOC_BALANCE_V2(r1, 0xc4009420, &(0x7f00000001c0)={0x3, 0x7, {0x1, @usage=0x5, 0x0, 0x4, 0xd694, 0x0, 0x8, 0x5, 0x10, @usage=0x7, 0x80000001, 0x3f, [0x0, 0xffffffff, 0x6, 0xfff, 0x200, 0x2]}, {0x2, @usage=0x1, 0x0, 0x101, 0x4, 0x4, 0x293, 0x6, 0x80, @usage=0x3e40, 0x0, 0x3, [0x6, 0x8, 0xffffffffffff8001, 0xb947, 0x2400000000000, 0x4]}, {0x10001, @struct={0xfb9f, 0x80000000}, 0x0, 0x5, 0x0, 0x400, 0x6, 0x8ebe, 0x424, @struct={0x800, 0xfffffffb}, 0x3, 0x0, [0x1, 0x9, 0x0, 0x6, 0x2, 0x2]}, {0x2354, 0x6, 0x6}}) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f00000005c0)={{r10}, {@val={r11}, @max}}) r12 = openat(r8, &(0x7f0000000080)='./file0\x00', 0x107100, 0x10) read(r12, &(0x7f0000000000), 0x1b4000) 05:49:28 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 42) [ 969.585850] FAULT_INJECTION: forcing a failure. [ 969.585850] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 969.588638] CPU: 1 PID: 7165 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 969.590118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 969.591891] Call Trace: [ 969.592461] dump_stack+0x107/0x167 [ 969.593245] should_fail.cold+0x5/0xa [ 969.594082] __alloc_pages_nodemask+0x182/0x600 [ 969.595076] ? add_mm_counter_fast+0x220/0x220 [ 969.596053] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 969.597343] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 969.598479] ? lock_downgrade+0x6d0/0x6d0 [ 969.599362] ? mark_held_locks+0x9e/0xe0 [ 969.600239] alloc_pages_vma+0xbb/0x410 [ 969.601093] handle_mm_fault+0x152f/0x3500 [ 969.602008] ? do_raw_spin_lock+0x121/0x260 [ 969.602922] ? rwlock_bug.part.0+0x90/0x90 [ 969.603829] ? __pmd_alloc+0x630/0x630 [ 969.604684] __get_user_pages+0x6ec/0x1620 [ 969.605607] ? follow_page_mask+0x1900/0x1900 [ 969.606551] ? down_read+0x10f/0x430 [ 969.607341] ? down_write+0x160/0x160 [ 969.608171] get_user_pages_unlocked+0x18a/0x690 [ 969.609183] ? internal_get_user_pages_fast+0xdce/0x2640 [ 969.610343] ? pin_user_pages_locked+0x7b0/0x7b0 [ 969.611367] internal_get_user_pages_fast+0x175f/0x2640 [ 969.612533] ? pin_user_pages_unlocked+0x80/0x80 [ 969.613559] ? trace_hardirqs_on+0x5b/0x180 [ 969.614483] get_user_pages_fast+0x66/0xa0 [ 969.615386] iov_iter_get_pages+0x297/0xf40 [ 969.616316] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 969.617362] ? mempool_resize+0x7d0/0x7d0 [ 969.618260] bio_iov_iter_get_pages+0x22a/0x1200 [ 969.619280] ? bvec_alloc+0x17e/0x2f0 [ 969.620099] ? bio_alloc_bioset+0x2a1/0x600 [ 969.621018] ? bio_add_pc_page+0x100/0x100 [ 969.621931] ? bvec_alloc+0x290/0x2f0 [ 969.622745] ? iov_iter_npages+0x1fd/0xa70 [ 969.623648] ? ext4_iomap_begin+0x1a0/0x700 [ 969.624576] iomap_dio_bio_actor+0x77a/0xef0 [ 969.625541] iomap_dio_actor+0x36f/0x560 [ 969.626421] iomap_apply+0x289/0x810 [ 969.627219] ? iomap_dio_rw+0x90/0x90 [ 969.628037] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 969.629279] ? delete_from_page_cache_batch+0xa30/0xa30 [ 969.630434] ? mark_held_locks+0x9e/0xe0 [ 969.631320] ? filemap_check_errors+0xa5/0x150 [ 969.632301] __iomap_dio_rw+0x6cd/0x1110 [ 969.633166] ? iomap_dio_rw+0x90/0x90 [ 969.634006] ? iomap_dio_bio_actor+0xef0/0xef0 [ 969.634996] ? down_read+0x10f/0x430 [ 969.635790] ? down_write+0x160/0x160 [ 969.636810] iomap_dio_rw+0x31/0x90 [ 969.637693] ext4_file_read_iter+0x2c7/0x4c0 [ 969.638711] new_sync_read+0x424/0x6f0 [ 969.639574] ? ksys_lseek+0x1b0/0x1b0 [ 969.640569] ? fsnotify_perm.part.0+0x22d/0x620 [ 969.641597] ? security_file_permission+0xb1/0xe0 [ 969.642782] vfs_read+0x4da/0x620 [ 969.643637] ksys_read+0x12d/0x260 [ 969.644498] ? vfs_write+0xb10/0xb10 [ 969.645309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 969.646457] ? syscall_enter_from_user_mode+0x1d/0x50 [ 969.647680] do_syscall_64+0x33/0x40 [ 969.648479] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 969.649587] RIP: 0033:0x7fb97f666b19 [ 969.650374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 969.654435] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 969.656060] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 969.657731] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 969.659242] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 969.660757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 969.662412] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:49:41 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 43) 05:49:41 executing program 6: ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000000)=""/106) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000200)={&(0x7f0000000100)=""/215, 0xd7, 0x5, 0xffffffff}) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r3}}, 0x9) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9}, 0x9) r5 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r6, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r5, r6) r7 = inotify_init() ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x5, 0x9a}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r9}}, 0x7ff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000700)=@IORING_OP_FILES_UPDATE={0x14, 0x1, 0x0, 0x0, 0x17d, &(0x7f00000006c0)=[r6, r7], 0x2, 0x0, 0x0, {0x0, r9}}, 0x5) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000580)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000740)={0x29c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xfc6, 0x5a}}}}, [@NL80211_ATTR_FRAME_MATCH={0x1a, 0x5b, "d021dccce6b6418812598844d1d4f538c1e6030efb8e"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xffd1}, @NL80211_ATTR_FRAME_MATCH={0xc7, 0x5b, "5ee50fb6fd990dea00d1dd2d60bb8900d935c48e3a0874157c44158985050e1ce5095da858d35fa238793736c67e02fc4d4512eabbddb7e1666c645fec956532e76edafa90e9f009657a500253d73bfdc2de8cbcf093b3214180a90d4249d6794b89be696b311822932501b55b4580fa3d052b3fa2ea6efce6b792ca18f6e4a0ad2eb3c0e0d7dc80f0da2d570671879d1fdfecac10de1d4ccfacf00b09ac9e249ed3e1516e06a2c706cec5ee2f63c2e8dcf982bd3d2868fac120518fbe9e274ce1088a"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x401}, @NL80211_ATTR_FRAME_MATCH={0x74, 0x5b, "c3446a7e2900f01a7259beb814b83318298424920952d4fa122c95da2d273327d96fb14a6b5b3cc087c452137427fc2bffff84aa78588799bcde1f7086e7d78a016cc1084b4f8147f38210301b12f2103b5d5c6ffa2e2733b0c4841916ec6faac929e64fc617a5a720cd172b5a0cc357"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xb1}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_MATCH={0xf3, 0x5b, "ac839546c4ecbce2c268deef1d731cf4f1d5f8966560f66493c5703a147712610faa1f5d9d93c7b0a79949356f1561c527cbc607698b768e11e7430e8a9f29c036db3628112762e0a0719c37409a2976130e4c8650438aeb138b6dfbfe7f8a3fd0d879c61a5199833244d3d5cffa6c9d313eb516b0037dd89e802a5d4d8dedd65c24010ff13871da1138a821a6941efe2499a0cac1da2a8af8c51115d19ba769c9d87553c93fc3716275f9235e5390f4e7a0842eca1037d9104a1d0ace8caad9b7215198865608b356e722ffa223ac82adb04a142adda70f3f1a846ddfb14bb834301f058caf50c3fcfeaf7f9c3a06"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x1}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0xa834}]}, 0x29c}}, 0x1) 05:49:41 executing program 1: read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) 05:49:41 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x40) lseek(r0, 0x7f, 0x3) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x2}, 0x40110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r5}}, 0x7ff) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r5}}, 0x7ff) syz_io_uring_submit(0x0, r3, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x4, 0x0, @fd_index=0x2, 0x2, &(0x7f00000000c0)="024a47ffe40fb32eed15a38d72b40097f8cb67b96a3e9208f82b6e16d9d1e4975337b913fd3654152c8f6d00d7213edd7c0de6ee101021a8555f3e7d3ec1d3b67f3c18eea2c3084828600e7a00c1b12a994f22d0525a9c4eea195efe5770e10792461038bf727a80ddd1f085267b0984f7bbc1d9e931839b1c62b07a2f0224dbf80a3fdd8e585edd1248581aca054c2d6adddfaa00bf3eab57d37811b1bce7a2e32c273dcbd7bdc2a2b2e28b481860bac6abbb222de42a1d6917272408ed486b06f83d04c79a7e6341", 0xc9, 0x1c, 0x1, {0x0, r5}}, 0x4) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x7, 0xffffffffffffffff) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:41 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:41 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x11b300, 0x4) read(r0, &(0x7f0000000000)=""/7, 0x7) 05:49:41 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r1, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r0, r1) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x103000, 0x2) r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x147100, 0xb474592a613a5cd5) r4 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0xffffffe0}}, './file0\x00'}) read(r3, &(0x7f0000000000), 0x1b4000) 05:49:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) [ 982.268710] FAULT_INJECTION: forcing a failure. [ 982.268710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 982.271178] CPU: 1 PID: 7181 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 982.272541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 982.274202] Call Trace: [ 982.274746] dump_stack+0x107/0x167 [ 982.275497] should_fail.cold+0x5/0xa [ 982.276271] __alloc_pages_nodemask+0x182/0x600 [ 982.277224] ? add_mm_counter_fast+0x220/0x220 [ 982.278163] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 982.279397] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 982.280458] ? lock_downgrade+0x6d0/0x6d0 [ 982.281290] ? mark_held_locks+0x9e/0xe0 [ 982.282125] alloc_pages_vma+0xbb/0x410 [ 982.282933] handle_mm_fault+0x152f/0x3500 [ 982.283797] ? do_raw_spin_lock+0x121/0x260 [ 982.284677] ? rwlock_bug.part.0+0x90/0x90 [ 982.285538] ? __pmd_alloc+0x630/0x630 [ 982.286365] __get_user_pages+0x6ec/0x1620 [ 982.287234] ? follow_page_mask+0x1900/0x1900 [ 982.288151] ? down_read+0x10f/0x430 [ 982.288907] ? down_write+0x160/0x160 [ 982.289700] get_user_pages_unlocked+0x18a/0x690 [ 982.290675] ? internal_get_user_pages_fast+0xdce/0x2640 [ 982.291774] ? pin_user_pages_locked+0x7b0/0x7b0 [ 982.292744] internal_get_user_pages_fast+0x175f/0x2640 [ 982.293865] ? pin_user_pages_unlocked+0x80/0x80 [ 982.294836] ? trace_hardirqs_on+0x5b/0x180 [ 982.295718] get_user_pages_fast+0x66/0xa0 [ 982.296581] iov_iter_get_pages+0x297/0xf40 [ 982.297460] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 982.298462] ? mempool_resize+0x7d0/0x7d0 [ 982.299314] bio_iov_iter_get_pages+0x22a/0x1200 [ 982.300278] ? bvec_alloc+0x17e/0x2f0 [ 982.301056] ? bio_alloc_bioset+0x2a1/0x600 [ 982.301942] ? bio_add_pc_page+0x100/0x100 [ 982.302805] ? bvec_alloc+0x290/0x2f0 [ 982.303577] ? iov_iter_npages+0x1fd/0xa70 [ 982.304429] ? ext4_iomap_begin+0x1a0/0x700 [ 982.305318] iomap_dio_bio_actor+0x77a/0xef0 [ 982.306240] iomap_dio_actor+0x36f/0x560 [ 982.307079] iomap_apply+0x289/0x810 [ 982.307834] ? iomap_dio_rw+0x90/0x90 [ 982.308613] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 982.309788] ? delete_from_page_cache_batch+0xa30/0xa30 [ 982.310856] ? mark_held_locks+0x9e/0xe0 [ 982.311684] ? filemap_check_errors+0xa5/0x150 [ 982.312622] __iomap_dio_rw+0x6cd/0x1110 [ 982.313441] ? iomap_dio_rw+0x90/0x90 [ 982.314248] ? iomap_dio_bio_actor+0xef0/0xef0 [ 982.315179] ? down_read+0x10f/0x430 [ 982.315932] ? down_write+0x160/0x160 [ 982.316710] iomap_dio_rw+0x31/0x90 [ 982.317449] ext4_file_read_iter+0x2c7/0x4c0 [ 982.318340] new_sync_read+0x424/0x6f0 [ 982.319135] ? ksys_lseek+0x1b0/0x1b0 [ 982.319925] ? fsnotify_perm.part.0+0x22d/0x620 [ 982.320880] ? security_file_permission+0xb1/0xe0 [ 982.321884] vfs_read+0x4da/0x620 [ 982.322603] ksys_read+0x12d/0x260 [ 982.323320] ? vfs_write+0xb10/0xb10 [ 982.324077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 982.325143] ? syscall_enter_from_user_mode+0x1d/0x50 [ 982.326203] do_syscall_64+0x33/0x40 [ 982.326969] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 982.328020] RIP: 0033:0x7fb97f666b19 [ 982.328783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 982.332569] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 982.334120] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 982.335558] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 05:49:41 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 982.336999] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 982.338619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 982.340046] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 982.361083] loop4: detected capacity change from 0 to 41948160 05:49:41 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) fallocate(r0, 0x21, 0x618, 0x5) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:41 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x81) read(r0, &(0x7f0000000000), 0x1b4000) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r3}}, 0x9) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000180)=0x1) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x25d92f98ca4d7331, 0x30, r1, 0x0) syz_io_uring_submit(r5, 0x0, &(0x7f0000000140)=@IORING_OP_READV=@pass_iovec={0x1, 0x3, 0x4000, @fd_index=0x6, 0x4, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/112, 0x70}], 0x1, 0x4, 0x1}, 0x6) 05:49:41 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:41 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bluetooth', 0x111000, 0xa) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f00000001c0)={0x2, 0x0, @start={0x0, 0x1, "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", "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"}, [0x3, 0xfffffffffffff17e, 0x6e24605, 0x6, 0x1, 0x3, 0x7, 0x80000000, 0x2, 0x0, 0x80, 0x80, 0x2, 0x2, 0x7f, 0x8, 0x7, 0x0, 0x2008000000000000, 0x100000000, 0x1c9eebcf, 0xfffffffffffffffb, 0x8000, 0xffffffffffffffff, 0x5, 0x4, 0x1, 0x4, 0x3, 0x3a7, 0x1, 0x0, 0x2, 0x6, 0x3, 0x5, 0x715c, 0x9, 0x8001, 0x1f, 0x9, 0x4, 0x3, 0x7, 0x196, 0x6, 0x0, 0x7fffffff, 0x4, 0x3f, 0x0, 0x16, 0x1000, 0xdcac, 0xfff, 0x6, 0x40, 0x690, 0xc6, 0x40, 0x6, 0x3f, 0x20, 0x1ff]}) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f0000000040)={{r1}, {@val={r2}, @actul_num={@void, 0x2, 0x70}}}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"9871d0346247ab26d29ec78b7bdd165e", 0x0, 0x0, {0xfffffffffffffffb, 0x400}, {0x9, 0x20}, 0x800, [0x5, 0xffffffffffffffff, 0x5, 0x7, 0xfffffffffffffff8, 0x2, 0xfff, 0x5, 0x5, 0xfffffffffffffffd, 0x233, 0x0, 0x7c, 0x12e, 0x6, 0x7]}) 05:49:41 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107d01, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x800) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r4, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r3}}, 0x9) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e24, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}, 0x1c) write$binfmt_elf64(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="7f454c460108041f000000ffffff7f000300060000000080eb02000000000000400000000000a4023963000000000000cf0800000500380002000200f2ffff00060000000000000001800000000000000500000000000000010400000000000000010000000000a18f000000000000ffff00000000000051e57464ffffff7f030000000000000000f8ffffffffffff02000000000000007f000000000000000001000000000000ff7f000000000000533180a63951e900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f502cf322aa0c38938e1f0ba9f14ee00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005a24f01342eb0909a55f4fa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c6695ce756baee759e7295d23f669987e00362275192949a5279480ea2c57bba89025827c8db3611a22c4520eff2d60f1297eae26107cc14cddb9e89d3f61428bb0728f8f54ef1a7fa2f481a35051e06bead63520f622e49f77701aec26f13927d682e74bb21278820ebff00f385558ed5864490127391ea05f3ab9e830656765ef12c8dfc885a59a2a4cc9b2f00aecc318258f8d9c3e160b35e779e9a4b31407517e94101cfaa8bc0e5468feb146f9f70311fdb2727cec0f361c5f29e534f28f416c9f174f33e48b3900bcc557e2833dc5d524697df8d296887a09c1f77f8c37af36d51c30a9ba33e63cab3e077967ff0f000000000000f9f80a1ca1e41063477ab5fa15a2f32e5ef42d1b2408024dc668cc7d89324cbfab49ebc2e8ee5cf98585d6041a0fc0c962fd3ce97121ab1671aaae604b253f595f62008908cd4fbd6715c2f9d0"], 0x3b7) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:41 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = signalfd4(r2, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = signalfd4(r4, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r6 = syz_open_dev$tty20(0xc, 0x4, 0x1) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000002, 0x50, r6, 0x4584c000) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r7, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r5}}, 0x9) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00fvle0\x00\x00\x00\x00\x00']) dup2(r1, r2) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:41 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 44) [ 982.506317] FAULT_INJECTION: forcing a failure. [ 982.506317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 982.506331] CPU: 0 PID: 7212 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 982.506338] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 982.506342] Call Trace: [ 982.506359] dump_stack+0x107/0x167 [ 982.506372] should_fail.cold+0x5/0xa [ 982.506388] __alloc_pages_nodemask+0x182/0x600 [ 982.506403] ? add_mm_counter_fast+0x220/0x220 [ 982.506422] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 982.506437] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 982.506451] ? lock_downgrade+0x6d0/0x6d0 [ 982.506461] ? mark_held_locks+0x9e/0xe0 [ 982.506476] alloc_pages_vma+0xbb/0x410 [ 982.506491] handle_mm_fault+0x152f/0x3500 [ 982.506504] ? do_raw_spin_lock+0x121/0x260 [ 982.506514] ? rwlock_bug.part.0+0x90/0x90 [ 982.506524] ? __pmd_alloc+0x630/0x630 [ 982.506549] __get_user_pages+0x6ec/0x1620 [ 982.506567] ? follow_page_mask+0x1900/0x1900 [ 982.506579] ? down_read+0x10f/0x430 [ 982.506589] ? down_write+0x160/0x160 [ 982.506606] get_user_pages_unlocked+0x18a/0x690 [ 982.506620] ? internal_get_user_pages_fast+0xdce/0x2640 [ 982.506633] ? pin_user_pages_locked+0x7b0/0x7b0 [ 982.506651] internal_get_user_pages_fast+0x175f/0x2640 [ 982.506681] ? pin_user_pages_unlocked+0x80/0x80 [ 982.506694] ? trace_hardirqs_on+0x5b/0x180 [ 982.506708] get_user_pages_fast+0x66/0xa0 [ 982.506722] iov_iter_get_pages+0x297/0xf40 [ 982.506736] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 982.506748] ? mempool_resize+0x7d0/0x7d0 [ 982.506766] bio_iov_iter_get_pages+0x22a/0x1200 [ 982.506781] ? bvec_alloc+0x17e/0x2f0 [ 982.506794] ? bio_alloc_bioset+0x2a1/0x600 [ 982.506805] ? bio_add_pc_page+0x100/0x100 [ 982.506816] ? bvec_alloc+0x290/0x2f0 [ 982.506828] ? iov_iter_npages+0x1fd/0xa70 [ 982.506840] ? ext4_iomap_begin+0x1a0/0x700 [ 982.506856] iomap_dio_bio_actor+0x77a/0xef0 [ 982.506876] iomap_dio_actor+0x36f/0x560 [ 982.506891] iomap_apply+0x289/0x810 [ 982.506903] ? iomap_dio_rw+0x90/0x90 [ 982.506916] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 982.506932] ? delete_from_page_cache_batch+0xa30/0xa30 [ 982.506943] ? mark_held_locks+0x9e/0xe0 [ 982.506961] ? filemap_check_errors+0xa5/0x150 [ 982.506975] __iomap_dio_rw+0x6cd/0x1110 [ 982.506985] ? iomap_dio_rw+0x90/0x90 [ 982.507007] ? iomap_dio_bio_actor+0xef0/0xef0 [ 982.507022] ? down_read+0x10f/0x430 [ 982.507032] ? down_write+0x160/0x160 [ 982.507047] iomap_dio_rw+0x31/0x90 [ 982.507060] ext4_file_read_iter+0x2c7/0x4c0 [ 982.507075] new_sync_read+0x424/0x6f0 [ 982.507087] ? ksys_lseek+0x1b0/0x1b0 [ 982.507107] ? fsnotify_perm.part.0+0x22d/0x620 [ 982.507121] ? security_file_permission+0xb1/0xe0 [ 982.507138] vfs_read+0x4da/0x620 [ 982.507153] ksys_read+0x12d/0x260 [ 982.507164] ? vfs_write+0xb10/0xb10 [ 982.507178] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 982.507190] ? syscall_enter_from_user_mode+0x1d/0x50 [ 982.507204] do_syscall_64+0x33/0x40 [ 982.507215] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 982.507223] RIP: 0033:0x7fb97f666b19 [ 982.507234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 982.507240] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 982.507252] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 982.507258] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 982.507264] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 982.507271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 982.507277] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:49:54 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) [ 994.689866] FAULT_INJECTION: forcing a failure. [ 994.689866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 994.691372] CPU: 1 PID: 7230 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 994.692204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 994.693196] Call Trace: [ 994.693530] dump_stack+0x107/0x167 [ 994.693990] should_fail.cold+0x5/0xa [ 994.694461] __alloc_pages_nodemask+0x182/0x600 [ 994.695031] ? add_mm_counter_fast+0x220/0x220 [ 994.695592] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 994.696333] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 994.696973] ? lock_downgrade+0x6d0/0x6d0 [ 994.697483] ? mark_held_locks+0x9e/0xe0 [ 994.697992] alloc_pages_vma+0xbb/0x410 [ 994.698484] handle_mm_fault+0x152f/0x3500 [ 994.699002] ? do_raw_spin_lock+0x121/0x260 [ 994.699522] ? rwlock_bug.part.0+0x90/0x90 [ 994.700044] ? __pmd_alloc+0x630/0x630 [ 994.700533] __get_user_pages+0x6ec/0x1620 [ 994.701059] ? follow_page_mask+0x1900/0x1900 [ 994.701619] ? down_read+0x10f/0x430 [ 994.702089] ? down_write+0x160/0x160 [ 994.702562] get_user_pages_unlocked+0x18a/0x690 [ 994.703150] ? internal_get_user_pages_fast+0xdce/0x2640 [ 994.703816] ? pin_user_pages_locked+0x7b0/0x7b0 [ 994.704400] internal_get_user_pages_fast+0x175f/0x2640 [ 994.705062] ? pin_user_pages_unlocked+0x80/0x80 [ 994.705642] ? trace_hardirqs_on+0x5b/0x180 [ 994.706199] get_user_pages_fast+0x66/0xa0 [ 994.706717] iov_iter_get_pages+0x297/0xf40 [ 994.707255] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 994.707866] ? mempool_resize+0x7d0/0x7d0 [ 994.708387] bio_iov_iter_get_pages+0x22a/0x1200 [ 994.708977] ? bvec_alloc+0x17e/0x2f0 [ 994.709452] ? bio_alloc_bioset+0x2a1/0x600 [ 994.709985] ? bio_add_pc_page+0x100/0x100 [ 994.710497] ? bvec_alloc+0x290/0x2f0 [ 994.710963] ? iov_iter_npages+0x1fd/0xa70 [ 994.711480] ? ext4_iomap_begin+0x1a0/0x700 [ 994.712068] iomap_dio_bio_actor+0x77a/0xef0 [ 994.712613] iomap_dio_actor+0x36f/0x560 [ 994.713316] iomap_apply+0x289/0x810 [ 994.713902] ? iomap_dio_rw+0x90/0x90 [ 994.714381] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 994.715090] ? delete_from_page_cache_batch+0xa30/0xa30 [ 994.715742] ? mark_held_locks+0x9e/0xe0 [ 994.716255] ? filemap_check_errors+0xa5/0x150 [ 994.716819] __iomap_dio_rw+0x6cd/0x1110 [ 994.717314] ? iomap_dio_rw+0x90/0x90 [ 994.717799] ? iomap_dio_bio_actor+0xef0/0xef0 [ 994.718358] ? down_read+0x10f/0x430 [ 994.718811] ? down_write+0x160/0x160 [ 994.719275] iomap_dio_rw+0x31/0x90 [ 994.719721] ext4_file_read_iter+0x2c7/0x4c0 [ 994.720266] new_sync_read+0x424/0x6f0 [ 994.720732] ? ksys_lseek+0x1b0/0x1b0 [ 994.721204] ? fsnotify_perm.part.0+0x22d/0x620 [ 994.721777] ? security_file_permission+0xb1/0xe0 [ 994.722365] vfs_read+0x4da/0x620 [ 994.722790] ksys_read+0x12d/0x260 [ 994.723218] ? vfs_write+0xb10/0xb10 [ 994.723668] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 994.724309] ? syscall_enter_from_user_mode+0x1d/0x50 [ 994.725186] do_syscall_64+0x33/0x40 [ 994.725681] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 994.726467] RIP: 0033:0x7fb97f666b19 [ 994.726918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 994.729295] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 994.730235] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 994.731083] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 994.731948] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 994.732812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 994.732819] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 [ 994.745798] loop4: detected capacity change from 0 to 41948160 05:49:54 executing program 1: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x111243, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x4010, 0xffffffffffffffff, 0x10000000) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000002540)={r0, 0x177, 0xe97b, 0x80000001}) perf_event_open(&(0x7f00000024c0)={0x4, 0x80, 0x3f, 0x2, 0x3f, 0x2, 0x0, 0x80, 0x28, 0x7, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f0000002480), 0x1}, 0x8008, 0x200, 0xffffff7a, 0x6, 0x3, 0x400, 0xfff, 0x0, 0x41f, 0x0, 0x1}, 0x0, 0xc, r4, 0x1) syz_io_uring_submit(0x0, r3, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x10001, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r2}}, 0x9) mkdirat(r2, &(0x7f0000002440)='./file0\x00', 0x20) openat(r0, &(0x7f0000000080)='./file0\x00', 0x117100, 0x84) r5 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r5, r6) dup3(r1, r6, 0x80000) io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) dup(r0) writev(r0, &(0x7f0000002380)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f0000000040)="00d1ed88", 0x4}, {&(0x7f00000010c0)="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", 0x1000}, {&(0x7f00000020c0)="ed03b246b2bacb28ae45", 0x5a}, {&(0x7f0000002100)="d51ac0f1d2798aebff95a930", 0xc}, {&(0x7f0000002140)="d200b07ffc1158ff3f0d7d0000000000", 0x1b}, {&(0x7f0000002180)="b5ab8366960a439e6d7b1fc477f5ad633a478aa2e36f14eafdc24728375bed6e2d9f5ec00538dcb123615f777ce5b425d3b35425088a0ccea579544dee846748a304e8699805cc8181de1b5a10f5ae595ccd0dd85a5760b775dcab3a2a1175d52123aead5aae9a0823d8ff8de87cb4ac6d2c721157d0110908f506f305caadace060339719338844d21db5fe727bf9efae84", 0x92}, {&(0x7f0000002240)="e6d26d4c94390791451c69d9d56270487fae6a8a151233e18c89f289478f4fc8490a43a6fb80aa6df10938d1a8096fffffc83400aad019f88dbe7698b1ae78b31e1f1c2851235e20cae43a3c24b89929b0ca4f9cde53a5e6cf06adcc98f42e36918bb63f97a6de280479f5", 0x6b}, {&(0x7f0000002580)="760406ae8e6cd0bb786553e65944dbe661567dce3eb89c3d7208a4e165d643fd8e0b783cfb428b1014f24f948f23e1b1f895818cc14d429a03233128061080d6300332191c4c7d0213683e0731f04154e82e88d00a166543acd5b4e7cdfb5e0d73f6c65fc256625bb6a59248c10124d3d9968dcde45ffc12762fcb98d0d2d1a7d45dd4da9017c047f9bbb935817a2e1d99f3003c23eb", 0x96}], 0x9) read(r0, &(0x7f0000000000), 0x0) 05:49:54 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0xc020660b, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:54 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 45) 05:49:54 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r2, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r1, r2) r3 = openat(r1, &(0x7f0000000080)='/proc/self/exe\x00', 0x107140, 0x1cc) write$binfmt_elf64(r0, &(0x7f0000001b40)=ANY=[@ANYBLOB="7f454c46057f0305010000000000000002000600ffffff7fbe000000000000004000000000000000de0200000000000003000000060038000200c400040001000500000000800000060000000000000020000000000000000500000000000000050000000000000000000000000000000104000000000000c818ad786e49fb454ecaba80668296271410022b214a06c61a6cde9962b2cb2848575a021f46ab863084af580b9856cf38a104df4b79bc822907eb3fc5f7a37d343867e0e32c9185fec4725b50f8a97d7123a61cd032363cb7ea6e5cc3cef4bb1b4f4cc56762a440cdf27dbb9433cd73c0ef588fd2187204455dd5347ebfcc64844b77c3431b5d738294da4f71c506ea58bbde82568c0cc02cb6fa0460708ad796d6d22f2594fc75e968fc9c80d52244856d17a642e3c342c748a91dbd3e729aa11d671df0f808d18937dcc9b8f04ea0f15950df93bf3f60b123fef9133e9c4c7f1305d8eff213d43753c0855cdd8781dd0c37ae283093face5f0a0a699d4a88b1c5d76ded8c01da198624a67c83f0efa281f3bf27e8f924c160a51404dbe8e2626d2498e6cc6d139f4e637dc432a5671b410e9da46c1b6797fa8dccab1f4c73ec73ce70ef31bb75a897cd76d6fb0b10150cab2929b70eee7df5ec669a883ab2f87a381d37f23ea27e26ce401f85781b93ba093a6eb17769a1474c4a874c1fbc89f718bf26f2a11dd01cf4652500bf825df230b16367be04c1844cc9cf28c32d9fab7a5ea4d5e8ade8319beae91e7ceb82d7f781516cf5c09bf7a5d8e928ff933805676683d3fbed2ae48b33f9ccc033f59e3a3e03a80bd266a4c9ab1c1d305b0aa07fb99ff4d1c4115f27796d4b7d0ac51cbf15d8c0bf1c887fc80ac92b7e9d59943d94c940d5b03830c7b944376c582278f16e9336fa7f3c49848b76b21d69351e4856d2ed3185fbb11c7d9a8acb3e97ec388d8d063104cf73fffc33ba5029c6b8676f5ed2fc467cc7c3c6e44f933d48b4242e0829caa25848faca088c94d429c284197225fd5db9377552e831af4ec2fba559673eb9580f5dbf31f2ebadc173eebc29801937a7ed509f58e2de1b575e8dd76339e275ca24bc5cba5cc87df4bac4d313def4ecbdc834e09cc179a6345045c74b91da119f98568e5eb8deda983bcf9d5ee4f6adc3b218b2390cb69bbf8291943a7ef5d8414a00190af2c631447f6d627e5a611c8e6741f44c9d22078917e823d546abb5fd7a0b6487e9f82213e0984ce5a9d435a885851b48dfeb6f040a713b80778d829cf8e14d85f7b7d10d768996e1679c0883b618123d7cc4530ec286fddb16124ee3a8f9ab2fbc36d74a529cc4287fa1db685790f85bd9bb3c2d35fe67909ff1cdcaa587d22c642fd84502202111ba0a03e4287cef764df87b37561d82ab016c49bfbe5e4c792ed11312bce6948b26d55158a772da83649753c903818b60959b81cea17a1d4b772f5108ca2cfdc694f4581d62f23332b568d9930066eefccbece369b2b59a7a25fc2c9fae8963ff3dcf7c90c56696aee331f96d5245090b105b604e0aff6239852b7324b79b50ba2d1f12a95d3f653e0ab2488e37b01ec5e51966dd13b30ac463344fa6359147c7ab2e599d2f15f64da666e4a4ebd8199d519f94d0a02a5e0471df7fa80972d7be54737aad8184144751b8ebc7acb1c89a8a736e6e2880c32e5aac1f5dae413f9dd0e7d65f43cf73187a39419d6612b29ce83ebe64e71f9ac286585895c1739330d075a205fb6d401764d187fabef48eb548b5893f2dad0865296a61b1559f73559933f14570dadce704f910abfef473219258d921cca76e0d3eb4c11a816af0ea3391e2fd966441019b0b6c9abcef5a06ef5f96b1665cbc3bbe4a3c0256847f6021c84a9da1280783acd44bee9a53e3cb3ef7288ced8498889991f36d5b0f6e892548024d9eaa574518a183d1b18ffe899da2ea3666b9f9c10687a603530ac3fdbad2d62f12f34fcc3d0969a0ecfddcd8a2bccdf1f3be74ae2c80fe1f738837fd94ff6247e852636abb0c9f02399dac56b32db5c5ad9a8e070d82fd6a340e2f22fba601d5b01cba345161363646d217864985e5506ba8565d109c4c2135b3f75b711de743e902687aaef65d6307fcf30bbe52129be748f238ce35dffd8454d6f5515038405740ea842a7c792437537a8968e717993e1b0a991edc436248c21cf2c36dc031b1c50248c87ae1f618e8fa90db015c87856890a53173506fbade001510f344bf2e55d30a343a81931fd83081cd6b8808fceea23554c0e607d52edf0aa0904fd0fec707fc20ec5af6eee76f0425a617a3c8bcf6ce7469aa4efeaf56937ef5c04d2999ecaf2ae01ba66942078eea9e3c89e4ad6e74c96aa8172950fd1aa81f4d92588a6c58e026ed51647d944759f44d6d464b8ce9952e31579d8a58d976c6d6120512d998ba5511351a53d4153b61841489bbe11d68a0086bc88e99c2b4a223156662f6fcc3f44138fa4f5149fa05ed876d4707d9592d9e66d6dfbb487e38ff941ffc9044f1b9fd8baf4dee6068c0bf61c01b6e453149da286577f14b713e475a68b23485d25f79aa74fa5f053181d1a8514b8789a12110a369ac19cb067d0757f5c57ff577b86e0f63489448ca9a32726d36bbfd7595ecd732932ec9b5beb0f8e3d9d5a72e656ce4fc485071627ab11b786dd545b0e206dc61dfd2a39507a4ad080abe91dae104673d59b646f315a626aae5d5abf967e2712be9a32957343bddb2eb301a491458436b0c1b3b11d1ab3b17f01305ead3934960d206b98f5b42ec179d90a58b1900e2e69b13f67c60fd3cccfed4e02060596540de508ee712909607d8871f27d141f569a5673c7f819416d4da10227dc213b5c0314ce5485d4dd6dad1b2c2e6f92fd80482356e7533feac2ead039dc7ee24329ade70ea066a966f7e7a4fbfa7678020fa7cfd3ad0578fb303be0f45221f81ae5d6c56d12218c5baabb9c5367ffe8517a05db7d81d1918eea0e8fe4e2a56b6f2633a3ee59903db8ab257bae579eeb9232aac1c96b0cc57ef14ee72f38371c7b4a7193b14de23ab62e17ab59ec092d81fc45c70ada4f28f291699b0ef042b50be453e6ec73937d5d47c7ef009e57bfa024a5b6a7095df3c38cc542085db301c2d714b16bccb61a2a9021eed34f244ca8231d0d62c60a7ff0aa80d6c050f3567fe923c2f92eb3cae26d6b8adfec03b07c2a7486d3a2d249c7443754d5189cfe96a4666bf0f5bcc14eda14032f1486b1378325579a5d995ca932167ba47f11750cc625d5cac354b4603be0745bef3d9243f856ff3ac4c8b7e1f2a5f98b860afd349ae933eb1ddf46df515f9bbd33964577bfdaeb551d60f9f3302b3921f631e645bf75ba536111cad38ea302def0728e16540529aa7a658649ca5209deb2f53171f9b1bf88dd5f827bfa249734552fc1b3caf071e6c96b0cbfdae680457bfd03642cbde27772bab4a85ef968e27a8723ab407da8738616caa420b377b669ed1522c9578251f2e46d82011a1fc4eea47151876c2bc79367d7c1a16d8649e16f8212b6103736c3405550714669f47e7139ca457488222a89263580cab63a765a2ad33ab4a71c46f68014e6074909766e113557761a2d1e106072bdeb4461dc4dcb4744b390e08011b82e231b20c4660f1fa37687653d90d3288120292e7651e4c3e641dd6fedbbedd2186f8b27ebf8aa1a53cee15cfbd33720b41d0261b39954d1918ac4a93feae24e67a04b475781993f669de2dca1a690fc9dce5eecef5dd2c5a7c44b03ca1113cc7e217f5e04453b074119b9956c9e564ab2a7eb28e9665d3ab78a905d840855b6b77b6739f845545e8d69f82b64490449aea6dede5b87d5e659eee46bf203b3df75c9ac51df45558f57cd9b10fd6eb8536ec0e83947fc0b2fcbd31b2d69b9ce2df5d95cc762430ef17e688d2b1185fc42e6ba0c556a37238d1e2e3c610bc5a7d67dfd6fcb449235fa4f78f16ba06a3aba0cea380f96bc7820f84a08e1d6e3284b00a4acbe838618f5ee64421666fb000262bf09eb81b7bc8f08c7398083f15bb585ecbaf91a7a0260fe6ac8a112bff5a5265fc4503078f740ceba2ad252b8a475fac82031764a4a9c64b6d25f06d9479b707e1bffc6690696058c63ad9ff66b01288e32aacc1ce026be0eb385c892c905bf242afae40f426f923a5da4a33bd525ac0233a85c8fabd4ea8275e56af50248e6d2a499302a2baa0df3244b8c7613e7c841b9bdcece15fc4a5f089ed6678a0d99c37b14d486c779198d13fe4ce1345d83681c9e77cdbefabc44f1f6c4c68df8dc6992336f56631e2c4af4adcc3a9491e022eecfe16acecd9bc6afe722804c072175163531b758c3a70b436e94d7ccbb26f9fcfe4b2dd9a86475d0754ebaf9ec7e3ae69ff3183bac0e9b78e9a7405083b918fe59f2f176c48d5f6bab0d2791364092f57f64a4e5abb301e4f819301a9b2d98ddd69e9a2c9834d457e073192733d60c820db40591d11857c2ef189165ce9b9ee055d588aa1c9ce1a14e631eec3141bcb90cb0e0d6688b7e9131b664e1753a4c06f38e29962e73974987ea5c8932be63f731b1613d5fbf3bb5d05d3369f9322a0c2ad9699247e0cfc5f22d72b1a6173e990ba183bdc09562d2affa24082f0925e7b04fdbd7d132aee9a2549793dc48ac4182eba275498b19d90a4c8b7df9601651d797bdd3dd0657bf4da215d94b70be7e7695d7c4bdb1f7c8a39af1f615a383446b8ab11f265ec808a226e8369da35041e8f96af9acc391ef9a437cb0d349459d39aee486943929bd0ed5ea371a800e83357d700f94f0ee5b2152e3958ea61bd787a56ef45e9d2eb25f32d34cf4c33d2f8a5ebf9276a126ab3b08be29cbd084901826b9e3f6132ebebdef2af414c877109812548171461d7592aa18a4c8ec4ac7331f21df31313c8151376b8b31499a7c8feacee8505955ea022c60574152efda318c4dc5f4320e328f17f8b3e80531e075217f6f1ebb9e5fbc5d3eab3fe8c20aa5ebc841bc841b3b65790fe32c49f409e6f2af7e022ed75215877a43a61fe0f8c12eb09d07cf7084ce1c957240adf9568c0341cbc6f151d4256199ee2b052e8d4c8c921223b640de203d988bcdf92e9828f2423a28a372b655935b45b9f5cfeeb9b6b855a5f1c588a450c1658d3cdb88fc8001f2b2df2dd789397a8c173d7ece64a04c4d9b6ba0c58db1aeeac703bc41093f0e329b69e08d4726ff8e63eeb02b7ab8286806ec81abf9e602aa97f6c72493205255e2919c18660e3faebd3db6c1138989290ec0b1c882ca3b5ee55be1ca3be7f4cd924326249a9141f6b8ca17711b1a07672d24a1466d2b43942d5de4fd9e371e2ede5c04fd5b108db74f76e597c5fdcb8c0c005cdcb2db396ffcfc91decb96c230dd2b155ce1ca5a752d6850e7980098ddf199785f3c7200bcf20a0722ba326c104c437540e201768eb47aba142ff59589ac96b7440198133005699e2a2ed04a52b78688f0c85435c794f3d0eee7f4ca237cc79d251aed27378e663742da6c3c01d0cfdacfd53fcecac5a39eb310ba53df090a9e7b799f12b60cd5bbf5643c64f9ff932444607fb7c49e5a5827cbca4e2481536282a43f5d8d31c420a924d5a1d53b98cc1bef6696d5e3dd93f0c377b6e68f1c4eaaee50354a3ebbb0fc3e83992e29ed2be31b766fb9f50133697faadc436ab0f575576dde46b9e5f9a1cfdaac8e0843dfdc5f1b451f74b1fe0d14481b14420d0ac2dc8614927fb6978dba1a8f4cd21975ff76db7ff25c37b3d4edfd75f37209bc76844d558bcec7e4d0d256f8f92747837a8b9cd9521fe1e438aef7f860525a85f458dac55e93e65b2f459f64a4354ae6739130435318c7644415f711f6d6c2b1fe69d847621188fdc7e18772dc424419b2ac8530cd477f6f08618af933c15144a8dc6aa21f78cf0a2ab662762ad05000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004ab11990a1e3901c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080419b815ff751772f1b2ea5fed3b57d6f121707ca0dc2402cf569080d57a69c5bce3d7d468dc5c87bd8a159c8ac13489cab2a9a4ca5126bda1524c987ddd77bd4b3e4c9c46fc42356a117459f832a37a89efd9c251b5ed163be6813d66ae0db5ee2560c11"], 0x1978) read(r3, &(0x7f0000000000), 0x1b4000) 05:49:54 executing program 2: fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)=0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x20) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0xfdef, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) 05:49:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x402002, 0x1) openat(r0, &(0x7f0000000000)='./file0\x00', 0x2840, 0x100) read(r0, &(0x7f0000000040)=""/7, 0x7) 05:49:54 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x2}}) 05:49:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x206103, 0x109) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:54 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x68) read(r0, &(0x7f00000000c0)=""/102400, 0x19000) 05:49:54 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:49:54 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc7a1597d2f109e5b, 0x108) r1 = openat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x80001, 0x148) syz_io_uring_setup(0x2814, &(0x7f00000000c0)={0x0, 0x6c80, 0x10, 0x0, 0x309}, &(0x7f0000003000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r2, &(0x7f00000002c0)=@IORING_OP_STATX={0x15, 0x4, 0x0, r1, &(0x7f0000000180), &(0x7f0000000280)='./file0/file0\x00', 0x800, 0x1000}, 0x7fffffff) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x810, r0, 0xa1af3000) read(r0, &(0x7f0000000000), 0x1b4000) 05:49:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x103d82, 0xc) read(r0, &(0x7f0000000000), 0x1b4000) fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@ng={0x4, 0x13, "b03aea3a7026e23466657ef979"}, 0xf, 0x3) r1 = inotify_init() ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x5, 0x9a}) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, &(0x7f00000000c0)={{r1}, {@void, @actul_num={@val=0x2d, 0x97, 0x65}}}) 05:49:54 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x3}}) 05:49:54 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) dup2(r0, r0) 05:49:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x20000216, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) 05:49:54 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x4}}) [ 994.956040] loop4: detected capacity change from 0 to 41948160 05:50:06 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x1d}}) 05:50:06 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 46) 05:50:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x107140, 0x40) read(r0, &(0x7f0000000000), 0x1b4000) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) mq_timedsend(r2, &(0x7f0000000140)="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", 0x1000, 0x21, &(0x7f0000001140)) dup2(r1, 0xffffffffffffffff) openat(r1, &(0x7f0000000000)='./file0\x00', 0x20000, 0x80) 05:50:06 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000008, 0x94051, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x3, r3}}, 0x7ff) syz_io_uring_submit(r1, 0x0, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x4, 0x0, @fd_index=0x3, 0x3f, 0x0, 0x81, 0x0, 0x1, {0x0, r3}}, 0x0) 05:50:06 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x52000012) creat(&(0x7f0000000000)='./file0\x00', 0x2) 05:50:06 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x5}}) 05:50:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0xfffffdef, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) 05:50:06 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x70, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x7b6}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private0}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private1}]}, 0x70}, 0x1, 0x0, 0x0, 0x4080}, 0x4) getsockopt$sock_timeval(r2, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r1, r2) fallocate(r1, 0x28, 0x5, 0x3) [ 1006.922800] loop4: detected capacity change from 0 to 41948160 [ 1006.936047] FAULT_INJECTION: forcing a failure. [ 1006.936047] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1006.939370] CPU: 0 PID: 7287 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1006.940845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1006.942949] Call Trace: [ 1006.943631] dump_stack+0x107/0x167 [ 1006.944554] should_fail.cold+0x5/0xa [ 1006.945618] __alloc_pages_nodemask+0x182/0x600 [ 1006.946884] ? add_mm_counter_fast+0x220/0x220 [ 1006.948048] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1006.949572] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1006.950933] ? lock_downgrade+0x6d0/0x6d0 [ 1006.951975] ? mark_held_locks+0x9e/0xe0 [ 1006.952953] alloc_pages_vma+0xbb/0x410 [ 1006.954028] handle_mm_fault+0x152f/0x3500 [ 1006.955098] ? do_raw_spin_lock+0x121/0x260 [ 1006.956100] ? rwlock_bug.part.0+0x90/0x90 [ 1006.957036] ? __pmd_alloc+0x630/0x630 [ 1006.957907] __get_user_pages+0x6ec/0x1620 [ 1006.958833] ? follow_page_mask+0x1900/0x1900 [ 1006.959812] ? down_read+0x10f/0x430 05:50:06 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x6}}) [ 1006.960718] ? down_write+0x160/0x160 [ 1006.961802] get_user_pages_unlocked+0x18a/0x690 [ 1006.962852] ? internal_get_user_pages_fast+0xdce/0x2640 [ 1006.964025] ? pin_user_pages_locked+0x7b0/0x7b0 [ 1006.965074] internal_get_user_pages_fast+0x175f/0x2640 [ 1006.966374] ? pin_user_pages_unlocked+0x80/0x80 [ 1006.967412] ? trace_hardirqs_on+0x5b/0x180 [ 1006.968370] get_user_pages_fast+0x66/0xa0 [ 1006.969466] iov_iter_get_pages+0x297/0xf40 [ 1006.970437] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1006.971628] ? mempool_resize+0x7d0/0x7d0 [ 1006.972564] bio_iov_iter_get_pages+0x22a/0x1200 [ 1006.973603] ? bvec_alloc+0x17e/0x2f0 [ 1006.974586] ? bio_alloc_bioset+0x2a1/0x600 [ 1006.975693] ? bio_add_pc_page+0x100/0x100 [ 1006.976780] ? bvec_alloc+0x290/0x2f0 [ 1006.977650] ? iov_iter_npages+0x1fd/0xa70 [ 1006.978560] ? ext4_iomap_begin+0x1a0/0x700 [ 1006.979502] iomap_dio_bio_actor+0x77a/0xef0 [ 1006.980467] iomap_dio_actor+0x36f/0x560 [ 1006.981341] iomap_apply+0x289/0x810 [ 1006.982154] ? iomap_dio_rw+0x90/0x90 [ 1006.982982] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 1006.984216] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1006.985357] ? mark_held_locks+0x9e/0xe0 [ 1006.986265] ? filemap_check_errors+0xa5/0x150 [ 1006.987273] __iomap_dio_rw+0x6cd/0x1110 [ 1006.988186] ? iomap_dio_rw+0x90/0x90 [ 1006.989035] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1006.990052] ? down_read+0x10f/0x430 [ 1006.990989] ? down_write+0x160/0x160 [ 1006.991841] iomap_dio_rw+0x31/0x90 [ 1006.992651] ext4_file_read_iter+0x2c7/0x4c0 [ 1006.993627] new_sync_read+0x424/0x6f0 [ 1006.994498] ? ksys_lseek+0x1b0/0x1b0 [ 1006.995357] ? fsnotify_perm.part.0+0x22d/0x620 [ 1006.996361] ? security_file_permission+0xb1/0xe0 [ 1006.997397] vfs_read+0x4da/0x620 [ 1006.998309] ksys_read+0x12d/0x260 [ 1006.999104] ? vfs_write+0xb10/0xb10 [ 1006.999915] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1007.001049] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1007.002372] do_syscall_64+0x33/0x40 [ 1007.003187] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1007.004386] RIP: 0033:0x7fb97f666b19 [ 1007.005196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1007.009181] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1007.010815] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 1007.012375] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1007.013949] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1007.015665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1007.017268] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:50:06 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x7}}) [ 1020.850210] FAULT_INJECTION: forcing a failure. [ 1020.850210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1020.852839] CPU: 0 PID: 7308 Comm: syz-executor.0 Not tainted 5.10.246 #1 05:50:20 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 47) 05:50:20 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x8}}) 05:50:20 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), r0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@local, 0x78, r5}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8916, &(0x7f0000000000)={@remote, 0x0, r5}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)={0x254, r1, 0x200, 0x70bd2b, 0x25dfdbff, {}, [{{0x8}, {0x138, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x254}, 0x1, 0x0, 0x0, 0x24000804}, 0x24004800) 05:50:20 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x52000012) creat(&(0x7f0000000000)='./file0\x00', 0x2) 05:50:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x0, {0xd, './file1/file0'}}, 0x16) 05:50:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$F2FS_IOC_GET_PIN_FILE(r1, 0x8004f50e, &(0x7f0000000000)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) creat(&(0x7f0000000040)='./file0\x00', 0x60) 05:50:20 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_enter(r0, 0xf5a, 0x255d, 0x1, &(0x7f00000000c0)={[0x3a]}, 0x8) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x12, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_NOP={0x0, 0x3}, 0x1009) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x149100, 0x0) lseek(r2, 0x10001, 0x0) 05:50:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x8000, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) [ 1020.854634] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1020.856610] Call Trace: [ 1020.857203] dump_stack+0x107/0x167 [ 1020.857986] should_fail.cold+0x5/0xa [ 1020.858847] __alloc_pages_nodemask+0x182/0x600 [ 1020.859861] ? add_mm_counter_fast+0x220/0x220 [ 1020.860844] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1020.862176] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1020.863475] ? lock_downgrade+0x6d0/0x6d0 [ 1020.864556] ? mark_held_locks+0x9e/0xe0 [ 1020.865646] alloc_pages_vma+0xbb/0x410 [ 1020.866709] handle_mm_fault+0x152f/0x3500 [ 1020.867835] ? do_raw_spin_lock+0x121/0x260 [ 1020.868945] ? rwlock_bug.part.0+0x90/0x90 [ 1020.870173] ? __pmd_alloc+0x630/0x630 [ 1020.871233] __get_user_pages+0x6ec/0x1620 [ 1020.872378] ? follow_page_mask+0x1900/0x1900 [ 1020.873374] ? down_read+0x10f/0x430 [ 1020.874214] ? down_write+0x160/0x160 [ 1020.875050] get_user_pages_unlocked+0x18a/0x690 [ 1020.876104] ? internal_get_user_pages_fast+0xdce/0x2640 [ 1020.877307] ? pin_user_pages_locked+0x7b0/0x7b0 [ 1020.878363] internal_get_user_pages_fast+0x175f/0x2640 [ 1020.879582] ? pin_user_pages_unlocked+0x80/0x80 [ 1020.880622] ? trace_hardirqs_on+0x5b/0x180 [ 1020.881572] get_user_pages_fast+0x66/0xa0 [ 1020.882518] iov_iter_get_pages+0x297/0xf40 [ 1020.883479] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1020.884547] ? mempool_resize+0x7d0/0x7d0 [ 1020.885459] bio_iov_iter_get_pages+0x22a/0x1200 [ 1020.886517] ? bvec_alloc+0x17e/0x2f0 [ 1020.887366] ? bio_alloc_bioset+0x2a1/0x600 [ 1020.888319] ? bio_add_pc_page+0x100/0x100 [ 1020.889248] ? bvec_alloc+0x290/0x2f0 [ 1020.890081] ? iov_iter_npages+0x1fd/0xa70 [ 1020.891002] ? ext4_iomap_begin+0x1a0/0x700 [ 1020.891959] iomap_dio_bio_actor+0x77a/0xef0 [ 1020.892949] iomap_dio_actor+0x36f/0x560 [ 1020.894020] iomap_apply+0x289/0x810 [ 1020.894921] ? iomap_dio_rw+0x90/0x90 [ 1020.895766] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 1020.897032] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1020.898224] ? mark_held_locks+0x9e/0xe0 [ 1020.899115] ? filemap_check_errors+0xa5/0x150 [ 1020.900121] __iomap_dio_rw+0x6cd/0x1110 [ 1020.901016] ? iomap_dio_rw+0x90/0x90 [ 1020.901874] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1020.902888] ? down_read+0x10f/0x430 [ 1020.903700] ? down_write+0x160/0x160 [ 1020.904549] iomap_dio_rw+0x31/0x90 [ 1020.905351] ext4_file_read_iter+0x2c7/0x4c0 [ 1020.906338] new_sync_read+0x424/0x6f0 [ 1020.907177] ? ksys_lseek+0x1b0/0x1b0 [ 1020.908012] ? fsnotify_perm.part.0+0x22d/0x620 [ 1020.909048] ? security_file_permission+0xb1/0xe0 [ 1020.910144] vfs_read+0x4da/0x620 [ 1020.910918] ksys_read+0x12d/0x260 [ 1020.911701] ? vfs_write+0xb10/0xb10 [ 1020.912544] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1020.913699] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1020.914843] do_syscall_64+0x33/0x40 [ 1020.915662] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1020.916766] RIP: 0033:0x7fb97f666b19 [ 1020.917583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1020.921537] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1020.923216] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 1020.924771] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1020.926346] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1020.927894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1020.929456] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:50:20 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x9}}) 05:50:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x1f71c1, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = signalfd4(r1, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = signalfd4(r3, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r5, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r4}}, 0x9) dup2(r3, r3) ioctl$CDROMREADALL(r4, 0x5318, &(0x7f00000001c0)) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1a7, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000002a40)) r8 = fsmount(0xffffffffffffffff, 0x0, 0x32) ioctl$CDROMEJECT(r8, 0x5309) syz_io_uring_submit(r7, 0x0, &(0x7f0000000580)=@IORING_OP_CONNECT={0x10, 0x5, 0x0, 0xffffffffffffffff, 0x80, &(0x7f0000001280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2, 0x2, {0xa, 0x4e23, 0x7fffffff, @rand_addr=' \x01\x00', 0x400}}}}, 0x0) syz_io_uring_submit(r7, r6, &(0x7f00000000c0)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x1, {0x0, 0x0, r2}}, 0x9) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000cc0)='./file0\x00', 0x1, 0x80) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000c40)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x102) 05:50:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000000)) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x10010, 0xffffffffffffffff, 0x9eeb1000) [ 1020.940005] loop4: detected capacity change from 0 to 41948160 05:50:20 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x7}}) 05:50:20 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0xa}}) 05:50:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:50:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) r1 = inotify_init() ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x5, 0x9a}) write(r1, &(0x7f00000000c0)="25c0613182458eae0c283aa4eec2d9f2220366d32c94efe31c30c88a4b525f96e2b6a4c23acf2c7b743a51965cb202b0aa8148488f26544255134ea637f94d95c93ced06318b0412e2938592fc0a607bba7391eb56006504bf95466107209382e3a5ab2159729784242b3f09863fe7b369dcc383b5cdcc10207b707c34d0d432a3e1186401996da980b49ebc84132bfc57ea684debef4ee1f05418266079e042c2e5d275758ad61622c966125b02f05242d64123fe23c85de55247f6951be54e60c7f9497d409ef5f6cbf731730ff96220c8", 0xd2) read(r0, &(0x7f0000000000), 0x1b4000) 05:50:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) r1 = inotify_init() ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x5, 0x9a}) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000000)) fchmod(r0, 0x0) 05:50:20 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 48) 05:50:20 executing program 5: read(0xffffffffffffffff, &(0x7f0000000000), 0x1b4000) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)="e304e4b2098c3c40461b363d5d33e77eeed07d24b58ed342fc8ec0f9d5e500f7ec9dd48bd67a0c83e89768cc4c8520ec2866b3e8895b170dda00f57c4fae20a95ac29806a51ddb812e91e0128ba0735635ca95ed97c2f3600bf172e6b084e152", 0x60) 05:50:20 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40ffffffffffff, 0x0, 0x0, 0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r1, 0x1, 0x3e, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup2(r0, r1) r2 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x10100, 0x0) syz_io_uring_setup(0x5713, &(0x7f0000000140)={0x0, 0xd092, 0x0, 0x0, 0x377}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000000c0)) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = signalfd4(r4, &(0x7f0000000140)={[0x1]}, 0x8, 0x800) r6 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x2010, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r6, &(0x7f0000000180)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd_index=0x1, 0x0, 0x0, 0x40, 0x9, 0x0, {0x0, 0x0, r5}}, 0x9) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r2, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, r6, &(0x7f00000001c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x1) read(r2, &(0x7f0000000000), 0x1b4000) [ 1021.147762] FAULT_INJECTION: forcing a failure. [ 1021.147762] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1021.149455] CPU: 1 PID: 7356 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1021.150365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1021.151276] Call Trace: [ 1021.151574] dump_stack+0x107/0x167 [ 1021.151990] should_fail.cold+0x5/0xa [ 1021.152412] __alloc_pages_nodemask+0x182/0x600 [ 1021.152916] ? add_mm_counter_fast+0x220/0x220 [ 1021.153410] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1021.154073] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1021.154646] ? lock_downgrade+0x6d0/0x6d0 [ 1021.155093] ? mark_held_locks+0x9e/0xe0 [ 1021.155540] alloc_pages_vma+0xbb/0x410 [ 1021.155971] handle_mm_fault+0x152f/0x3500 [ 1021.156430] ? do_raw_spin_lock+0x121/0x260 [ 1021.156917] ? rwlock_bug.part.0+0x90/0x90 [ 1021.157378] ? __pmd_alloc+0x630/0x630 [ 1021.157836] __get_user_pages+0x6ec/0x1620 [ 1021.158310] ? follow_page_mask+0x1900/0x1900 [ 1021.158798] ? down_read+0x10f/0x430 [ 1021.159219] ? down_write+0x160/0x160 [ 1021.159648] get_user_pages_unlocked+0x18a/0x690 [ 1021.160324] ? internal_get_user_pages_fast+0xdce/0x2640 [ 1021.160941] ? pin_user_pages_locked+0x7b0/0x7b0 [ 1021.161465] internal_get_user_pages_fast+0x175f/0x2640 [ 1021.162093] ? pin_user_pages_unlocked+0x80/0x80 [ 1021.162618] ? trace_hardirqs_on+0x5b/0x180 [ 1021.163113] get_user_pages_fast+0x66/0xa0 [ 1021.163577] iov_iter_get_pages+0x297/0xf40 [ 1021.164079] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1021.164642] ? mempool_resize+0x7d0/0x7d0 [ 1021.165105] bio_iov_iter_get_pages+0x22a/0x1200 [ 1021.165648] ? bvec_alloc+0x17e/0x2f0 [ 1021.166075] ? bio_alloc_bioset+0x2a1/0x600 [ 1021.166546] ? bio_add_pc_page+0x100/0x100 [ 1021.167004] ? bvec_alloc+0x290/0x2f0 [ 1021.167418] ? iov_iter_npages+0x1fd/0xa70 [ 1021.167880] ? ext4_iomap_begin+0x1a0/0x700 [ 1021.168378] iomap_dio_bio_actor+0x77a/0xef0 [ 1021.168866] iomap_dio_actor+0x36f/0x560 [ 1021.169335] iomap_apply+0x289/0x810 [ 1021.169744] ? iomap_dio_rw+0x90/0x90 [ 1021.170186] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 1021.170819] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1021.171425] ? mark_held_locks+0x9e/0xe0 [ 1021.171875] ? filemap_check_errors+0xa5/0x150 [ 1021.172405] __iomap_dio_rw+0x6cd/0x1110 [ 1021.172850] ? iomap_dio_rw+0x90/0x90 [ 1021.173294] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1021.173800] ? down_read+0x10f/0x430 [ 1021.174228] ? down_write+0x160/0x160 [ 1021.174648] iomap_dio_rw+0x31/0x90 [ 1021.175066] ext4_file_read_iter+0x2c7/0x4c0 [ 1021.175582] new_sync_read+0x424/0x6f0 [ 1021.176022] ? ksys_lseek+0x1b0/0x1b0 [ 1021.176480] ? fsnotify_perm.part.0+0x22d/0x620 [ 1021.176994] ? security_file_permission+0xb1/0xe0 [ 1021.177547] vfs_read+0x4da/0x620 [ 1021.177931] ksys_read+0x12d/0x260 [ 1021.178345] ? vfs_write+0xb10/0xb10 [ 1021.178755] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1021.179351] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1021.179914] do_syscall_64+0x33/0x40 [ 1021.180339] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1021.180898] RIP: 0033:0x7fb97f666b19 [ 1021.181324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1021.183571] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1021.184410] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 1021.185182] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1021.185951] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1021.186730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1021.187500] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 05:50:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x101142, 0x0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0xfdef) write$P9_RREADLINK(r0, &(0x7f0000000200)={0x16, 0x17, 0x2, {0xd, './file1/file0'}}, 0x16) 05:50:20 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0x7}}) [ 1021.229754] loop4: detected capacity change from 0 to 41948160 05:50:20 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_ringparam={0xb}}) 05:50:20 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1dd701, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) 05:50:20 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000040)=""/24, 0x1b402f) 05:50:20 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) (fail_nth: 49) [ 1021.393315] FAULT_INJECTION: forcing a failure. [ 1021.393315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1021.395910] CPU: 0 PID: 7375 Comm: syz-executor.0 Not tainted 5.10.246 #1 [ 1021.397360] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1021.399121] Call Trace: [ 1021.399692] dump_stack+0x107/0x167 [ 1021.400472] should_fail.cold+0x5/0xa [ 1021.401284] __alloc_pages_nodemask+0x182/0x600 [ 1021.402280] ? add_mm_counter_fast+0x220/0x220 [ 1021.403249] ? __alloc_pages_slowpath.constprop.0+0x2310/0x2310 [ 1021.404527] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1021.405642] ? lock_downgrade+0x6d0/0x6d0 [ 1021.406535] ? mark_held_locks+0x9e/0xe0 [ 1021.407405] alloc_pages_vma+0xbb/0x410 [ 1021.408255] handle_mm_fault+0x152f/0x3500 [ 1021.409161] ? do_raw_spin_lock+0x121/0x260 [ 1021.410086] ? rwlock_bug.part.0+0x90/0x90 [ 1021.410982] ? __pmd_alloc+0x630/0x630 [ 1021.411833] __get_user_pages+0x6ec/0x1620 [ 1021.412743] ? follow_page_mask+0x1900/0x1900 [ 1021.413697] ? down_read+0x10f/0x430 [ 1021.414496] ? down_write+0x160/0x160 [ 1021.415312] get_user_pages_unlocked+0x18a/0x690 [ 1021.416316] ? internal_get_user_pages_fast+0xdce/0x2640 [ 1021.417468] ? pin_user_pages_locked+0x7b0/0x7b0 [ 1021.418489] internal_get_user_pages_fast+0x175f/0x2640 [ 1021.419659] ? pin_user_pages_unlocked+0x80/0x80 [ 1021.420665] ? trace_hardirqs_on+0x5b/0x180 [ 1021.421584] get_user_pages_fast+0x66/0xa0 [ 1021.422503] iov_iter_get_pages+0x297/0xf40 [ 1021.423418] ? csum_and_copy_to_iter+0x14a0/0x14a0 [ 1021.424458] ? mempool_resize+0x7d0/0x7d0 [ 1021.425343] bio_iov_iter_get_pages+0x22a/0x1200 [ 1021.426365] ? bvec_alloc+0x17e/0x2f0 [ 1021.427177] ? bio_alloc_bioset+0x2a1/0x600 [ 1021.428089] ? bio_add_pc_page+0x100/0x100 [ 1021.428991] ? bvec_alloc+0x290/0x2f0 [ 1021.429799] ? iov_iter_npages+0x1fd/0xa70 [ 1021.430697] ? ext4_iomap_begin+0x1a0/0x700 [ 1021.431613] iomap_dio_bio_actor+0x77a/0xef0 [ 1021.432562] iomap_dio_actor+0x36f/0x560 [ 1021.433436] iomap_apply+0x289/0x810 [ 1021.434235] ? iomap_dio_rw+0x90/0x90 [ 1021.435047] ? trace_event_raw_event_iomap_class+0x560/0x560 [ 1021.436267] ? delete_from_page_cache_batch+0xa30/0xa30 [ 1021.437391] ? mark_held_locks+0x9e/0xe0 [ 1021.438272] ? filemap_check_errors+0xa5/0x150 [ 1021.439237] __iomap_dio_rw+0x6cd/0x1110 [ 1021.440104] ? iomap_dio_rw+0x90/0x90 [ 1021.440931] ? iomap_dio_bio_actor+0xef0/0xef0 [ 1021.441914] ? down_read+0x10f/0x430 [ 1021.442700] ? down_write+0x160/0x160 [ 1021.443512] iomap_dio_rw+0x31/0x90 [ 1021.444286] ext4_file_read_iter+0x2c7/0x4c0 [ 1021.445222] new_sync_read+0x424/0x6f0 [ 1021.446059] ? ksys_lseek+0x1b0/0x1b0 [ 1021.446886] ? fsnotify_perm.part.0+0x22d/0x620 [ 1021.447880] ? security_file_permission+0xb1/0xe0 [ 1021.448913] vfs_read+0x4da/0x620 [ 1021.449658] ksys_read+0x12d/0x260 [ 1021.450425] ? vfs_write+0xb10/0xb10 [ 1021.451222] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1021.452332] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1021.453430] do_syscall_64+0x33/0x40 [ 1021.454235] entry_SYSCALL_64_after_hwframe+0x67/0xd1 [ 1021.455321] RIP: 0033:0x7fb97f666b19 [ 1021.456111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1021.459998] RSP: 002b:00007fb97cbdc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1021.461606] RAX: ffffffffffffffda RBX: 00007fb97f779f60 RCX: 00007fb97f666b19 [ 1021.463120] RDX: 00000000001b4000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1021.464631] RBP: 00007fb97cbdc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1021.466156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1021.467660] R13: 00007ffea575094f R14: 00007fb97cbdc300 R15: 0000000000022000 BUG: leak checking failed VM DIAGNOSIS: 05:50:21 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffff88800993f920 RCX=ffffffff8110a0ae RDX=1ffff11001327f1a RSI=ffff8880182d9a40 RDI=ffff88800993f848 RBP=ffff8880182d9a40 RSP=ffff88800993f848 R8 =0000000000000001 R9 =ffff88800993f898 R10=ffffed1001327f1e R11=0000000000000001 R12=ffff88800993f8b8 R13=ffff88800993f8c0 R14=ffff88800993f8d0 R15=ffff88800993f898 RIP=ffffffff81109fbb RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f59b5474900 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f59b4871df0 CR3=000000000e8be000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffffffffffff XMM01=30306234386136303638616663356134 XMM02=38303062343861363036386166633561 XMM03=2f6c616e72756f6a2f676f6c2f6e7572 XMM04=ac95f555f9b7e30300000000002d27a8 XMM05=d3fdd5f48436fbd700000000000aeab0 XMM06=db53cda688ca865900000000000ae968 XMM07=00000000000000000000000000000000 XMM08=44495f474f4c5359530069253d595449 XMM09=00000000000000000000000000000000 XMM10=00002020000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=1ffff11001bfc6cd RBX=ffff88800dfe3658 RCX=ffffffff812804e1 RDX=dffffc0000000000 RSI=ffff88800ce6b3f0 RDI=ffff88800dfe3688 RBP=ffff88801b0ae6c0 RSP=ffff888042fcf9c0 R8 =0000000000000246 R9 =0000000000000003 R10=ffffed10085f9f26 R11=0000000000000001 R12=ffff88800dfe3668 R13=ffff88801b0ae708 R14=ffff88801b0ae710 R15=ffff88800ce6b3e0 RIP=ffffffff816f97cd RFL=00000046 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe0802938c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fffc08fdf88 CR3=0000000016d44000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000000ff000000000000000000000000 XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973 XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=0000557299e0bd000000557299e375f0 XMM06=0000557299e34d500000000000000000 XMM07=00000000000000000000000000000000 XMM08=610064253a64252f6b636f6c622f7665 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000