0003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001110000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}]}, 0x78) 08:04:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0xf0000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0xf8000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xc000000}]}, 0x78) 08:04:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001180000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x7, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe0}]}, 0x78) 08:04:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}]}, 0x78) 08:04:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000011c0000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0xfc000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xd000000}]}, 0x78) 08:04:32 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x10, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0xffffff80, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf8}]}, 0x78) 08:04:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xe000000}]}, 0x78) 08:04:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001260000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0xffffff9b, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x10, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xf000000}]}, 0x78) 08:04:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001fe0000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}]}, 0x78) 08:04:32 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x10, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0xb, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x18000000}]}, 0x78) 08:04:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x180}]}, 0x78) 08:04:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001040200000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:32 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40}, [{}]}, 0x78) 08:04:32 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0xc, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x19000000}]}, 0x78) 08:04:32 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40}, [{}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0xd, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000300000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x900}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001020400000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x1a000000}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0xe, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40}, [{}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001060400000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x1b000000}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0xf, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40}, [{}]}, 0x78) 08:04:33 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001800400000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x3f000000}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xa, 0x40}, [{}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x18, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xb, 0x40}, [{}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x7f000000}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000500000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xc, 0x40}, [{}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x80ffffff}]}, 0x78) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001310500000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xd, 0x40}, [{}]}, 0x78) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0xffffff9b, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x9bffffff}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000600000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xe, 0x40}, [{}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xc0000000}]}, 0x78) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf, 0x40}, [{}]}, 0x78) 08:04:33 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001040600000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x2, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xe0000000}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x18, 0x40}, [{}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xe8030000}]}, 0x78) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x7, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000700000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x40}, [{}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xf0000000}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x8, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x40}, [{}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001001100000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xf8000000}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xc0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xfc000000}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x9, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001001800000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:33 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xe0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xa, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xffffff80}]}, 0x78) 08:04:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf0, 0x40}, [{}]}, 0x78) 08:04:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001001c00000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xffffff9b}]}, 0x78) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf8, 0x40}, [{}]}, 0x78) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xb, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001002000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x40}, [{}]}, 0x78) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xffffffff}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001002600000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xc, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x180, 0x40}, [{}]}, 0x78) 08:04:34 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}]}, 0x78) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x2}]}, 0x78) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xd, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x700, 0x40}, [{}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001053100000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}]}, 0x78) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xe, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001003f00000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x5}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x900, 0x40}, [{}]}, 0x78) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00}]}, 0x78) 08:04:34 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x6}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x40}, [{}]}, 0x78) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xf, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001048000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x18, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x7}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xb00, 0x40}, [{}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001fffe00000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x40}, [{}]}, 0x78) 08:04:34 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x8}]}, 0x78) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x1a, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001feff00000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xd00, 0x40}, [{}]}, 0x78) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x9}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xe00, 0x40}, [{}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000004000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x1b, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf00, 0x40}, [{}]}, 0x78) 08:04:34 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xa}]}, 0x78) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xc0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000008000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1800, 0x40}, [{}]}, 0x78) 08:04:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xe0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:34 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 08:04:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xb}]}, 0x78) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1a00, 0x40}, [{}]}, 0x78) 08:04:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001400008000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1b00, 0x40}, [{}]}, 0x78) 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000010000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x40}, [{}]}, 0x78) 08:04:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xf0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 08:04:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xc}]}, 0x78) 08:04:35 executing program 0 (fault-call:3 fault-nth:0): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 08:04:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xd}]}, 0x78) 08:04:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x7f00, 0x40}, [{}]}, 0x78) 08:04:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xf8, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000020000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xfc, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe}]}, 0x78) 08:04:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xc000, 0x40}, [{}]}, 0x78) 08:04:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}]}, 0x78) 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000010000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 693.411860][T30737] FAULT_INJECTION: forcing a failure. [ 693.411860][T30737] name failslab, interval 1, probability 0, space 0, times 0 [ 693.424535][T30737] CPU: 1 PID: 30737 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 693.433384][T30737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.443524][T30737] Call Trace: [ 693.446909][T30737] dump_stack+0x137/0x19d [ 693.446938][T30737] should_fail+0x23c/0x250 [ 693.446958][T30737] ? __anon_vma_prepare+0x41/0x2d0 08:04:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xe000, 0x40}, [{}]}, 0x78) 08:04:35 executing program 0 (fault-call:3 fault-nth:1): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000020000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 693.446978][T30737] __should_failslab+0x81/0x90 [ 693.465824][T30737] should_failslab+0x5/0x20 [ 693.465850][T30737] kmem_cache_alloc+0x46/0x2f0 [ 693.475271][T30737] __anon_vma_prepare+0x41/0x2d0 [ 693.475299][T30737] wp_page_copy+0xb06/0x10c0 [ 693.475357][T30737] ? rmqueue+0x43/0xd00 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000004020000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 693.475374][T30737] ? mntput_no_expire+0x64/0x730 [ 693.475395][T30737] do_wp_page+0x5a8/0xba0 [ 693.475415][T30737] handle_mm_fault+0xb31/0x1a70 [ 693.475451][T30737] ? follow_page_mask+0xc2c/0x1040 [ 693.475469][T30737] __get_user_pages+0x947/0xee0 [ 693.475489][T30737] populate_vma_page_range+0xaf/0xc0 [ 693.475540][T30737] mprotect_fixup+0x3a4/0x570 [ 693.475559][T30737] do_mprotect_pkey+0x543/0x6f0 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000030000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000040000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 693.475578][T30737] __x64_sys_mprotect+0x44/0x50 [ 693.475594][T30737] do_syscall_64+0x4a/0x90 [ 693.475616][T30737] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 693.475647][T30737] RIP: 0033:0x4665d9 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000050000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 693.475658][T30737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 693.475671][T30737] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 693.475687][T30737] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 693.475699][T30737] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 693.475711][T30737] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 693.475723][T30737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 693.475735][T30737] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 693.594166][T30757] FAULT_INJECTION: forcing a failure. [ 693.594166][T30757] name failslab, interval 1, probability 0, space 0, times 0 [ 693.678456][T30757] CPU: 1 PID: 30757 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 693.678475][T30757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.678483][T30757] Call Trace: [ 693.700790][T30757] dump_stack+0x137/0x19d [ 693.700817][T30757] should_fail+0x23c/0x250 [ 693.700842][T30757] ? __anon_vma_prepare+0x92/0x2d0 [ 693.700861][T30757] __should_failslab+0x81/0x90 [ 693.700883][T30757] should_failslab+0x5/0x20 [ 693.700899][T30757] kmem_cache_alloc+0x46/0x2f0 [ 693.729036][T30757] ? __anon_vma_prepare+0x41/0x2d0 [ 693.734186][T30757] __anon_vma_prepare+0x92/0x2d0 [ 693.734210][T30757] wp_page_copy+0xb06/0x10c0 [ 693.734230][T30757] ? rmqueue+0x43/0xd00 [ 693.748426][T30757] ? mntput_no_expire+0x64/0x730 [ 693.748455][T30757] do_wp_page+0x5a8/0xba0 [ 693.748474][T30757] handle_mm_fault+0xb31/0x1a70 [ 693.748529][T30757] ? follow_page_mask+0xc2c/0x1040 [ 693.748549][T30757] __get_user_pages+0x947/0xee0 [ 693.748567][T30757] populate_vma_page_range+0xaf/0xc0 [ 693.748622][T30757] mprotect_fixup+0x3a4/0x570 [ 693.748639][T30757] do_mprotect_pkey+0x543/0x6f0 [ 693.748658][T30757] __x64_sys_mprotect+0x44/0x50 [ 693.748676][T30757] do_syscall_64+0x4a/0x90 [ 693.748704][T30757] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 693.748742][T30757] RIP: 0033:0x4665d9 [ 693.748799][T30757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 693.748875][T30757] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 693.748920][T30757] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 08:04:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x180, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000060000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf}]}, 0x78) 08:04:35 executing program 0 (fault-call:3 fault-nth:2): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf000, 0x40}, [{}]}, 0x78) 08:04:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 08:04:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x18}]}, 0x78) 08:04:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x700, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 693.748930][T30757] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 693.748939][T30757] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 693.748991][T30757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 693.749003][T30757] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf800, 0x40}, [{}]}, 0x78) 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000004060000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x78) 08:04:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xfc00, 0x40}, [{}]}, 0x78) 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000070000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x19}]}, 0x78) 08:04:35 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x900, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 694.039200][T30799] FAULT_INJECTION: forcing a failure. [ 694.039200][T30799] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 694.052736][T30799] CPU: 1 PID: 30799 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 694.061505][T30799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:04:35 executing program 0 (fault-call:3 fault-nth:3): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000080000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 694.071596][T30799] Call Trace: [ 694.071606][T30799] dump_stack+0x137/0x19d [ 694.071652][T30799] should_fail+0x23c/0x250 [ 694.071671][T30799] __alloc_pages+0x102/0x320 [ 694.071688][T30799] alloc_pages_vma+0x391/0x660 [ 694.071706][T30799] ? __anon_vma_prepare+0x236/0x2d0 [ 694.071722][T30799] wp_page_copy+0x14c/0x10c0 [ 694.071739][T30799] ? rmqueue+0x43/0xd00 [ 694.071752][T30799] ? mntput_no_expire+0x64/0x730 [ 694.071845][T30799] do_wp_page+0x5a8/0xba0 08:04:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000110000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 694.071902][T30799] handle_mm_fault+0xb31/0x1a70 [ 694.071924][T30799] ? follow_page_mask+0xc2c/0x1040 [ 694.071938][T30799] __get_user_pages+0x947/0xee0 [ 694.071957][T30799] populate_vma_page_range+0xaf/0xc0 [ 694.071977][T30799] mprotect_fixup+0x3a4/0x570 [ 694.072010][T30799] do_mprotect_pkey+0x543/0x6f0 [ 694.072024][T30799] __x64_sys_mprotect+0x44/0x50 [ 694.072105][T30799] do_syscall_64+0x4a/0x90 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000180000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:36 executing program 0 (fault-call:3 fault-nth:4): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 694.072125][T30799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 694.072145][T30799] RIP: 0033:0x4665d9 [ 694.072156][T30799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 694.072168][T30799] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 694.072229][T30799] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 694.072239][T30799] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 694.072248][T30799] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 694.072257][T30799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 694.072310][T30799] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 694.226368][T30817] FAULT_INJECTION: forcing a failure. [ 694.226368][T30817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 694.226392][T30817] CPU: 0 PID: 30817 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 694.226409][T30817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.226417][T30817] Call Trace: [ 694.226423][T30817] dump_stack+0x137/0x19d [ 694.226518][T30817] should_fail+0x23c/0x250 [ 694.226646][T30817] __alloc_pages+0x102/0x320 [ 694.226702][T30817] alloc_pages_vma+0x391/0x660 [ 694.226720][T30817] ? unlock_page_memcg+0xc3/0xe0 [ 694.226739][T30817] ? page_remove_rmap+0x1de/0x230 [ 694.226759][T30817] wp_page_copy+0x14c/0x10c0 [ 694.226778][T30817] ? release_pages+0x8d0/0x900 [ 694.226792][T30817] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 694.226811][T30817] ? __list_add_valid+0x28/0x90 [ 694.226845][T30817] do_wp_page+0x5a8/0xba0 [ 694.226862][T30817] handle_mm_fault+0xb31/0x1a70 [ 694.226881][T30817] ? follow_page_mask+0xc2c/0x1040 [ 694.226901][T30817] __get_user_pages+0x947/0xee0 [ 694.226920][T30817] populate_vma_page_range+0xaf/0xc0 [ 694.227017][T30817] mprotect_fixup+0x3a4/0x570 [ 694.227031][T30817] do_mprotect_pkey+0x543/0x6f0 [ 694.227045][T30817] __x64_sys_mprotect+0x44/0x50 [ 694.227060][T30817] do_syscall_64+0x4a/0x90 [ 694.227088][T30817] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 694.227110][T30817] RIP: 0033:0x4665d9 [ 694.227123][T30817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 694.227138][T30817] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 694.227181][T30817] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 694.227190][T30817] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 694.227198][T30817] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 694.227209][T30817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 08:04:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000001c0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 694.227220][T30817] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 694.319827][T30824] FAULT_INJECTION: forcing a failure. [ 694.319827][T30824] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 694.319887][T30824] CPU: 0 PID: 30824 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 694.517139][T30824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.517152][T30824] Call Trace: [ 694.517176][T30824] dump_stack+0x137/0x19d [ 694.535011][T30824] should_fail+0x23c/0x250 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000260000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 694.539440][T30824] __alloc_pages+0x102/0x320 [ 694.544043][T30824] alloc_pages_vma+0x391/0x660 [ 694.548878][T30824] ? unlock_page_memcg+0xc3/0xe0 [ 694.553841][T30824] ? page_remove_rmap+0x1de/0x230 [ 694.553899][T30824] wp_page_copy+0x14c/0x10c0 [ 694.553945][T30824] ? release_pages+0x8d0/0x900 [ 694.568482][T30824] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 694.568502][T30824] ? __list_add_valid+0x28/0x90 [ 694.568513][T30824] do_wp_page+0x5a8/0xba0 [ 694.568566][T30824] handle_mm_fault+0xb31/0x1a70 [ 694.568578][T30824] ? follow_page_mask+0xc2c/0x1040 [ 694.568654][T30824] __get_user_pages+0x947/0xee0 [ 694.568666][T30824] populate_vma_page_range+0xaf/0xc0 [ 694.568678][T30824] mprotect_fixup+0x3a4/0x570 [ 694.568689][T30824] do_mprotect_pkey+0x543/0x6f0 [ 694.568700][T30824] __x64_sys_mprotect+0x44/0x50 [ 694.568710][T30824] do_syscall_64+0x4a/0x90 [ 694.568770][T30824] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 694.568816][T30824] RIP: 0033:0x4665d9 [ 694.568824][T30824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 694.568888][T30824] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf00000, 0x40}, [{}]}, 0x78) 08:04:36 executing program 0 (fault-call:3 fault-nth:5): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000005310000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xa00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1a}]}, 0x78) 08:04:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}]}, 0x78) [ 694.568960][T30824] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 694.568966][T30824] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 694.568973][T30824] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 694.568981][T30824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 694.568992][T30824] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1b}]}, 0x78) 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000003f0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x40}, [{}]}, 0x78) 08:04:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xb00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:36 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000800400000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xc0}]}, 0x78) [ 694.876203][T30862] FAULT_INJECTION: forcing a failure. [ 694.876203][T30862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 694.889587][T30862] CPU: 0 PID: 30862 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 694.889608][T30862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.889618][T30862] Call Trace: [ 694.889626][T30862] dump_stack+0x137/0x19d [ 694.889649][T30862] should_fail+0x23c/0x250 [ 694.889754][T30862] __alloc_pages+0x102/0x320 08:04:36 executing program 0 (fault-call:3 fault-nth:6): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1800000, 0x40}, [{}]}, 0x78) 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000004800000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 694.889822][T30862] alloc_pages_vma+0x391/0x660 [ 694.889837][T30862] ? unlock_page_memcg+0xc3/0xe0 [ 694.889852][T30862] ? page_remove_rmap+0x1de/0x230 [ 694.889871][T30862] wp_page_copy+0x14c/0x10c0 [ 694.945407][T30862] ? release_pages+0x8d0/0x900 [ 694.945512][T30862] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 694.945538][T30862] ? __list_add_valid+0x28/0x90 [ 694.945559][T30862] do_wp_page+0x5a8/0xba0 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001fffffff60000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 694.945579][T30862] handle_mm_fault+0xb31/0x1a70 [ 694.945666][T30862] ? follow_page_mask+0xc2c/0x1040 [ 694.945682][T30862] __get_user_pages+0x947/0xee0 [ 694.945702][T30862] populate_vma_page_range+0xaf/0xc0 [ 694.945782][T30862] mprotect_fixup+0x3a4/0x570 [ 694.945802][T30862] do_mprotect_pkey+0x543/0x6f0 [ 694.945821][T30862] __x64_sys_mprotect+0x44/0x50 [ 694.945835][T30862] do_syscall_64+0x4a/0x90 08:04:36 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xc00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001fffffffe0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 694.945851][T30862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 694.945920][T30862] RIP: 0033:0x4665d9 [ 694.945931][T30862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 694.945944][T30862] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001f6ffffff0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 694.945962][T30862] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 694.945971][T30862] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 694.946019][T30862] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 694.946031][T30862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 694.946043][T30862] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 695.065819][T30875] FAULT_INJECTION: forcing a failure. [ 695.065819][T30875] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:04:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001feffffff0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:36 executing program 0 (fault-call:3 fault-nth:7): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 695.124340][T30875] CPU: 0 PID: 30875 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 695.124365][T30875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.124374][T30875] Call Trace: [ 695.124380][T30875] dump_stack+0x137/0x19d [ 695.124401][T30875] should_fail+0x23c/0x250 [ 695.124416][T30875] __alloc_pages+0x102/0x320 [ 695.124498][T30875] alloc_pages_vma+0x391/0x660 [ 695.124516][T30875] ? unlock_page_memcg+0xc3/0xe0 [ 695.124533][T30875] ? page_remove_rmap+0x1de/0x230 [ 695.124555][T30875] wp_page_copy+0x14c/0x10c0 [ 695.124632][T30875] ? release_pages+0x8d0/0x900 [ 695.124716][T30875] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 695.124806][T30875] ? __list_add_valid+0x28/0x90 [ 695.124821][T30875] do_wp_page+0x5a8/0xba0 [ 695.124839][T30875] handle_mm_fault+0xb31/0x1a70 [ 695.124860][T30875] ? follow_page_mask+0xc2c/0x1040 [ 695.124881][T30875] __get_user_pages+0x947/0xee0 [ 695.124973][T30875] populate_vma_page_range+0xaf/0xc0 [ 695.124989][T30875] mprotect_fixup+0x3a4/0x570 [ 695.125004][T30875] do_mprotect_pkey+0x543/0x6f0 [ 695.125023][T30875] __x64_sys_mprotect+0x44/0x50 [ 695.125072][T30875] do_syscall_64+0x4a/0x90 [ 695.125088][T30875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 695.125111][T30875] RIP: 0033:0x4665d9 [ 695.125122][T30875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 695.125134][T30875] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 695.125245][T30875] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 695.125255][T30875] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:04:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 08:04:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000400000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 695.125264][T30875] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 695.125274][T30875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 695.125283][T30875] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 695.231689][T30893] FAULT_INJECTION: forcing a failure. [ 695.231689][T30893] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 695.362196][T30893] CPU: 0 PID: 30893 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 695.362287][T30893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.362297][T30893] Call Trace: [ 695.362316][T30893] dump_stack+0x137/0x19d [ 695.390221][T30893] should_fail+0x23c/0x250 [ 695.390251][T30893] __alloc_pages+0x102/0x320 [ 695.390267][T30893] alloc_pages_vma+0x391/0x660 [ 695.390351][T30893] ? unlock_page_memcg+0xc3/0xe0 [ 695.390366][T30893] ? page_remove_rmap+0x1de/0x230 [ 695.390387][T30893] wp_page_copy+0x14c/0x10c0 [ 695.390410][T30893] ? release_pages+0x8d0/0x900 [ 695.390424][T30893] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 695.390540][T30893] ? __list_add_valid+0x28/0x90 [ 695.390559][T30893] do_wp_page+0x5a8/0xba0 [ 695.390650][T30893] handle_mm_fault+0xb31/0x1a70 [ 695.390714][T30893] ? follow_page_mask+0xc2c/0x1040 [ 695.390735][T30893] __get_user_pages+0x947/0xee0 [ 695.390756][T30893] populate_vma_page_range+0xaf/0xc0 [ 695.390852][T30893] mprotect_fixup+0x3a4/0x570 [ 695.390899][T30893] do_mprotect_pkey+0x543/0x6f0 [ 695.390918][T30893] __x64_sys_mprotect+0x44/0x50 [ 695.390937][T30893] do_syscall_64+0x4a/0x90 [ 695.390958][T30893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 695.390985][T30893] RIP: 0033:0x4665d9 [ 695.390997][T30893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe0}]}, 0x78) 08:04:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001fffffffffffffffe0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:37 executing program 0 (fault-call:3 fault-nth:8): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}]}, 0x78) 08:04:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xd00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x40}, [{}]}, 0x78) [ 695.391014][T30893] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 695.391034][T30893] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 695.391047][T30893] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 695.391060][T30893] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 695.391071][T30893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 695.391080][T30893] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf0}]}, 0x78) 08:04:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) 08:04:37 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xe00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000200000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x40}, [{}]}, 0x78) 08:04:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf8}]}, 0x78) 08:04:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000300000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 695.722637][T30921] FAULT_INJECTION: forcing a failure. [ 695.722637][T30921] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 695.735957][T30921] CPU: 1 PID: 30921 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 695.744815][T30921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.755253][T30921] Call Trace: [ 695.758534][T30921] dump_stack+0x137/0x19d [ 695.762869][T30921] should_fail+0x23c/0x250 [ 695.767305][T30921] __alloc_pages+0x102/0x320 08:04:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000400000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:37 executing program 0 (fault-call:3 fault-nth:9): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 695.771920][T30921] alloc_pages_vma+0x391/0x660 [ 695.772007][T30921] ? unlock_page_memcg+0xc3/0xe0 [ 695.772024][T30921] ? page_remove_rmap+0x1de/0x230 [ 695.772043][T30921] wp_page_copy+0x14c/0x10c0 [ 695.772064][T30921] ? release_pages+0x8d0/0x900 [ 695.772081][T30921] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 695.802645][T30921] ? __list_add_valid+0x28/0x90 [ 695.802703][T30921] do_wp_page+0x5a8/0xba0 [ 695.802730][T30921] handle_mm_fault+0xb31/0x1a70 [ 695.802819][T30921] ? follow_page_mask+0xc2c/0x1040 08:04:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000500000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 695.802840][T30921] __get_user_pages+0x947/0xee0 [ 695.802858][T30921] populate_vma_page_range+0xaf/0xc0 [ 695.802877][T30921] mprotect_fixup+0x3a4/0x570 [ 695.802898][T30921] do_mprotect_pkey+0x543/0x6f0 [ 695.802918][T30921] __x64_sys_mprotect+0x44/0x50 [ 695.802943][T30921] do_syscall_64+0x4a/0x90 [ 695.802960][T30921] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 695.803013][T30921] RIP: 0033:0x4665d9 [ 695.803031][T30921] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 695.803046][T30921] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 695.803066][T30921] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 695.803079][T30921] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:04:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xfc}]}, 0x78) 08:04:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000600000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 695.803092][T30921] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 695.803105][T30921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 695.803117][T30921] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 695.910042][T30940] FAULT_INJECTION: forcing a failure. [ 695.910042][T30940] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 695.960246][T30940] CPU: 0 PID: 30940 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 08:04:37 executing program 0 (fault-call:3 fault-nth:10): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 695.960272][T30940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.960283][T30940] Call Trace: [ 695.960292][T30940] dump_stack+0x137/0x19d [ 695.960326][T30940] should_fail+0x23c/0x250 [ 695.960425][T30940] __alloc_pages+0x102/0x320 [ 695.960444][T30940] alloc_pages_vma+0x391/0x660 [ 695.960465][T30940] ? unlock_page_memcg+0xc3/0xe0 [ 695.960481][T30940] ? page_remove_rmap+0x1de/0x230 [ 695.960519][T30940] wp_page_copy+0x14c/0x10c0 [ 695.960550][T30940] ? release_pages+0x8d0/0x900 [ 695.960564][T30940] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 695.960585][T30940] ? __list_add_valid+0x28/0x90 [ 695.960664][T30940] do_wp_page+0x5a8/0xba0 [ 695.960718][T30940] handle_mm_fault+0xb31/0x1a70 [ 695.960739][T30940] ? follow_page_mask+0xc2c/0x1040 [ 695.960758][T30940] __get_user_pages+0x947/0xee0 [ 695.960778][T30940] populate_vma_page_range+0xaf/0xc0 [ 695.960795][T30940] mprotect_fixup+0x3a4/0x570 [ 695.960822][T30940] do_mprotect_pkey+0x543/0x6f0 [ 695.960839][T30940] __x64_sys_mprotect+0x44/0x50 [ 695.960858][T30940] do_syscall_64+0x4a/0x90 [ 695.960877][T30940] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 695.960961][T30940] RIP: 0033:0x4665d9 [ 695.960985][T30940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 695.961002][T30940] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 695.961021][T30940] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 695.961034][T30940] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 695.961046][T30940] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 695.961111][T30940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 695.961124][T30940] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 696.062433][T30953] FAULT_INJECTION: forcing a failure. [ 696.062433][T30953] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 696.185311][T30953] CPU: 0 PID: 30953 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 696.185416][T30953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.185436][T30953] Call Trace: [ 696.185443][T30953] dump_stack+0x137/0x19d [ 696.185467][T30953] should_fail+0x23c/0x250 [ 696.185488][T30953] __alloc_pages+0x102/0x320 [ 696.185508][T30953] alloc_pages_vma+0x391/0x660 08:04:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 08:04:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000700000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xf00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 696.226219][T30953] ? unlock_page_memcg+0xc3/0xe0 [ 696.231304][T30953] ? page_remove_rmap+0x1de/0x230 [ 696.236514][T30953] wp_page_copy+0x14c/0x10c0 [ 696.241225][T30953] ? release_pages+0x8d0/0x900 [ 696.246189][T30953] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 696.252012][T30953] ? __list_add_valid+0x28/0x90 [ 696.256883][T30953] do_wp_page+0x5a8/0xba0 [ 696.261224][T30953] handle_mm_fault+0xb31/0x1a70 [ 696.266169][T30953] ? follow_page_mask+0xc2c/0x1040 [ 696.271590][T30953] __get_user_pages+0x947/0xee0 [ 696.276715][T30953] populate_vma_page_range+0xaf/0xc0 [ 696.276793][T30953] mprotect_fixup+0x3a4/0x570 [ 696.276820][T30953] do_mprotect_pkey+0x543/0x6f0 [ 696.276839][T30953] __x64_sys_mprotect+0x44/0x50 [ 696.276857][T30953] do_syscall_64+0x4a/0x90 [ 696.276877][T30953] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 696.276944][T30953] RIP: 0033:0x4665d9 08:04:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x40}, [{}]}, 0x78) 08:04:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000800000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:38 executing program 0 (fault-call:3 fault-nth:11): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x1800, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9bffffff}]}, 0x78) [ 696.276958][T30953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 696.276971][T30953] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 696.277061][T30953] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 696.277070][T30953] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 696.277079][T30953] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:04:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x180}]}, 0x78) 08:04:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x1a00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 696.277088][T30953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 696.277096][T30953] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x9000000, 0x40}, [{}]}, 0x78) 08:04:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x3e8}]}, 0x78) 08:04:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001001000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000}]}, 0x78) 08:04:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x1b00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xa000000, 0x40}, [{}]}, 0x78) 08:04:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x500}]}, 0x78) [ 696.600250][T30998] FAULT_INJECTION: forcing a failure. [ 696.600250][T30998] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 696.614582][T30998] CPU: 1 PID: 30998 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 696.623375][T30998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.633489][T30998] Call Trace: [ 696.636774][T30998] dump_stack+0x137/0x19d [ 696.641372][T30998] should_fail+0x23c/0x250 [ 696.645941][T30998] __alloc_pages+0x102/0x320 [ 696.650647][T30998] alloc_pages_vma+0x391/0x660 [ 696.655683][T30998] ? unlock_page_memcg+0xc3/0xe0 [ 696.660736][T30998] ? page_remove_rmap+0x1de/0x230 [ 696.665891][T30998] wp_page_copy+0x14c/0x10c0 [ 696.670483][T30998] ? release_pages+0x8d0/0x900 [ 696.675378][T30998] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 696.681308][T30998] ? __list_add_valid+0x28/0x90 [ 696.686346][T30998] do_wp_page+0x5a8/0xba0 [ 696.690721][T30998] handle_mm_fault+0xb31/0x1a70 [ 696.695559][T30998] ? follow_page_mask+0xc2c/0x1040 [ 696.700751][T30998] __get_user_pages+0x947/0xee0 [ 696.705710][T30998] populate_vma_page_range+0xaf/0xc0 [ 696.710981][T30998] mprotect_fixup+0x3a4/0x570 [ 696.715656][T30998] do_mprotect_pkey+0x543/0x6f0 [ 696.720597][T30998] __x64_sys_mprotect+0x44/0x50 [ 696.725550][T30998] do_syscall_64+0x4a/0x90 [ 696.730356][T30998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 696.736273][T30998] RIP: 0033:0x4665d9 [ 696.740539][T30998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 696.760541][T30998] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 696.769086][T30998] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 696.777314][T30998] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 696.785598][T30998] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 08:04:38 executing program 0 (fault-call:3 fault-nth:12): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001001100000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xb000000, 0x40}, [{}]}, 0x78) 08:04:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x3f00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000}]}, 0x78) 08:04:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x600}]}, 0x78) [ 696.793689][T30998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 696.801742][T30998] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x40}, [{}]}, 0x78) 08:04:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000}]}, 0x78) 08:04:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x700}]}, 0x78) 08:04:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001001800000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x7f00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x900}]}, 0x78) [ 696.974904][T31028] FAULT_INJECTION: forcing a failure. [ 696.974904][T31028] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 696.988375][T31028] CPU: 1 PID: 31028 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 696.988474][T31028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.988486][T31028] Call Trace: [ 696.988495][T31028] dump_stack+0x137/0x19d [ 696.988577][T31028] should_fail+0x23c/0x250 [ 696.988595][T31028] __alloc_pages+0x102/0x320 [ 696.988614][T31028] alloc_pages_vma+0x391/0x660 [ 696.988633][T31028] ? unlock_page_memcg+0xc3/0xe0 [ 696.988647][T31028] ? page_remove_rmap+0x1de/0x230 [ 696.988666][T31028] wp_page_copy+0x14c/0x10c0 [ 696.988688][T31028] ? release_pages+0x8d0/0x900 [ 696.988760][T31028] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 696.988783][T31028] ? __list_add_valid+0x28/0x90 [ 696.988802][T31028] do_wp_page+0x5a8/0xba0 [ 696.988843][T31028] handle_mm_fault+0xb31/0x1a70 [ 696.988866][T31028] ? follow_page_mask+0xc2c/0x1040 [ 696.988882][T31028] __get_user_pages+0x947/0xee0 [ 696.988899][T31028] populate_vma_page_range+0xaf/0xc0 [ 696.988915][T31028] mprotect_fixup+0x3a4/0x570 [ 696.988932][T31028] do_mprotect_pkey+0x543/0x6f0 [ 696.988952][T31028] __x64_sys_mprotect+0x44/0x50 [ 696.989031][T31028] do_syscall_64+0x4a/0x90 [ 696.989053][T31028] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 696.989105][T31028] RIP: 0033:0x4665d9 08:04:38 executing program 0 (fault-call:3 fault-nth:13): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:38 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf8000000}]}, 0x78) 08:04:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001001c00000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xd000000, 0x40}, [{}]}, 0x78) 08:04:38 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xc000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 696.989180][T31028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 696.989198][T31028] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 696.989218][T31028] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 696.989230][T31028] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 697.163959][T31028] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 08:04:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xa00}]}, 0x78) 08:04:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xe000000, 0x40}, [{}]}, 0x78) 08:04:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001002600000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 697.164053][T31028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 697.164136][T31028] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xe000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000}]}, 0x78) 08:04:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xb00}]}, 0x78) 08:04:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100fe00000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 697.365157][T31061] FAULT_INJECTION: forcing a failure. [ 697.365157][T31061] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 697.365184][T31061] CPU: 1 PID: 31061 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 697.365203][T31061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.365283][T31061] Call Trace: [ 697.365292][T31061] dump_stack+0x137/0x19d [ 697.365315][T31061] should_fail+0x23c/0x250 [ 697.365335][T31061] __alloc_pages+0x102/0x320 [ 697.365354][T31061] alloc_pages_vma+0x391/0x660 [ 697.365374][T31061] ? unlock_page_memcg+0xc3/0xe0 [ 697.365388][T31061] ? page_remove_rmap+0x1de/0x230 [ 697.365406][T31061] wp_page_copy+0x14c/0x10c0 [ 697.435233][T31061] ? release_pages+0x8d0/0x900 [ 697.440122][T31061] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 697.445874][T31061] ? __list_add_valid+0x28/0x90 [ 697.451278][T31061] do_wp_page+0x5a8/0xba0 [ 697.455965][T31061] handle_mm_fault+0xb31/0x1a70 [ 697.460804][T31061] ? follow_page_mask+0xc2c/0x1040 [ 697.466001][T31061] __get_user_pages+0x947/0xee0 [ 697.471041][T31061] populate_vma_page_range+0xaf/0xc0 [ 697.476412][T31061] mprotect_fixup+0x3a4/0x570 [ 697.481073][T31061] do_mprotect_pkey+0x543/0x6f0 [ 697.485982][T31061] __x64_sys_mprotect+0x44/0x50 [ 697.490815][T31061] do_syscall_64+0x4a/0x90 [ 697.495215][T31061] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 697.501087][T31061] RIP: 0033:0x4665d9 [ 697.504959][T31061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 697.524615][T31061] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 697.533101][T31061] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 697.541255][T31061] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 697.549221][T31061] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 697.557176][T31061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:39 executing program 0 (fault-call:3 fault-nth:14): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 08:04:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0x40}, [{}]}, 0x78) 08:04:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xf000, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000402000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xc00}]}, 0x78) [ 697.565222][T31061] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9b}]}, 0x78) 08:04:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xd00}]}, 0x78) 08:04:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x18000000, 0x40}, [{}]}, 0x78) 08:04:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xf800, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000003000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}]}, 0x78) [ 697.756084][T31093] FAULT_INJECTION: forcing a failure. [ 697.756084][T31093] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 697.769393][T31093] CPU: 0 PID: 31093 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 697.769468][T31093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.789530][T31093] Call Trace: [ 697.792812][T31093] dump_stack+0x137/0x19d [ 697.797312][T31093] should_fail+0x23c/0x250 [ 697.801849][T31093] __alloc_pages+0x102/0x320 [ 697.806453][T31093] alloc_pages_vma+0x391/0x660 [ 697.811324][T31093] ? unlock_page_memcg+0xc3/0xe0 [ 697.816292][T31093] ? page_remove_rmap+0x1de/0x230 [ 697.821664][T31093] wp_page_copy+0x14c/0x10c0 [ 697.826246][T31093] ? release_pages+0x8d0/0x900 [ 697.831133][T31093] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 697.836904][T31093] ? __list_add_valid+0x28/0x90 [ 697.841968][T31093] do_wp_page+0x5a8/0xba0 [ 697.846374][T31093] handle_mm_fault+0xb31/0x1a70 [ 697.851250][T31093] ? follow_page_mask+0xc2c/0x1040 [ 697.856450][T31093] __get_user_pages+0x947/0xee0 [ 697.861456][T31093] populate_vma_page_range+0xaf/0xc0 [ 697.867081][T31093] mprotect_fixup+0x3a4/0x570 [ 697.871763][T31093] do_mprotect_pkey+0x543/0x6f0 [ 697.876885][T31093] __x64_sys_mprotect+0x44/0x50 [ 697.881958][T31093] do_syscall_64+0x4a/0x90 [ 697.886381][T31093] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 697.892548][T31093] RIP: 0033:0x4665d9 [ 697.896692][T31093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 697.922043][T31093] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 697.933282][T31093] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 697.943791][T31093] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:04:39 executing program 0 (fault-call:3 fault-nth:15): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xfc00, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1a000000, 0x40}, [{}]}, 0x78) 08:04:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe00}]}, 0x78) 08:04:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000204000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 08:04:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1b000000, 0x40}, [{}]}, 0x78) [ 697.954692][T31093] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 697.966605][T31093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 697.980943][T31093] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 08:04:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf00}]}, 0x78) 08:04:39 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0xffff, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000604000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 698.103958][T31105] FAULT_INJECTION: forcing a failure. [ 698.103958][T31105] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 698.121663][T31105] CPU: 0 PID: 31105 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 08:04:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001008004000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:39 executing program 0 (fault-call:3 fault-nth:16): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 698.136609][T31105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.136720][T31105] Call Trace: [ 698.136729][T31105] dump_stack+0x137/0x19d [ 698.136754][T31105] should_fail+0x23c/0x250 [ 698.136782][T31105] __alloc_pages+0x102/0x320 [ 698.136799][T31105] alloc_pages_vma+0x391/0x660 [ 698.136840][T31105] ? page_remove_rmap+0x1de/0x230 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000005000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 698.136864][T31105] wp_page_copy+0x14c/0x10c0 [ 698.136884][T31105] ? release_pages+0x8d0/0x900 [ 698.136901][T31105] ? __list_add_valid+0x28/0x90 [ 698.136916][T31105] do_wp_page+0x5a8/0xba0 [ 698.136985][T31105] handle_mm_fault+0xb31/0x1a70 [ 698.137006][T31105] ? follow_page_mask+0xc2c/0x1040 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001003105000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000006000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 698.137027][T31105] __get_user_pages+0x947/0xee0 [ 698.137056][T31105] populate_vma_page_range+0xaf/0xc0 [ 698.137124][T31105] mprotect_fixup+0x3a4/0x570 [ 698.137142][T31105] do_mprotect_pkey+0x543/0x6f0 [ 698.137221][T31105] __x64_sys_mprotect+0x44/0x50 [ 698.137236][T31105] do_syscall_64+0x4a/0x90 [ 698.137301][T31105] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 698.137322][T31105] RIP: 0033:0x4665d9 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000406000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 698.137334][T31105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 698.137347][T31105] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 698.137362][T31105] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 698.137373][T31105] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 698.137386][T31105] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000007000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 698.137404][T31105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 698.137497][T31105] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 698.283218][T31127] FAULT_INJECTION: forcing a failure. [ 698.283218][T31127] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 698.384858][T31127] CPU: 0 PID: 31127 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 698.384884][T31127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.384894][T31127] Call Trace: [ 698.384901][T31127] dump_stack+0x137/0x19d [ 698.384927][T31127] should_fail+0x23c/0x250 [ 698.384948][T31127] __alloc_pages+0x102/0x320 [ 698.384968][T31127] alloc_pages_vma+0x391/0x660 [ 698.385016][T31127] ? unlock_page_memcg+0xc3/0xe0 [ 698.385033][T31127] ? page_remove_rmap+0x1de/0x230 [ 698.385051][T31127] wp_page_copy+0x14c/0x10c0 [ 698.385089][T31127] ? release_pages+0x8d0/0x900 [ 698.385103][T31127] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 698.385181][T31127] ? __list_add_valid+0x28/0x90 [ 698.385196][T31127] do_wp_page+0x5a8/0xba0 [ 698.385294][T31127] handle_mm_fault+0xb31/0x1a70 [ 698.385312][T31127] ? follow_page_mask+0xc2c/0x1040 [ 698.385328][T31127] __get_user_pages+0x947/0xee0 [ 698.385455][T31127] populate_vma_page_range+0xaf/0xc0 [ 698.385475][T31127] mprotect_fixup+0x3a4/0x570 [ 698.385526][T31127] do_mprotect_pkey+0x543/0x6f0 [ 698.385612][T31127] __x64_sys_mprotect+0x44/0x50 [ 698.385703][T31127] do_syscall_64+0x4a/0x90 [ 698.385758][T31127] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 698.385779][T31127] RIP: 0033:0x4665d9 [ 698.385792][T31127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 698.385806][T31127] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x40}, [{}]}, 0x78) 08:04:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) 08:04:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1800}]}, 0x78) 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000011000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:40 executing program 0 (fault-call:3 fault-nth:17): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:40 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) [ 698.385821][T31127] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 698.385873][T31127] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 698.385885][T31127] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 698.385928][T31127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 698.385937][T31127] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:40 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x2, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1900}]}, 0x78) 08:04:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x7f000000, 0x40}, [{}]}, 0x78) 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000018000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 08:04:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x80ffffff, 0x40}, [{}]}, 0x78) 08:04:40 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x7, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1a00}]}, 0x78) [ 698.758646][T31171] FAULT_INJECTION: forcing a failure. [ 698.758646][T31171] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 698.771950][T31171] CPU: 0 PID: 31171 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 698.771973][T31171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.771986][T31171] Call Trace: [ 698.772004][T31171] dump_stack+0x137/0x19d [ 698.772033][T31171] should_fail+0x23c/0x250 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100001c000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:40 executing program 0 (fault-call:3 fault-nth:18): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 698.803542][T31171] __alloc_pages+0x102/0x320 [ 698.803567][T31171] alloc_pages_vma+0x391/0x660 [ 698.803586][T31171] ? unlock_page_memcg+0xc3/0xe0 [ 698.803600][T31171] ? page_remove_rmap+0x1de/0x230 [ 698.803622][T31171] wp_page_copy+0x14c/0x10c0 [ 698.803664][T31171] ? release_pages+0x8d0/0x900 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000020000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 698.803677][T31171] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 698.803698][T31171] ? __list_add_valid+0x28/0x90 [ 698.803760][T31171] do_wp_page+0x5a8/0xba0 [ 698.803777][T31171] handle_mm_fault+0xb31/0x1a70 [ 698.803795][T31171] ? follow_page_mask+0xc2c/0x1040 [ 698.803812][T31171] __get_user_pages+0x947/0xee0 [ 698.803903][T31171] populate_vma_page_range+0xaf/0xc0 [ 698.803982][T31171] mprotect_fixup+0x3a4/0x570 [ 698.804067][T31171] do_mprotect_pkey+0x543/0x6f0 [ 698.804109][T31171] __x64_sys_mprotect+0x44/0x50 [ 698.804126][T31171] do_syscall_64+0x4a/0x90 [ 698.804147][T31171] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 698.804166][T31171] RIP: 0033:0x4665d9 [ 698.804179][T31171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 698.804242][T31171] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000026000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:40 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000531000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 698.804258][T31171] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 698.804269][T31171] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 698.804278][T31171] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 698.804288][T31171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 698.804319][T31171] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 698.939980][T31188] FAULT_INJECTION: forcing a failure. 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100003f000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 698.939980][T31188] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.020071][T31188] CPU: 1 PID: 31188 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 699.020094][T31188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.020103][T31188] Call Trace: [ 699.020147][T31188] dump_stack+0x137/0x19d [ 699.020196][T31188] should_fail+0x23c/0x250 [ 699.051370][T31188] __alloc_pages+0x102/0x320 [ 699.051400][T31188] alloc_pages_vma+0x391/0x660 [ 699.051419][T31188] ? unlock_page_memcg+0xc3/0xe0 08:04:40 executing program 0 (fault-call:3 fault-nth:19): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 699.051433][T31188] ? page_remove_rmap+0x1de/0x230 [ 699.051452][T31188] wp_page_copy+0x14c/0x10c0 [ 699.051490][T31188] ? release_pages+0x8d0/0x900 [ 699.051504][T31188] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 699.051545][T31188] ? __list_add_valid+0x28/0x90 [ 699.051566][T31188] do_wp_page+0x5a8/0xba0 [ 699.051587][T31188] handle_mm_fault+0xb31/0x1a70 [ 699.051618][T31188] ? follow_page_mask+0xc2c/0x1040 [ 699.051636][T31188] __get_user_pages+0x947/0xee0 08:04:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000480000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 699.051697][T31188] populate_vma_page_range+0xaf/0xc0 [ 699.051714][T31188] mprotect_fixup+0x3a4/0x570 [ 699.051734][T31188] do_mprotect_pkey+0x543/0x6f0 [ 699.051754][T31188] __x64_sys_mprotect+0x44/0x50 [ 699.051771][T31188] do_syscall_64+0x4a/0x90 [ 699.051792][T31188] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 699.051887][T31188] RIP: 0033:0x4665d9 08:04:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x9bffffff, 0x40}, [{}]}, 0x78) [ 699.051903][T31188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.051920][T31188] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 699.051941][T31188] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 699.051952][T31188] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:04:41 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x8, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 699.051961][T31188] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 699.051976][T31188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 699.051985][T31188] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 699.198285][T31204] FAULT_INJECTION: forcing a failure. [ 699.198285][T31204] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.251179][T31204] CPU: 0 PID: 31204 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 699.251205][T31204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.251216][T31204] Call Trace: [ 699.251224][T31204] dump_stack+0x137/0x19d [ 699.251251][T31204] should_fail+0x23c/0x250 [ 699.282270][T31204] __alloc_pages+0x102/0x320 [ 699.287117][T31204] alloc_pages_vma+0x391/0x660 [ 699.292085][T31204] ? unlock_page_memcg+0xc3/0xe0 [ 699.297025][T31204] ? page_remove_rmap+0x1de/0x230 [ 699.302147][T31204] wp_page_copy+0x14c/0x10c0 [ 699.306737][T31204] ? release_pages+0x8d0/0x900 [ 699.311766][T31204] ? mem_cgroup_update_lru_size+0x53/0xf0 08:04:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1b00}]}, 0x78) 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100fffe000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:41 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x9, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 699.311797][T31204] ? __list_add_valid+0x28/0x90 [ 699.311816][T31204] do_wp_page+0x5a8/0xba0 [ 699.311887][T31204] handle_mm_fault+0xb31/0x1a70 [ 699.331763][T31204] ? follow_page_mask+0xc2c/0x1040 [ 699.331876][T31204] __get_user_pages+0x947/0xee0 [ 699.331893][T31204] populate_vma_page_range+0xaf/0xc0 [ 699.331932][T31204] mprotect_fixup+0x3a4/0x570 [ 699.331952][T31204] do_mprotect_pkey+0x543/0x6f0 [ 699.357045][T31204] __x64_sys_mprotect+0x44/0x50 [ 699.362101][T31204] do_syscall_64+0x4a/0x90 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100feff000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 699.366639][T31204] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 699.372680][T31204] RIP: 0033:0x4665d9 [ 699.376716][T31204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.396447][T31204] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 699.404915][T31204] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 08:04:41 executing program 0 (fault-call:3 fault-nth:20): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 08:04:41 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xa, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xc0000000, 0x40}, [{}]}, 0x78) [ 699.404936][T31204] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 699.404949][T31204] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 699.404960][T31204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 699.404970][T31204] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000040000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x3f00}]}, 0x78) 08:04:41 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xb, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x78) 08:04:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xe0000000, 0x40}, [{}]}, 0x78) 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000080000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x7f00}]}, 0x78) 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001004000080000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 699.593039][T31243] FAULT_INJECTION: forcing a failure. [ 699.593039][T31243] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.606446][T31243] CPU: 1 PID: 31243 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 699.615727][T31243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.625797][T31243] Call Trace: [ 699.625809][T31243] dump_stack+0x137/0x19d [ 699.625835][T31243] should_fail+0x23c/0x250 [ 699.625856][T31243] __alloc_pages+0x102/0x320 08:04:41 executing program 0 (fault-call:3 fault-nth:21): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000100000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 699.625875][T31243] alloc_pages_vma+0x391/0x660 [ 699.625895][T31243] ? unlock_page_memcg+0xc3/0xe0 [ 699.652268][T31243] ? page_remove_rmap+0x1de/0x230 [ 699.652314][T31243] wp_page_copy+0x14c/0x10c0 [ 699.652339][T31243] ? release_pages+0x8d0/0x900 [ 699.652357][T31243] ? mem_cgroup_update_lru_size+0x53/0xf0 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000200000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 699.652431][T31243] ? __list_add_valid+0x28/0x90 [ 699.652447][T31243] do_wp_page+0x5a8/0xba0 [ 699.652472][T31243] handle_mm_fault+0xb31/0x1a70 [ 699.652550][T31243] ? follow_page_mask+0xc2c/0x1040 [ 699.652567][T31243] __get_user_pages+0x947/0xee0 [ 699.652663][T31243] populate_vma_page_range+0xaf/0xc0 [ 699.652689][T31243] mprotect_fixup+0x3a4/0x570 [ 699.652707][T31243] do_mprotect_pkey+0x543/0x6f0 08:04:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf0000000, 0x40}, [{}]}, 0x78) 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000100000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 699.652789][T31243] __x64_sys_mprotect+0x44/0x50 [ 699.652808][T31243] do_syscall_64+0x4a/0x90 [ 699.652830][T31243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 699.652851][T31243] RIP: 0033:0x4665d9 [ 699.652864][T31243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.652880][T31243] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000200000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 699.652896][T31243] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 699.652909][T31243] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 699.652921][T31243] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 699.652956][T31243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 699.652967][T31243] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 699.783393][T31263] FAULT_INJECTION: forcing a failure. [ 699.783393][T31263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 699.863146][T31263] CPU: 1 PID: 31263 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 699.863171][T31263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.863181][T31263] Call Trace: [ 699.863189][T31263] dump_stack+0x137/0x19d [ 699.863214][T31263] should_fail+0x23c/0x250 [ 699.863237][T31263] __alloc_pages+0x102/0x320 [ 699.863253][T31263] alloc_pages_vma+0x391/0x660 [ 699.863273][T31263] ? unlock_page_memcg+0xc3/0xe0 [ 699.863290][T31263] ? page_remove_rmap+0x1de/0x230 [ 699.863371][T31263] wp_page_copy+0x14c/0x10c0 [ 699.863392][T31263] ? release_pages+0x8d0/0x900 [ 699.863408][T31263] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 699.863448][T31263] ? __list_add_valid+0x28/0x90 [ 699.863509][T31263] do_wp_page+0x5a8/0xba0 [ 699.863531][T31263] handle_mm_fault+0xb31/0x1a70 [ 699.863686][T31263] ? follow_page_mask+0xc2c/0x1040 [ 699.863703][T31263] __get_user_pages+0x947/0xee0 [ 699.863721][T31263] populate_vma_page_range+0xaf/0xc0 [ 699.863742][T31263] mprotect_fixup+0x3a4/0x570 [ 699.863760][T31263] do_mprotect_pkey+0x543/0x6f0 [ 699.863776][T31263] __x64_sys_mprotect+0x44/0x50 [ 699.863821][T31263] do_syscall_64+0x4a/0x90 [ 699.863845][T31263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 699.863870][T31263] RIP: 0033:0x4665d9 08:04:41 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xc, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 699.863883][T31263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.863900][T31263] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 699.863986][T31263] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 699.863999][T31263] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 699.864011][T31263] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:04:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}]}, 0x78) 08:04:41 executing program 0 (fault-call:3 fault-nth:22): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000040200000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf8000000, 0x40}, [{}]}, 0x78) 08:04:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xc000}]}, 0x78) [ 699.864023][T31263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 699.864036][T31263] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe000}]}, 0x78) 08:04:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xfc000000, 0x40}, [{}]}, 0x78) 08:04:41 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xd, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}]}, 0x78) 08:04:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000300000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}]}, 0x78) 08:04:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000400000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 700.220578][T31299] FAULT_INJECTION: forcing a failure. [ 700.220578][T31299] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 700.234257][T31299] CPU: 0 PID: 31299 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 700.243283][T31299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.253921][T31299] Call Trace: [ 700.253932][T31299] dump_stack+0x137/0x19d 08:04:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000500000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:42 executing program 0 (fault-call:3 fault-nth:23): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 700.254033][T31299] should_fail+0x23c/0x250 [ 700.254054][T31299] __alloc_pages+0x102/0x320 [ 700.254073][T31299] alloc_pages_vma+0x391/0x660 [ 700.254100][T31299] ? unlock_page_memcg+0xc3/0xe0 [ 700.254116][T31299] ? page_remove_rmap+0x1de/0x230 [ 700.254135][T31299] wp_page_copy+0x14c/0x10c0 08:04:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000600000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 700.254158][T31299] ? release_pages+0x8d0/0x900 [ 700.254238][T31299] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 700.254260][T31299] ? __list_add_valid+0x28/0x90 [ 700.254276][T31299] do_wp_page+0x5a8/0xba0 [ 700.254314][T31299] handle_mm_fault+0xb31/0x1a70 [ 700.254330][T31299] ? follow_page_mask+0xc2c/0x1040 [ 700.254346][T31299] __get_user_pages+0x947/0xee0 08:04:42 executing program 0 (fault-call:3 fault-nth:24): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000040600000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 700.254361][T31299] populate_vma_page_range+0xaf/0xc0 [ 700.254452][T31299] mprotect_fixup+0x3a4/0x570 [ 700.254469][T31299] do_mprotect_pkey+0x543/0x6f0 [ 700.254486][T31299] __x64_sys_mprotect+0x44/0x50 [ 700.254503][T31299] do_syscall_64+0x4a/0x90 [ 700.254522][T31299] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 700.254623][T31299] RIP: 0033:0x4665d9 [ 700.254634][T31299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.254656][T31299] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 700.254674][T31299] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 700.254722][T31299] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 700.254734][T31299] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 700.254747][T31299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 700.254757][T31299] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 700.359646][T31312] FAULT_INJECTION: forcing a failure. [ 700.359646][T31312] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 700.359716][T31312] CPU: 1 PID: 31312 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 700.359736][T31312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.359745][T31312] Call Trace: [ 700.359751][T31312] dump_stack+0x137/0x19d [ 700.359770][T31312] should_fail+0x23c/0x250 [ 700.359785][T31312] __alloc_pages+0x102/0x320 [ 700.359815][T31312] alloc_pages_vma+0x391/0x660 [ 700.359833][T31312] ? unlock_page_memcg+0xc3/0xe0 [ 700.359847][T31312] ? page_remove_rmap+0x1de/0x230 [ 700.359889][T31312] wp_page_copy+0x14c/0x10c0 [ 700.359911][T31312] ? release_pages+0x8d0/0x900 [ 700.359933][T31312] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 700.359955][T31312] ? __list_add_valid+0x28/0x90 [ 700.359981][T31312] do_wp_page+0x5a8/0xba0 [ 700.359997][T31312] handle_mm_fault+0xb31/0x1a70 [ 700.360016][T31312] ? follow_page_mask+0xc2c/0x1040 [ 700.360032][T31312] __get_user_pages+0x947/0xee0 [ 700.360051][T31312] populate_vma_page_range+0xaf/0xc0 [ 700.360127][T31312] mprotect_fixup+0x3a4/0x570 [ 700.360197][T31312] do_mprotect_pkey+0x543/0x6f0 [ 700.360213][T31312] __x64_sys_mprotect+0x44/0x50 [ 700.360232][T31312] do_syscall_64+0x4a/0x90 [ 700.360253][T31312] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 700.360308][T31312] RIP: 0033:0x4665d9 [ 700.360369][T31312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.360385][T31312] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 700.360403][T31312] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 700.360412][T31312] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 700.360421][T31312] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 700.360430][T31312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 700.360438][T31312] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 700.453523][T31319] FAULT_INJECTION: forcing a failure. [ 700.453523][T31319] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 700.714193][T31319] CPU: 0 PID: 31319 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 08:04:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe803}]}, 0x78) [ 700.723108][T31319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.723122][T31319] Call Trace: [ 700.723128][T31319] dump_stack+0x137/0x19d [ 700.723152][T31319] should_fail+0x23c/0x250 [ 700.723170][T31319] __alloc_pages+0x102/0x320 [ 700.750586][T31319] alloc_pages_vma+0x391/0x660 [ 700.755356][T31319] ? unlock_page_memcg+0xc3/0xe0 [ 700.760400][T31319] ? page_remove_rmap+0x1de/0x230 [ 700.765924][T31319] wp_page_copy+0x14c/0x10c0 08:04:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xffffff80, 0x40}, [{}]}, 0x78) [ 700.770752][T31319] ? release_pages+0x8d0/0x900 [ 700.775537][T31319] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 700.781348][T31319] ? __list_add_valid+0x28/0x90 [ 700.786224][T31319] do_wp_page+0x5a8/0xba0 [ 700.790560][T31319] handle_mm_fault+0xb31/0x1a70 [ 700.795571][T31319] ? follow_page_mask+0xc2c/0x1040 [ 700.795643][T31319] __get_user_pages+0x947/0xee0 [ 700.795662][T31319] populate_vma_page_range+0xaf/0xc0 [ 700.795683][T31319] mprotect_fixup+0x3a4/0x570 [ 700.816099][T31319] do_mprotect_pkey+0x543/0x6f0 08:04:42 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xe, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000700000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x78) [ 700.821084][T31319] __x64_sys_mprotect+0x44/0x50 [ 700.821105][T31319] do_syscall_64+0x4a/0x90 [ 700.821127][T31319] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 700.836948][T31319] RIP: 0033:0x4665d9 [ 700.836965][T31319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.836979][T31319] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf000}]}, 0x78) 08:04:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xffffff9b, 0x40}, [{}]}, 0x78) 08:04:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}]}, 0x78) 08:04:42 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xf, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf800}]}, 0x78) [ 700.836994][T31319] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 700.837005][T31319] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 700.886214][T31319] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 700.895247][T31319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 700.903277][T31319] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:42 executing program 0 (fault-call:3 fault-nth:25): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000800000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x40}, [{}]}, 0x78) 08:04:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000}]}, 0x78) 08:04:42 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x18, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xfc00}]}, 0x78) 08:04:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000, 0x40}, [{}]}, 0x78) 08:04:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001100000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:42 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x1a, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf00000}]}, 0x78) 08:04:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000}]}, 0x78) 08:04:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x40}, [{}]}, 0x78) [ 701.199758][T31384] FAULT_INJECTION: forcing a failure. [ 701.199758][T31384] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 701.213780][T31384] CPU: 0 PID: 31384 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 701.223598][T31384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.233900][T31384] Call Trace: [ 701.237365][T31384] dump_stack+0x137/0x19d [ 701.241790][T31384] should_fail+0x23c/0x250 [ 701.246212][T31384] __alloc_pages+0x102/0x320 [ 701.250880][T31384] alloc_pages_vma+0x391/0x660 [ 701.255773][T31384] ? unlock_page_memcg+0xc3/0xe0 [ 701.260709][T31384] ? page_remove_rmap+0x1de/0x230 [ 701.265736][T31384] wp_page_copy+0x14c/0x10c0 [ 701.270638][T31384] ? release_pages+0x8d0/0x900 [ 701.275533][T31384] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 701.281481][T31384] ? __list_add_valid+0x28/0x90 [ 701.286547][T31384] do_wp_page+0x5a8/0xba0 [ 701.290884][T31384] handle_mm_fault+0xb31/0x1a70 [ 701.295854][T31384] ? follow_page_mask+0xc2c/0x1040 [ 701.300975][T31384] __get_user_pages+0x947/0xee0 [ 701.305910][T31384] populate_vma_page_range+0xaf/0xc0 [ 701.311484][T31384] mprotect_fixup+0x3a4/0x570 [ 701.316156][T31384] do_mprotect_pkey+0x543/0x6f0 [ 701.321114][T31384] __x64_sys_mprotect+0x44/0x50 [ 701.325951][T31384] do_syscall_64+0x4a/0x90 [ 701.330382][T31384] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 701.336947][T31384] RIP: 0033:0x4665d9 [ 701.341149][T31384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.361952][T31384] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 701.370854][T31384] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 701.379204][T31384] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 701.387293][T31384] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 08:04:43 executing program 0 (fault-call:3 fault-nth:26): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001800000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:43 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x1b, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1000000}]}, 0x78) 08:04:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000}]}, 0x78) 08:04:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x180000000000000, 0x40}, [{}]}, 0x78) 08:04:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x40}, [{}]}, 0x78) [ 701.395548][T31384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.404341][T31384] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:43 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xc0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x78) 08:04:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1800000}]}, 0x78) 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001c00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x40}, [{}]}, 0x78) 08:04:43 executing program 0 (fault-call:3 fault-nth:27): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:43 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xe0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x2000000}]}, 0x78) 08:04:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000}]}, 0x78) 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000002600000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 701.576933][T31410] FAULT_INJECTION: forcing a failure. [ 701.576933][T31410] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 701.590538][T31410] CPU: 0 PID: 31410 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 701.599486][T31410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.599499][T31410] Call Trace: [ 701.599507][T31410] dump_stack+0x137/0x19d [ 701.599531][T31410] should_fail+0x23c/0x250 [ 701.599590][T31410] __alloc_pages+0x102/0x320 [ 701.599607][T31410] alloc_pages_vma+0x391/0x660 [ 701.599624][T31410] ? unlock_page_memcg+0xc3/0xe0 [ 701.599641][T31410] ? page_remove_rmap+0x1de/0x230 [ 701.599670][T31410] wp_page_copy+0x14c/0x10c0 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000053100000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000003f00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 701.599733][T31410] ? release_pages+0x8d0/0x900 [ 701.599753][T31410] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 701.599774][T31410] ? __list_add_valid+0x28/0x90 [ 701.599864][T31410] do_wp_page+0x5a8/0xba0 [ 701.599884][T31410] handle_mm_fault+0xb31/0x1a70 [ 701.599906][T31410] ? follow_page_mask+0xc2c/0x1040 [ 701.599963][T31410] __get_user_pages+0x947/0xee0 [ 701.599984][T31410] populate_vma_page_range+0xaf/0xc0 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000008004000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 701.600005][T31410] mprotect_fixup+0x3a4/0x570 [ 701.600057][T31410] do_mprotect_pkey+0x543/0x6f0 [ 701.600076][T31410] __x64_sys_mprotect+0x44/0x50 [ 701.600175][T31410] do_syscall_64+0x4a/0x90 [ 701.600196][T31410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 701.600218][T31410] RIP: 0033:0x4665d9 [ 701.600231][T31410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000048000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100fffffff600000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 701.600244][T31410] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 701.600259][T31410] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 701.600328][T31410] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 701.600337][T31410] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.600346][T31410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.600354][T31410] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:43 executing program 0 (fault-call:3 fault-nth:28): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 701.719430][T31425] FAULT_INJECTION: forcing a failure. [ 701.719430][T31425] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 701.839519][T31425] CPU: 0 PID: 31425 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 701.839541][T31425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.839550][T31425] Call Trace: 08:04:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x40}, [{}]}, 0x78) 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100fffffffe00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 701.839558][T31425] dump_stack+0x137/0x19d [ 701.839613][T31425] should_fail+0x23c/0x250 [ 701.839635][T31425] __alloc_pages+0x102/0x320 [ 701.839692][T31425] alloc_pages_vma+0x391/0x660 [ 701.839706][T31425] ? unlock_page_memcg+0xc3/0xe0 [ 701.839718][T31425] ? page_remove_rmap+0x1de/0x230 [ 701.839734][T31425] wp_page_copy+0x14c/0x10c0 [ 701.839755][T31425] ? release_pages+0x8d0/0x900 [ 701.839846][T31425] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 701.839865][T31425] ? __list_add_valid+0x28/0x90 [ 701.839879][T31425] do_wp_page+0x5a8/0xba0 [ 701.839897][T31425] handle_mm_fault+0xb31/0x1a70 [ 701.839997][T31425] ? follow_page_mask+0xc2c/0x1040 [ 701.840012][T31425] __get_user_pages+0x947/0xee0 [ 701.840089][T31425] populate_vma_page_range+0xaf/0xc0 [ 701.840112][T31425] mprotect_fixup+0x3a4/0x570 [ 701.840130][T31425] do_mprotect_pkey+0x543/0x6f0 [ 701.840164][T31425] __x64_sys_mprotect+0x44/0x50 [ 701.840255][T31425] do_syscall_64+0x4a/0x90 [ 701.840278][T31425] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 701.840303][T31425] RIP: 0033:0x4665d9 [ 701.840318][T31425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 701.840334][T31425] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 701.840354][T31425] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 701.840364][T31425] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 701.840373][T31425] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 701.840444][T31425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 701.840458][T31425] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 701.930326][T31444] FAULT_INJECTION: forcing a failure. [ 701.930326][T31444] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 702.071443][T31444] CPU: 1 PID: 31444 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 08:04:43 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xf0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100f6ffffff00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}]}, 0x78) 08:04:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x5000000}]}, 0x78) [ 702.071468][T31444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.071479][T31444] Call Trace: [ 702.071489][T31444] dump_stack+0x137/0x19d [ 702.071517][T31444] should_fail+0x23c/0x250 [ 702.102516][T31444] __alloc_pages+0x102/0x320 [ 702.107218][T31444] alloc_pages_vma+0x391/0x660 [ 702.107247][T31444] ? unlock_page_memcg+0xc3/0xe0 [ 702.107263][T31444] ? page_remove_rmap+0x1de/0x230 [ 702.122511][T31444] wp_page_copy+0x14c/0x10c0 08:04:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100feffffff00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:43 executing program 0 (fault-call:3 fault-nth:29): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 702.127421][T31444] ? release_pages+0x8d0/0x900 [ 702.127449][T31444] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 702.127475][T31444] ? __list_add_valid+0x28/0x90 [ 702.127493][T31444] do_wp_page+0x5a8/0xba0 [ 702.127512][T31444] handle_mm_fault+0xb31/0x1a70 [ 702.152650][T31444] ? follow_page_mask+0xc2c/0x1040 [ 702.152678][T31444] __get_user_pages+0x947/0xee0 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000002000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 702.152695][T31444] populate_vma_page_range+0xaf/0xc0 [ 702.152746][T31444] mprotect_fixup+0x3a4/0x570 [ 702.152769][T31444] do_mprotect_pkey+0x543/0x6f0 [ 702.152860][T31444] __x64_sys_mprotect+0x44/0x50 [ 702.152881][T31444] do_syscall_64+0x4a/0x90 08:04:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x900000000000000, 0x40}, [{}]}, 0x78) [ 702.152904][T31444] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 702.152925][T31444] RIP: 0033:0x4665d9 [ 702.152967][T31444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 702.152983][T31444] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 702.153003][T31444] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000003000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 702.153013][T31444] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 702.153022][T31444] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 702.153031][T31444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 702.153095][T31444] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 702.302763][T31465] FAULT_INJECTION: forcing a failure. [ 702.302763][T31465] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:04:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x6000000}]}, 0x78) [ 702.337249][T31465] CPU: 0 PID: 31465 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 702.337275][T31465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.337286][T31465] Call Trace: [ 702.337293][T31465] dump_stack+0x137/0x19d [ 702.337320][T31465] should_fail+0x23c/0x250 [ 702.369338][T31465] __alloc_pages+0x102/0x320 [ 702.369365][T31465] alloc_pages_vma+0x391/0x660 [ 702.369386][T31465] ? unlock_page_memcg+0xc3/0xe0 [ 702.369404][T31465] ? page_remove_rmap+0x1de/0x230 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000004000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:44 executing program 0 (fault-call:3 fault-nth:30): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 702.369433][T31465] wp_page_copy+0x14c/0x10c0 [ 702.369464][T31465] ? release_pages+0x8d0/0x900 [ 702.369539][T31465] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 702.404256][T31465] ? __list_add_valid+0x28/0x90 [ 702.404288][T31465] do_wp_page+0x5a8/0xba0 [ 702.404327][T31465] handle_mm_fault+0xb31/0x1a70 [ 702.404364][T31465] ? follow_page_mask+0xc2c/0x1040 [ 702.404448][T31465] __get_user_pages+0x947/0xee0 [ 702.404468][T31465] populate_vma_page_range+0xaf/0xc0 [ 702.404548][T31465] mprotect_fixup+0x3a4/0x570 [ 702.404566][T31465] do_mprotect_pkey+0x543/0x6f0 [ 702.404581][T31465] __x64_sys_mprotect+0x44/0x50 [ 702.404598][T31465] do_syscall_64+0x4a/0x90 [ 702.404693][T31465] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 702.404771][T31465] RIP: 0033:0x4665d9 [ 702.404855][T31465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 702.404872][T31465] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 702.404891][T31465] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 702.404903][T31465] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 702.404915][T31465] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 702.404926][T31465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 702.404938][T31465] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xf8, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000005000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}]}, 0x78) [ 702.531846][T31481] FAULT_INJECTION: forcing a failure. [ 702.531846][T31481] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 702.561443][T31481] CPU: 1 PID: 31481 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 702.570210][T31481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.580275][T31481] Call Trace: [ 702.580289][T31481] dump_stack+0x137/0x19d [ 702.580318][T31481] should_fail+0x23c/0x250 [ 702.580336][T31481] __alloc_pages+0x102/0x320 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000006000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:44 executing program 0 (fault-call:3 fault-nth:31): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 702.580361][T31481] alloc_pages_vma+0x391/0x660 [ 702.602415][T31481] ? unlock_page_memcg+0xc3/0xe0 [ 702.607380][T31481] ? page_remove_rmap+0x1de/0x230 [ 702.607413][T31481] wp_page_copy+0x14c/0x10c0 [ 702.607438][T31481] ? release_pages+0x8d0/0x900 [ 702.607455][T31481] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 702.607519][T31481] ? __list_add_valid+0x28/0x90 [ 702.632604][T31481] do_wp_page+0x5a8/0xba0 [ 702.632696][T31481] handle_mm_fault+0xb31/0x1a70 [ 702.632723][T31481] ? follow_page_mask+0xc2c/0x1040 [ 702.632744][T31481] __get_user_pages+0x947/0xee0 [ 702.632765][T31481] populate_vma_page_range+0xaf/0xc0 [ 702.632792][T31481] mprotect_fixup+0x3a4/0x570 [ 702.632869][T31481] do_mprotect_pkey+0x543/0x6f0 [ 702.632885][T31481] __x64_sys_mprotect+0x44/0x50 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000007000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000, 0x40}, [{}]}, 0x78) [ 702.632900][T31481] do_syscall_64+0x4a/0x90 [ 702.632918][T31481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 702.632943][T31481] RIP: 0033:0x4665d9 [ 702.632958][T31481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 702.633037][T31481] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000008000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 702.633054][T31481] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 702.633063][T31481] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 702.633074][T31481] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 702.633087][T31481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 702.633099][T31481] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 702.743628][T31492] FAULT_INJECTION: forcing a failure. [ 702.743628][T31492] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000010000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x7000000}]}, 0x78) [ 702.805484][T31492] CPU: 0 PID: 31492 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 702.805510][T31492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.805521][T31492] Call Trace: [ 702.805529][T31492] dump_stack+0x137/0x19d [ 702.805574][T31492] should_fail+0x23c/0x250 [ 702.805592][T31492] __alloc_pages+0x102/0x320 [ 702.805609][T31492] alloc_pages_vma+0x391/0x660 [ 702.805625][T31492] ? unlock_page_memcg+0xc3/0xe0 [ 702.805638][T31492] ? page_remove_rmap+0x1de/0x230 08:04:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xfc, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 702.856844][T31492] wp_page_copy+0x14c/0x10c0 [ 702.856879][T31492] ? release_pages+0x8d0/0x900 [ 702.856947][T31492] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 702.872051][T31492] ? __list_add_valid+0x28/0x90 [ 702.872078][T31492] do_wp_page+0x5a8/0xba0 [ 702.872174][T31492] handle_mm_fault+0xb31/0x1a70 [ 702.872278][T31492] ? follow_page_mask+0xc2c/0x1040 [ 702.872299][T31492] __get_user_pages+0x947/0xee0 [ 702.872319][T31492] populate_vma_page_range+0xaf/0xc0 [ 702.872428][T31492] mprotect_fixup+0x3a4/0x570 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000011000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 702.906438][T31492] do_mprotect_pkey+0x543/0x6f0 [ 702.906470][T31492] __x64_sys_mprotect+0x44/0x50 [ 702.906514][T31492] do_syscall_64+0x4a/0x90 [ 702.906534][T31492] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 702.906557][T31492] RIP: 0033:0x4665d9 [ 702.906571][T31492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000018000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x180, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000, 0x40}, [{}]}, 0x78) 08:04:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9bffffff00000000}]}, 0x78) [ 702.906585][T31492] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 702.906604][T31492] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 702.906614][T31492] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 702.906623][T31492] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 702.906633][T31492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 702.990678][T31492] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x8000000}]}, 0x78) 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100001c000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:44 executing program 0 (fault-call:3 fault-nth:32): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x700, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000000000}]}, 0x78) 08:04:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x40}, [{}]}, 0x78) 08:04:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x9000000}]}, 0x78) 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000026000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:44 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x900, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000, 0x40}, [{}]}, 0x78) 08:04:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000}]}, 0x78) 08:04:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000fe000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xa000000}]}, 0x78) 08:04:45 executing program 0 (fault-call:3 fault-nth:33): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000000000000}]}, 0x78) 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000004020000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xa00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000, 0x40}, [{}]}, 0x78) [ 703.251264][T31553] FAULT_INJECTION: forcing a failure. [ 703.251264][T31553] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 703.264841][T31553] CPU: 0 PID: 31553 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 703.273808][T31553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.284132][T31553] Call Trace: [ 703.284145][T31553] dump_stack+0x137/0x19d 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000030000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 703.284245][T31553] should_fail+0x23c/0x250 [ 703.284268][T31553] __alloc_pages+0x102/0x320 [ 703.284294][T31553] alloc_pages_vma+0x391/0x660 [ 703.284315][T31553] ? unlock_page_memcg+0xc3/0xe0 [ 703.284331][T31553] ? page_remove_rmap+0x1de/0x230 [ 703.284350][T31553] wp_page_copy+0x14c/0x10c0 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000002040000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 703.284375][T31553] ? release_pages+0x8d0/0x900 [ 703.284441][T31553] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 703.284468][T31553] ? __list_add_valid+0x28/0x90 [ 703.284483][T31553] do_wp_page+0x5a8/0xba0 [ 703.284500][T31553] handle_mm_fault+0xb31/0x1a70 [ 703.284539][T31553] ? follow_page_mask+0xc2c/0x1040 [ 703.284555][T31553] __get_user_pages+0x947/0xee0 [ 703.284571][T31553] populate_vma_page_range+0xaf/0xc0 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000006040000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000080040000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 703.284661][T31553] mprotect_fixup+0x3a4/0x570 [ 703.284676][T31553] do_mprotect_pkey+0x543/0x6f0 [ 703.284693][T31553] __x64_sys_mprotect+0x44/0x50 [ 703.284791][T31553] do_syscall_64+0x4a/0x90 [ 703.284812][T31553] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 703.284840][T31553] RIP: 0033:0x4665d9 [ 703.284855][T31553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000050000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 703.284871][T31553] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 703.284891][T31553] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 703.284901][T31553] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 703.284912][T31553] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 703.284933][T31553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 703.284945][T31553] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000031050000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 703.404864][T31568] FAULT_INJECTION: forcing a failure. [ 703.404864][T31568] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 703.515696][T31568] CPU: 0 PID: 31568 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 703.515725][T31568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.515737][T31568] Call Trace: [ 703.515746][T31568] dump_stack+0x137/0x19d [ 703.515816][T31568] should_fail+0x23c/0x250 [ 703.515837][T31568] __alloc_pages+0x102/0x320 [ 703.515852][T31568] alloc_pages_vma+0x391/0x660 [ 703.515869][T31568] ? unlock_page_memcg+0xc3/0xe0 [ 703.515886][T31568] ? page_remove_rmap+0x1de/0x230 [ 703.515908][T31568] wp_page_copy+0x14c/0x10c0 [ 703.515953][T31568] ? release_pages+0x8d0/0x900 [ 703.515971][T31568] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 703.515995][T31568] ? __list_add_valid+0x28/0x90 [ 703.516011][T31568] do_wp_page+0x5a8/0xba0 [ 703.516051][T31568] handle_mm_fault+0xb31/0x1a70 [ 703.516073][T31568] ? follow_page_mask+0xc2c/0x1040 [ 703.516125][T31568] __get_user_pages+0x947/0xee0 [ 703.516145][T31568] populate_vma_page_range+0xaf/0xc0 [ 703.516166][T31568] mprotect_fixup+0x3a4/0x570 [ 703.516186][T31568] do_mprotect_pkey+0x543/0x6f0 [ 703.516202][T31568] __x64_sys_mprotect+0x44/0x50 [ 703.516269][T31568] do_syscall_64+0x4a/0x90 [ 703.516294][T31568] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 703.516316][T31568] RIP: 0033:0x4665d9 [ 703.516328][T31568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 703.516347][T31568] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 703.516368][T31568] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 703.516381][T31568] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:04:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xb000000}]}, 0x78) 08:04:45 executing program 0 (fault-call:3 fault-nth:34): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000060000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000, 0x40}, [{}]}, 0x78) 08:04:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xb00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf800000000000000}]}, 0x78) [ 703.516394][T31568] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 703.516452][T31568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 703.516539][T31568] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000}]}, 0x78) 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000004060000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000, 0x40}, [{}]}, 0x78) 08:04:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xc000000}]}, 0x78) 08:04:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xc00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}]}, 0x78) 08:04:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000, 0x40}, [{}]}, 0x78) [ 703.934564][T31624] FAULT_INJECTION: forcing a failure. [ 703.934564][T31624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 703.947888][T31624] CPU: 1 PID: 31624 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 703.956756][T31624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.966937][T31624] Call Trace: [ 703.970255][T31624] dump_stack+0x137/0x19d [ 703.974762][T31624] should_fail+0x23c/0x250 [ 703.979190][T31624] __alloc_pages+0x102/0x320 [ 703.983787][T31624] alloc_pages_vma+0x391/0x660 [ 703.988656][T31624] ? unlock_page_memcg+0xc3/0xe0 [ 703.993706][T31624] ? page_remove_rmap+0x1de/0x230 [ 703.998745][T31624] wp_page_copy+0x14c/0x10c0 [ 704.003605][T31624] ? release_pages+0x8d0/0x900 [ 704.008372][T31624] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 704.014085][T31624] ? __list_add_valid+0x28/0x90 [ 704.018945][T31624] do_wp_page+0x5a8/0xba0 [ 704.023428][T31624] handle_mm_fault+0xb31/0x1a70 [ 704.028285][T31624] ? follow_page_mask+0xc2c/0x1040 [ 704.033445][T31624] __get_user_pages+0x947/0xee0 [ 704.038913][T31624] populate_vma_page_range+0xaf/0xc0 [ 704.044369][T31624] mprotect_fixup+0x3a4/0x570 [ 704.049532][T31624] do_mprotect_pkey+0x543/0x6f0 [ 704.054393][T31624] __x64_sys_mprotect+0x44/0x50 [ 704.059483][T31624] do_syscall_64+0x4a/0x90 [ 704.063899][T31624] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 704.069988][T31624] RIP: 0033:0x4665d9 08:04:45 executing program 0 (fault-call:3 fault-nth:35): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000070000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xd000000}]}, 0x78) 08:04:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000, 0x40}, [{}]}, 0x78) 08:04:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xd00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}]}, 0x78) [ 704.073876][T31624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.093795][T31624] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 704.102202][T31624] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 704.110190][T31624] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 704.118369][T31624] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.126340][T31624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 704.134510][T31624] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x40}, [{}]}, 0x78) 08:04:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe000000}]}, 0x78) 08:04:45 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x78) 08:04:45 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xe00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000110000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000180000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 704.259684][T31639] FAULT_INJECTION: forcing a failure. [ 704.259684][T31639] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 704.272966][T31639] CPU: 1 PID: 31639 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 704.281754][T31639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.292008][T31639] Call Trace: [ 704.292020][T31639] dump_stack+0x137/0x19d 08:04:46 executing program 0 (fault-call:3 fault-nth:36): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 704.292095][T31639] should_fail+0x23c/0x250 [ 704.292177][T31639] __alloc_pages+0x102/0x320 [ 704.292193][T31639] alloc_pages_vma+0x391/0x660 [ 704.292210][T31639] ? unlock_page_memcg+0xc3/0xe0 [ 704.292224][T31639] ? page_remove_rmap+0x1de/0x230 [ 704.292244][T31639] wp_page_copy+0x14c/0x10c0 [ 704.292266][T31639] ? release_pages+0x8d0/0x900 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000001c0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000200000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 704.292282][T31639] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 704.292316][T31639] ? __list_add_valid+0x28/0x90 [ 704.292334][T31639] do_wp_page+0x5a8/0xba0 [ 704.292427][T31639] handle_mm_fault+0xb31/0x1a70 [ 704.292447][T31639] ? follow_page_mask+0xc2c/0x1040 [ 704.292466][T31639] __get_user_pages+0x947/0xee0 [ 704.292540][T31639] populate_vma_page_range+0xaf/0xc0 [ 704.292556][T31639] mprotect_fixup+0x3a4/0x570 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000260000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 704.292629][T31639] do_mprotect_pkey+0x543/0x6f0 [ 704.292647][T31639] __x64_sys_mprotect+0x44/0x50 [ 704.292664][T31639] do_syscall_64+0x4a/0x90 [ 704.292691][T31639] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 704.292734][T31639] RIP: 0033:0x4665d9 [ 704.292750][T31639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.292767][T31639] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000005310000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000003f0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 704.292786][T31639] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 704.292795][T31639] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 704.292804][T31639] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 704.292816][T31639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 704.292828][T31639] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 704.401652][T31655] FAULT_INJECTION: forcing a failure. [ 704.401652][T31655] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 704.515501][T31655] CPU: 1 PID: 31655 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 704.515526][T31655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.515539][T31655] Call Trace: [ 704.515547][T31655] dump_stack+0x137/0x19d [ 704.515573][T31655] should_fail+0x23c/0x250 [ 704.515593][T31655] __alloc_pages+0x102/0x320 [ 704.515613][T31655] alloc_pages_vma+0x391/0x660 [ 704.515630][T31655] ? unlock_page_memcg+0xc3/0xe0 [ 704.515691][T31655] ? page_remove_rmap+0x1de/0x230 [ 704.515713][T31655] wp_page_copy+0x14c/0x10c0 [ 704.515736][T31655] ? release_pages+0x8d0/0x900 [ 704.515757][T31655] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 704.515840][T31655] ? __list_add_valid+0x28/0x90 [ 704.515901][T31655] do_wp_page+0x5a8/0xba0 [ 704.515923][T31655] handle_mm_fault+0xb31/0x1a70 [ 704.516000][T31655] ? follow_page_mask+0xc2c/0x1040 [ 704.516016][T31655] __get_user_pages+0x947/0xee0 [ 704.516035][T31655] populate_vma_page_range+0xaf/0xc0 [ 704.516056][T31655] mprotect_fixup+0x3a4/0x570 [ 704.516126][T31655] do_mprotect_pkey+0x543/0x6f0 [ 704.516194][T31655] __x64_sys_mprotect+0x44/0x50 [ 704.516209][T31655] do_syscall_64+0x4a/0x90 [ 704.516226][T31655] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 704.516244][T31655] RIP: 0033:0x4665d9 08:04:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000, 0x40}, [{}]}, 0x78) [ 704.516258][T31655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 704.516274][T31655] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 704.516289][T31655] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 704.516299][T31655] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 704.516370][T31655] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:04:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf000000}]}, 0x78) 08:04:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}]}, 0x78) 08:04:46 executing program 0 (fault-call:3 fault-nth:37): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000004800000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:46 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xf00, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 704.516381][T31655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 704.516391][T31655] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x18000000}]}, 0x78) 08:04:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x40}, [{}]}, 0x78) 08:04:46 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x1800, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x78) 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000fffe0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x19000000}]}, 0x78) 08:04:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000, 0x40}, [{}]}, 0x78) 08:04:46 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x1a00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}, 0x78) [ 704.939785][T31710] FAULT_INJECTION: forcing a failure. [ 704.939785][T31710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 704.953241][T31710] CPU: 1 PID: 31710 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 704.953263][T31710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.953340][T31710] Call Trace: [ 704.953349][T31710] dump_stack+0x137/0x19d [ 704.953376][T31710] should_fail+0x23c/0x250 [ 704.984360][T31710] __alloc_pages+0x102/0x320 [ 704.984391][T31710] alloc_pages_vma+0x391/0x660 [ 704.984408][T31710] ? unlock_page_memcg+0xc3/0xe0 [ 704.984424][T31710] ? page_remove_rmap+0x1de/0x230 [ 704.984442][T31710] wp_page_copy+0x14c/0x10c0 [ 704.984463][T31710] ? release_pages+0x8d0/0x900 [ 704.984479][T31710] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 705.019712][T31710] ? __list_add_valid+0x28/0x90 [ 705.019744][T31710] do_wp_page+0x5a8/0xba0 [ 705.019772][T31710] handle_mm_fault+0xb31/0x1a70 [ 705.019795][T31710] ? follow_page_mask+0xc2c/0x1040 [ 705.039362][T31710] __get_user_pages+0x947/0xee0 [ 705.044227][T31710] populate_vma_page_range+0xaf/0xc0 [ 705.049656][T31710] mprotect_fixup+0x3a4/0x570 [ 705.054339][T31710] do_mprotect_pkey+0x543/0x6f0 [ 705.059179][T31710] __x64_sys_mprotect+0x44/0x50 [ 705.064092][T31710] do_syscall_64+0x4a/0x90 [ 705.068494][T31710] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 705.074391][T31710] RIP: 0033:0x4665d9 08:04:46 executing program 0 (fault-call:3 fault-nth:38): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000feff0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:46 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x1b00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1a000000}]}, 0x78) 08:04:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x9bffffff00000000, 0x40}, [{}]}, 0x78) 08:04:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}, 0x78) [ 705.078307][T31710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.098428][T31710] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 705.107001][T31710] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 705.115232][T31710] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 705.123467][T31710] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.131488][T31710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1b000000}]}, 0x78) 08:04:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000400000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 705.139586][T31710] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}]}, 0x78) 08:04:46 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x3f00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xc000000000000000, 0x40}, [{}]}, 0x78) 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000800000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:47 executing program 0 (fault-call:3 fault-nth:39): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x3f000000}]}, 0x78) 08:04:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}]}, 0x78) 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000040000800000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 705.320697][T31739] FAULT_INJECTION: forcing a failure. [ 705.320697][T31739] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 705.333971][T31739] CPU: 1 PID: 31739 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 705.333998][T31739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.334032][T31739] Call Trace: [ 705.334041][T31739] dump_stack+0x137/0x19d [ 705.334068][T31739] should_fail+0x23c/0x250 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 705.334169][T31739] __alloc_pages+0x102/0x320 [ 705.334190][T31739] alloc_pages_vma+0x391/0x660 [ 705.334212][T31739] ? unlock_page_memcg+0xc3/0xe0 [ 705.334230][T31739] ? page_remove_rmap+0x1de/0x230 [ 705.334251][T31739] wp_page_copy+0x14c/0x10c0 [ 705.334274][T31739] ? release_pages+0x8d0/0x900 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000002000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 705.334289][T31739] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 705.334362][T31739] ? __list_add_valid+0x28/0x90 [ 705.334379][T31739] do_wp_page+0x5a8/0xba0 [ 705.334399][T31739] handle_mm_fault+0xb31/0x1a70 [ 705.334421][T31739] ? follow_page_mask+0xc2c/0x1040 [ 705.334442][T31739] __get_user_pages+0x947/0xee0 [ 705.334520][T31739] populate_vma_page_range+0xaf/0xc0 [ 705.334539][T31739] mprotect_fixup+0x3a4/0x570 [ 705.334624][T31739] do_mprotect_pkey+0x543/0x6f0 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000001000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000002000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 705.334649][T31739] __x64_sys_mprotect+0x44/0x50 [ 705.334669][T31739] do_syscall_64+0x4a/0x90 [ 705.334691][T31739] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 705.334718][T31739] RIP: 0033:0x4665d9 [ 705.334730][T31739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.334758][T31739] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000402000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 705.334776][T31739] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 705.334788][T31739] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 705.334799][T31739] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.334812][T31739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 705.334872][T31739] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 705.461855][T31753] FAULT_INJECTION: forcing a failure. [ 705.461855][T31753] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 705.573181][T31753] CPU: 1 PID: 31753 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 705.573234][T31753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.573244][T31753] Call Trace: [ 705.573251][T31753] dump_stack+0x137/0x19d [ 705.573278][T31753] should_fail+0x23c/0x250 [ 705.573297][T31753] __alloc_pages+0x102/0x320 [ 705.573315][T31753] alloc_pages_vma+0x391/0x660 [ 705.573333][T31753] ? unlock_page_memcg+0xc3/0xe0 [ 705.573350][T31753] ? page_remove_rmap+0x1de/0x230 [ 705.573426][T31753] wp_page_copy+0x14c/0x10c0 [ 705.573448][T31753] ? release_pages+0x8d0/0x900 [ 705.573465][T31753] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 705.573489][T31753] ? __list_add_valid+0x28/0x90 [ 705.573570][T31753] do_wp_page+0x5a8/0xba0 [ 705.573591][T31753] handle_mm_fault+0xb31/0x1a70 [ 705.573613][T31753] ? follow_page_mask+0xc2c/0x1040 [ 705.573631][T31753] __get_user_pages+0x947/0xee0 [ 705.573648][T31753] populate_vma_page_range+0xaf/0xc0 [ 705.573669][T31753] mprotect_fixup+0x3a4/0x570 [ 705.573687][T31753] do_mprotect_pkey+0x543/0x6f0 [ 705.573703][T31753] __x64_sys_mprotect+0x44/0x50 [ 705.573761][T31753] do_syscall_64+0x4a/0x90 [ 705.573781][T31753] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 705.573883][T31753] RIP: 0033:0x4665d9 [ 705.573898][T31753] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 705.573912][T31753] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 705.573927][T31753] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 705.573936][T31753] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 705.573945][T31753] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:04:47 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x7f00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000, 0x40}, [{}]}, 0x78) 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000003000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:47 executing program 0 (fault-call:3 fault-nth:40): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}]}, 0x78) 08:04:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x7f000000}]}, 0x78) [ 705.573957][T31753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 705.573970][T31753] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:47 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xc000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x78) 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000004000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x80ffffff}]}, 0x78) 08:04:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf000000000000000, 0x40}, [{}]}, 0x78) 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000005000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:47 executing program 0 (fault-call:3 fault-nth:41): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 705.926858][T31793] FAULT_INJECTION: forcing a failure. [ 705.926858][T31793] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 705.940330][T31793] CPU: 0 PID: 31793 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 705.949229][T31793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.949247][T31793] Call Trace: [ 705.949256][T31793] dump_stack+0x137/0x19d [ 705.949288][T31793] should_fail+0x23c/0x250 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000006000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 705.949310][T31793] __alloc_pages+0x102/0x320 [ 705.949354][T31793] alloc_pages_vma+0x391/0x660 [ 705.949372][T31793] ? unlock_page_memcg+0xc3/0xe0 [ 705.949386][T31793] ? page_remove_rmap+0x1de/0x230 [ 705.949407][T31793] wp_page_copy+0x14c/0x10c0 [ 705.949446][T31793] ? release_pages+0x8d0/0x900 [ 705.949468][T31793] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 705.949496][T31793] ? __list_add_valid+0x28/0x90 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000406000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:47 executing program 0 (fault-call:3 fault-nth:42): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 705.949516][T31793] do_wp_page+0x5a8/0xba0 [ 705.949540][T31793] handle_mm_fault+0xb31/0x1a70 [ 705.949601][T31793] ? follow_page_mask+0xc2c/0x1040 [ 705.949624][T31793] __get_user_pages+0x947/0xee0 [ 705.949652][T31793] populate_vma_page_range+0xaf/0xc0 [ 705.949677][T31793] mprotect_fixup+0x3a4/0x570 [ 705.949709][T31793] do_mprotect_pkey+0x543/0x6f0 08:04:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000007000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 705.949730][T31793] __x64_sys_mprotect+0x44/0x50 [ 705.949752][T31793] do_syscall_64+0x4a/0x90 [ 705.949840][T31793] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 705.949920][T31793] RIP: 0033:0x4665d9 [ 705.949935][T31793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:47 executing program 0 (fault-call:3 fault-nth:43): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 705.949952][T31793] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 705.949972][T31793] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 705.949984][T31793] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 705.949996][T31793] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 705.950014][T31793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 705.950027][T31793] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 706.068266][T31805] FAULT_INJECTION: forcing a failure. [ 706.068266][T31805] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 706.068361][T31805] CPU: 0 PID: 31805 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 706.068381][T31805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.068392][T31805] Call Trace: [ 706.068400][T31805] dump_stack+0x137/0x19d [ 706.068429][T31805] should_fail+0x23c/0x250 [ 706.068449][T31805] __alloc_pages+0x102/0x320 [ 706.068500][T31805] alloc_pages_vma+0x391/0x660 [ 706.068517][T31805] ? unlock_page_memcg+0xc3/0xe0 [ 706.068530][T31805] ? page_remove_rmap+0x1de/0x230 [ 706.068550][T31805] wp_page_copy+0x14c/0x10c0 [ 706.068617][T31805] ? release_pages+0x8d0/0x900 [ 706.068632][T31805] do_wp_page+0x5a8/0xba0 [ 706.068652][T31805] handle_mm_fault+0xb31/0x1a70 [ 706.068670][T31805] ? follow_page_mask+0xc2c/0x1040 [ 706.068718][T31805] __get_user_pages+0x947/0xee0 [ 706.068739][T31805] populate_vma_page_range+0xaf/0xc0 [ 706.068760][T31805] mprotect_fixup+0x3a4/0x570 [ 706.068779][T31805] do_mprotect_pkey+0x543/0x6f0 [ 706.068806][T31805] __x64_sys_mprotect+0x44/0x50 [ 706.068821][T31805] do_syscall_64+0x4a/0x90 [ 706.068839][T31805] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 706.068862][T31805] RIP: 0033:0x4665d9 [ 706.068877][T31805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.068934][T31805] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 706.068954][T31805] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 706.068965][T31805] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 706.068974][T31805] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 706.068982][T31805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 706.068991][T31805] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 706.152435][T31812] FAULT_INJECTION: forcing a failure. [ 706.152435][T31812] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 706.152460][T31812] CPU: 1 PID: 31812 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 706.152476][T31812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.152484][T31812] Call Trace: [ 706.152492][T31812] dump_stack+0x137/0x19d [ 706.152581][T31812] should_fail+0x23c/0x250 [ 706.152600][T31812] __alloc_pages+0x102/0x320 [ 706.152618][T31812] alloc_pages_vma+0x391/0x660 [ 706.152693][T31812] ? unlock_page_memcg+0xc3/0xe0 [ 706.152710][T31812] ? page_remove_rmap+0x1de/0x230 [ 706.152732][T31812] wp_page_copy+0x14c/0x10c0 [ 706.152754][T31812] ? release_pages+0x8d0/0x900 [ 706.152775][T31812] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 706.152862][T31812] ? __list_add_valid+0x28/0x90 [ 706.152879][T31812] do_wp_page+0x5a8/0xba0 [ 706.152936][T31812] handle_mm_fault+0xb31/0x1a70 [ 706.153001][T31812] ? follow_page_mask+0xc2c/0x1040 [ 706.153021][T31812] __get_user_pages+0x947/0xee0 [ 706.153040][T31812] populate_vma_page_range+0xaf/0xc0 [ 706.153057][T31812] mprotect_fixup+0x3a4/0x570 [ 706.153129][T31812] do_mprotect_pkey+0x543/0x6f0 [ 706.153147][T31812] __x64_sys_mprotect+0x44/0x50 [ 706.153163][T31812] do_syscall_64+0x4a/0x90 [ 706.153185][T31812] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 706.153280][T31812] RIP: 0033:0x4665d9 [ 706.153293][T31812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.153308][T31812] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 706.153325][T31812] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 706.153334][T31812] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 706.153344][T31812] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:04:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xe000, 0x0, 0x0, 0x40}, [{}]}, 0x78) [ 706.153352][T31812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 706.153377][T31812] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 706.253383][T31817] FAULT_INJECTION: forcing a failure. [ 706.253383][T31817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 706.623299][T31817] CPU: 0 PID: 31817 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 706.632079][T31817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.632095][T31817] Call Trace: [ 706.632103][T31817] dump_stack+0x137/0x19d [ 706.632157][T31817] should_fail+0x23c/0x250 [ 706.654544][T31817] __alloc_pages+0x102/0x320 [ 706.654633][T31817] alloc_pages_vma+0x391/0x660 [ 706.654695][T31817] ? unlock_page_memcg+0xc3/0xe0 [ 706.654709][T31817] ? page_remove_rmap+0x1de/0x230 [ 706.654729][T31817] wp_page_copy+0x14c/0x10c0 [ 706.654808][T31817] ? release_pages+0x8d0/0x900 [ 706.654897][T31817] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 706.654973][T31817] ? __list_add_valid+0x28/0x90 [ 706.654991][T31817] do_wp_page+0x5a8/0xba0 [ 706.655009][T31817] handle_mm_fault+0xb31/0x1a70 [ 706.655027][T31817] ? follow_page_mask+0xc2c/0x1040 [ 706.655063][T31817] __get_user_pages+0x947/0xee0 [ 706.655147][T31817] populate_vma_page_range+0xaf/0xc0 [ 706.655199][T31817] mprotect_fixup+0x3a4/0x570 [ 706.655218][T31817] do_mprotect_pkey+0x543/0x6f0 [ 706.655236][T31817] __x64_sys_mprotect+0x44/0x50 [ 706.735780][T31817] do_syscall_64+0x4a/0x90 08:04:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}]}, 0x78) 08:04:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000008000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x9bffffff}]}, 0x78) [ 706.735812][T31817] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 706.735834][T31817] RIP: 0033:0x4665d9 [ 706.735848][T31817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 706.735864][T31817] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 706.735894][T31817] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 706.735907][T31817] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:04:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xf800000000000000, 0x40}, [{}]}, 0x78) 08:04:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xf000, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xc0000000}]}, 0x78) 08:04:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}]}, 0x78) 08:04:48 executing program 0 (fault-call:3 fault-nth:44): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000011000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 706.794272][T31817] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 706.794291][T31817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 706.794301][T31817] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xf800, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a}]}, 0x78) 08:04:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000018000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe0000000}]}, 0x78) 08:04:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000, 0x40}, [{}]}, 0x78) [ 706.942996][T31841] FAULT_INJECTION: forcing a failure. [ 706.942996][T31841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 706.956562][T31841] CPU: 1 PID: 31841 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 706.965577][T31841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.965595][T31841] Call Trace: [ 706.965605][T31841] dump_stack+0x137/0x19d [ 706.965663][T31841] should_fail+0x23c/0x250 [ 706.965684][T31841] __alloc_pages+0x102/0x320 [ 706.965703][T31841] alloc_pages_vma+0x391/0x660 [ 706.965721][T31841] ? unlock_page_memcg+0xc3/0xe0 [ 706.965737][T31841] ? page_remove_rmap+0x1de/0x230 [ 706.965761][T31841] wp_page_copy+0x14c/0x10c0 [ 707.011882][T31841] ? release_pages+0x8d0/0x900 [ 707.016665][T31841] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 707.022494][T31841] ? __list_add_valid+0x28/0x90 [ 707.027455][T31841] do_wp_page+0x5a8/0xba0 [ 707.031879][T31841] handle_mm_fault+0xb31/0x1a70 [ 707.037047][T31841] ? follow_page_mask+0xc2c/0x1040 08:04:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000001c000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.042274][T31841] __get_user_pages+0x947/0xee0 [ 707.042302][T31841] populate_vma_page_range+0xaf/0xc0 [ 707.042325][T31841] mprotect_fixup+0x3a4/0x570 [ 707.042348][T31841] do_mprotect_pkey+0x543/0x6f0 [ 707.042368][T31841] __x64_sys_mprotect+0x44/0x50 [ 707.042388][T31841] do_syscall_64+0x4a/0x90 [ 707.042448][T31841] entry_SYSCALL_64_after_hwframe+0x44/0xae 08:04:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000026000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:48 executing program 0 (fault-call:3 fault-nth:45): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 707.042470][T31841] RIP: 0033:0x4665d9 [ 707.042483][T31841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.042497][T31841] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000531000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}]}, 0x78) 08:04:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe8030000}]}, 0x78) 08:04:48 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xfc00, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000003f000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x40}, [{}]}, 0x78) [ 707.042513][T31841] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 707.042526][T31841] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 707.042538][T31841] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.042549][T31841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.042590][T31841] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:49 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0xffff, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}]}, 0x78) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000080040000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.272709][T31880] FAULT_INJECTION: forcing a failure. [ 707.272709][T31880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 707.286717][T31880] CPU: 1 PID: 31880 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 707.286740][T31880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:04:49 executing program 0 (fault-call:3 fault-nth:46): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000480000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.286750][T31880] Call Trace: [ 707.286759][T31880] dump_stack+0x137/0x19d [ 707.286781][T31880] should_fail+0x23c/0x250 [ 707.286798][T31880] __alloc_pages+0x102/0x320 [ 707.286827][T31880] alloc_pages_vma+0x391/0x660 [ 707.286846][T31880] ? unlock_page_memcg+0xc3/0xe0 [ 707.286864][T31880] ? page_remove_rmap+0x1de/0x230 [ 707.286889][T31880] wp_page_copy+0x14c/0x10c0 [ 707.286965][T31880] ? release_pages+0x8d0/0x900 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000fffffff6000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000fffffffe000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.286982][T31880] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 707.287005][T31880] ? __list_add_valid+0x28/0x90 [ 707.287027][T31880] do_wp_page+0x5a8/0xba0 [ 707.287157][T31880] handle_mm_fault+0xb31/0x1a70 [ 707.287176][T31880] ? follow_page_mask+0xc2c/0x1040 [ 707.287225][T31880] __get_user_pages+0x947/0xee0 [ 707.287246][T31880] populate_vma_page_range+0xaf/0xc0 [ 707.287396][T31880] mprotect_fixup+0x3a4/0x570 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000f6ffffff000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.287410][T31880] do_mprotect_pkey+0x543/0x6f0 [ 707.287428][T31880] __x64_sys_mprotect+0x44/0x50 [ 707.287502][T31880] do_syscall_64+0x4a/0x90 [ 707.287542][T31880] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 707.287561][T31880] RIP: 0033:0x4665d9 [ 707.287591][T31880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.287606][T31880] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:49 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf0000000}]}, 0x78) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000feffffff000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.287625][T31880] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 707.287636][T31880] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 707.287647][T31880] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.287657][T31880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.287669][T31880] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 707.418214][T31893] FAULT_INJECTION: forcing a failure. [ 707.418214][T31893] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 707.532691][T31893] CPU: 0 PID: 31893 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 707.541605][T31893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.541621][T31893] Call Trace: [ 707.541630][T31893] dump_stack+0x137/0x19d [ 707.541658][T31893] should_fail+0x23c/0x250 [ 707.541679][T31893] __alloc_pages+0x102/0x320 [ 707.541698][T31893] alloc_pages_vma+0x391/0x660 [ 707.573186][T31893] ? unlock_page_memcg+0xc3/0xe0 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000020000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.573268][T31893] ? page_remove_rmap+0x1de/0x230 [ 707.573289][T31893] wp_page_copy+0x14c/0x10c0 [ 707.573314][T31893] ? release_pages+0x8d0/0x900 [ 707.573336][T31893] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 707.573357][T31893] ? __list_add_valid+0x28/0x90 [ 707.573373][T31893] do_wp_page+0x5a8/0xba0 [ 707.573391][T31893] handle_mm_fault+0xb31/0x1a70 [ 707.573435][T31893] ? follow_page_mask+0xc2c/0x1040 [ 707.573455][T31893] __get_user_pages+0x947/0xee0 [ 707.573472][T31893] populate_vma_page_range+0xaf/0xc0 [ 707.573490][T31893] mprotect_fixup+0x3a4/0x570 [ 707.573510][T31893] do_mprotect_pkey+0x543/0x6f0 [ 707.573532][T31893] __x64_sys_mprotect+0x44/0x50 [ 707.573551][T31893] do_syscall_64+0x4a/0x90 [ 707.573569][T31893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 707.573670][T31893] RIP: 0033:0x4665d9 08:04:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x40}, [{}]}, 0x78) 08:04:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0}]}, 0x78) 08:04:49 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:04:49 executing program 0 (fault-call:3 fault-nth:47): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000030000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.573682][T31893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.573696][T31893] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 707.573715][T31893] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 707.573727][T31893] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 707.573738][T31893] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.573748][T31893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:49 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf8000000}]}, 0x78) [ 707.573757][T31893] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:49 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x2, 0x0, 0x40}, [{}]}, 0x78) 08:04:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}]}, 0x78) 08:04:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [{}]}, 0x78) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000040000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:49 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xfc000000}]}, 0x78) 08:04:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [{}]}, 0x78) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000050000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:49 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x7, 0x0, 0x40}, [{}]}, 0x78) 08:04:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8}]}, 0x78) 08:04:49 executing program 0 (fault-call:3 fault-nth:48): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:49 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xffffff80}]}, 0x78) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000060000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.940652][T31947] FAULT_INJECTION: forcing a failure. [ 707.940652][T31947] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 707.954113][T31947] CPU: 1 PID: 31947 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 707.954138][T31947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.954150][T31947] Call Trace: [ 707.954158][T31947] dump_stack+0x137/0x19d 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000070000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.954214][T31947] should_fail+0x23c/0x250 [ 707.954234][T31947] __alloc_pages+0x102/0x320 [ 707.954254][T31947] alloc_pages_vma+0x391/0x660 [ 707.954275][T31947] ? unlock_page_memcg+0xc3/0xe0 [ 707.954351][T31947] ? page_remove_rmap+0x1de/0x230 [ 707.954447][T31947] wp_page_copy+0x14c/0x10c0 [ 707.954472][T31947] ? release_pages+0x8d0/0x900 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000080000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.954492][T31947] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 707.954511][T31947] ? __list_add_valid+0x28/0x90 [ 707.954550][T31947] do_wp_page+0x5a8/0xba0 [ 707.954567][T31947] handle_mm_fault+0xb31/0x1a70 [ 707.954586][T31947] ? follow_page_mask+0xc2c/0x1040 [ 707.954660][T31947] __get_user_pages+0x947/0xee0 [ 707.954678][T31947] populate_vma_page_range+0xaf/0xc0 [ 707.954694][T31947] mprotect_fixup+0x3a4/0x570 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000100000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000110000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 707.954712][T31947] do_mprotect_pkey+0x543/0x6f0 [ 707.954731][T31947] __x64_sys_mprotect+0x44/0x50 [ 707.954783][T31947] do_syscall_64+0x4a/0x90 [ 707.954803][T31947] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 707.954857][T31947] RIP: 0033:0x4665d9 [ 707.954886][T31947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.954919][T31947] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}]}, 0x78) [ 707.954937][T31947] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 707.954947][T31947] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 707.954959][T31947] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.954970][T31947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.954979][T31947] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 708.069812][T31958] FAULT_INJECTION: forcing a failure. [ 708.069812][T31958] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 708.195820][T31958] CPU: 0 PID: 31958 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 708.204593][T31958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.214762][T31958] Call Trace: [ 708.218043][T31958] dump_stack+0x137/0x19d [ 708.222423][T31958] should_fail+0x23c/0x250 [ 708.226838][T31958] __alloc_pages+0x102/0x320 [ 708.231432][T31958] alloc_pages_vma+0x391/0x660 [ 708.231457][T31958] ? unlock_page_memcg+0xc3/0xe0 08:04:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, [{}]}, 0x78) 08:04:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000180000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 708.231474][T31958] ? page_remove_rmap+0x1de/0x230 [ 708.231496][T31958] wp_page_copy+0x14c/0x10c0 [ 708.231522][T31958] ? release_pages+0x8d0/0x900 [ 708.256613][T31958] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 708.256653][T31958] ? __list_add_valid+0x28/0x90 [ 708.256675][T31958] do_wp_page+0x5a8/0xba0 [ 708.256709][T31958] handle_mm_fault+0xb31/0x1a70 [ 708.276416][T31958] ? follow_page_mask+0xc2c/0x1040 [ 708.281585][T31958] __get_user_pages+0x947/0xee0 [ 708.286470][T31958] populate_vma_page_range+0xaf/0xc0 [ 708.291831][T31958] mprotect_fixup+0x3a4/0x570 [ 708.296670][T31958] do_mprotect_pkey+0x543/0x6f0 [ 708.301612][T31958] __x64_sys_mprotect+0x44/0x50 [ 708.306687][T31958] do_syscall_64+0x4a/0x90 [ 708.306713][T31958] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 708.306743][T31958] RIP: 0033:0x4665d9 [ 708.306757][T31958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x8, 0x0, 0x40}, [{}]}, 0x78) 08:04:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180}]}, 0x78) [ 708.306772][T31958] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 708.306802][T31958] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 708.306812][T31958] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 708.306821][T31958] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.306831][T31958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 708.306843][T31958] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:50 executing program 0 (fault-call:3 fault-nth:49): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000001c0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xffffff9b}]}, 0x78) 08:04:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, [{}]}, 0x78) 08:04:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x78) 08:04:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x9, 0x0, 0x40}, [{}]}, 0x78) 08:04:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xa, 0x0, 0x40}, [{}]}, 0x78) 08:04:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x10000000000}]}, 0x78) 08:04:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b}, [{}]}, 0x78) 08:04:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}]}, 0x78) 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000260000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf0000000000000}]}, 0x78) [ 708.609626][T32011] FAULT_INJECTION: forcing a failure. [ 708.609626][T32011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 708.622961][T32011] CPU: 1 PID: 32011 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 708.631723][T32011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.641838][T32011] Call Trace: [ 708.645125][T32011] dump_stack+0x137/0x19d [ 708.649685][T32011] should_fail+0x23c/0x250 [ 708.649705][T32011] __alloc_pages+0x102/0x320 [ 708.649718][T32011] alloc_pages_vma+0x391/0x660 [ 708.649732][T32011] ? unlock_page_memcg+0xc3/0xe0 [ 708.649742][T32011] ? page_remove_rmap+0x1de/0x230 [ 708.649756][T32011] wp_page_copy+0x14c/0x10c0 [ 708.649800][T32011] ? release_pages+0x8d0/0x900 [ 708.649811][T32011] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 708.649825][T32011] ? __list_add_valid+0x28/0x90 [ 708.649935][T32011] do_wp_page+0x5a8/0xba0 [ 708.649948][T32011] handle_mm_fault+0xb31/0x1a70 [ 708.649960][T32011] ? follow_page_mask+0xc2c/0x1040 [ 708.649973][T32011] __get_user_pages+0x947/0xee0 [ 708.649986][T32011] populate_vma_page_range+0xaf/0xc0 [ 708.650054][T32011] mprotect_fixup+0x3a4/0x570 [ 708.650089][T32011] do_mprotect_pkey+0x543/0x6f0 [ 708.650109][T32011] __x64_sys_mprotect+0x44/0x50 [ 708.650194][T32011] do_syscall_64+0x4a/0x90 [ 708.650245][T32011] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 708.743388][T32011] RIP: 0033:0x4665d9 08:04:50 executing program 0 (fault-call:3 fault-nth:50): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, [{}]}, 0x78) 08:04:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xb, 0x0, 0x40}, [{}]}, 0x78) 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000fe0000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x78) 08:04:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x100000000000000}]}, 0x78) [ 708.743415][T32011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.743432][T32011] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 708.775886][T32011] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 708.784210][T32011] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 708.792189][T32011] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.800236][T32011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xc, 0x0, 0x40}, [{}]}, 0x78) 08:04:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}]}, 0x78) [ 708.808208][T32011] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000040200000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xd, 0x0, 0x40}, [{}]}, 0x78) 08:04:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x180000000000000}]}, 0x78) 08:04:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0}, [{}]}, 0x78) 08:04:50 executing program 0 (fault-call:3 fault-nth:51): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}]}, 0x78) 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000300000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 708.975588][T32044] FAULT_INJECTION: forcing a failure. [ 708.975588][T32044] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 708.989174][T32044] CPU: 1 PID: 32044 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 708.989197][T32044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.989254][T32044] Call Trace: [ 708.989263][T32044] dump_stack+0x137/0x19d 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000020400000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 708.989293][T32044] should_fail+0x23c/0x250 [ 708.989314][T32044] __alloc_pages+0x102/0x320 [ 708.989333][T32044] alloc_pages_vma+0x391/0x660 [ 708.989372][T32044] ? unlock_page_memcg+0xc3/0xe0 [ 708.989390][T32044] ? page_remove_rmap+0x1de/0x230 [ 708.989414][T32044] wp_page_copy+0x14c/0x10c0 [ 708.989440][T32044] ? release_pages+0x8d0/0x900 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000060400000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000800400000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 708.989461][T32044] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 708.989542][T32044] ? __list_add_valid+0x28/0x90 [ 708.989561][T32044] do_wp_page+0x5a8/0xba0 [ 708.989583][T32044] handle_mm_fault+0xb31/0x1a70 [ 708.989605][T32044] ? follow_page_mask+0xc2c/0x1040 [ 708.989701][T32044] __get_user_pages+0x947/0xee0 [ 708.989731][T32044] populate_vma_page_range+0xaf/0xc0 [ 708.989823][T32044] mprotect_fixup+0x3a4/0x570 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000500000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000310500000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 708.989847][T32044] do_mprotect_pkey+0x543/0x6f0 [ 708.989865][T32044] __x64_sys_mprotect+0x44/0x50 [ 708.989882][T32044] do_syscall_64+0x4a/0x90 [ 708.989901][T32044] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 708.989922][T32044] RIP: 0033:0x4665d9 [ 708.989938][T32044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000600000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 708.990024][T32044] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 708.990044][T32044] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 708.990054][T32044] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 708.990064][T32044] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.990073][T32044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 708.990082][T32044] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 709.099470][T32054] FAULT_INJECTION: forcing a failure. [ 709.099470][T32054] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 709.230824][T32054] CPU: 1 PID: 32054 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 709.230852][T32054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.230863][T32054] Call Trace: [ 709.230870][T32054] dump_stack+0x137/0x19d [ 709.230894][T32054] should_fail+0x23c/0x250 [ 709.230917][T32054] __alloc_pages+0x102/0x320 [ 709.230935][T32054] alloc_pages_vma+0x391/0x660 [ 709.230955][T32054] ? unlock_page_memcg+0xc3/0xe0 [ 709.230992][T32054] ? page_remove_rmap+0x1de/0x230 [ 709.231082][T32054] wp_page_copy+0x14c/0x10c0 [ 709.231104][T32054] ? release_pages+0x8d0/0x900 [ 709.231135][T32054] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 709.231154][T32054] ? __list_add_valid+0x28/0x90 [ 709.231217][T32054] do_wp_page+0x5a8/0xba0 [ 709.231283][T32054] handle_mm_fault+0xb31/0x1a70 [ 709.231301][T32054] ? follow_page_mask+0xc2c/0x1040 [ 709.231395][T32054] __get_user_pages+0x947/0xee0 [ 709.231515][T32054] populate_vma_page_range+0xaf/0xc0 [ 709.231607][T32054] mprotect_fixup+0x3a4/0x570 [ 709.231675][T32054] do_mprotect_pkey+0x543/0x6f0 [ 709.231694][T32054] __x64_sys_mprotect+0x44/0x50 [ 709.231711][T32054] do_syscall_64+0x4a/0x90 [ 709.231781][T32054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 709.231802][T32054] RIP: 0033:0x4665d9 08:04:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xe, 0x0, 0x40}, [{}]}, 0x78) [ 709.231815][T32054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 709.231829][T32054] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 709.231846][T32054] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 709.231856][T32054] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 709.231867][T32054] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:04:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x200000000000000}]}, 0x78) 08:04:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}, [{}]}, 0x78) 08:04:51 executing program 0 (fault-call:3 fault-nth:52): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000040600000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}]}, 0x78) [ 709.231878][T32054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 709.231891][T32054] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf, 0x0, 0x40}, [{}]}, 0x78) 08:04:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x78) 08:04:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x500000000000000}]}, 0x78) 08:04:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8}, [{}]}, 0x78) 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000700000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x18, 0x0, 0x40}, [{}]}, 0x78) 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001100000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x600000000000000}]}, 0x78) 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001800000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 709.596960][T32100] FAULT_INJECTION: forcing a failure. [ 709.596960][T32100] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 709.610987][T32100] CPU: 1 PID: 32100 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 709.611010][T32100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:04:51 executing program 0 (fault-call:3 fault-nth:53): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001c00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 709.611020][T32100] Call Trace: [ 709.611029][T32100] dump_stack+0x137/0x19d [ 709.611058][T32100] should_fail+0x23c/0x250 [ 709.611083][T32100] __alloc_pages+0x102/0x320 [ 709.611102][T32100] alloc_pages_vma+0x391/0x660 [ 709.611123][T32100] ? unlock_page_memcg+0xc3/0xe0 [ 709.611141][T32100] ? page_remove_rmap+0x1de/0x230 [ 709.611168][T32100] wp_page_copy+0x14c/0x10c0 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000002000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 709.611254][T32100] ? release_pages+0x8d0/0x900 [ 709.611271][T32100] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 709.611454][T32100] ? __list_add_valid+0x28/0x90 [ 709.611497][T32100] do_wp_page+0x5a8/0xba0 [ 709.611540][T32100] handle_mm_fault+0xb31/0x1a70 [ 709.611564][T32100] ? follow_page_mask+0xc2c/0x1040 [ 709.611587][T32100] __get_user_pages+0x947/0xee0 [ 709.611609][T32100] populate_vma_page_range+0xaf/0xc0 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000002600000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 709.611677][T32100] mprotect_fixup+0x3a4/0x570 [ 709.611692][T32100] do_mprotect_pkey+0x543/0x6f0 [ 709.611707][T32100] __x64_sys_mprotect+0x44/0x50 [ 709.611726][T32100] do_syscall_64+0x4a/0x90 [ 709.611748][T32100] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 709.611803][T32100] RIP: 0033:0x4665d9 [ 709.611814][T32100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 709.611826][T32100] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 709.611840][T32100] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 709.611850][T32100] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 709.611862][T32100] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 709.611874][T32100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 709.611886][T32100] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}]}, 0x78) 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000053100000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}, [{}]}, 0x78) [ 709.762947][T32116] FAULT_INJECTION: forcing a failure. [ 709.762947][T32116] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 709.878328][T32116] CPU: 0 PID: 32116 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 709.887344][T32116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.897814][T32116] Call Trace: [ 709.897830][T32116] dump_stack+0x137/0x19d [ 709.897857][T32116] should_fail+0x23c/0x250 [ 709.897900][T32116] __alloc_pages+0x102/0x320 08:04:51 executing program 0 (fault-call:3 fault-nth:54): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 709.897916][T32116] alloc_pages_vma+0x391/0x660 [ 709.919417][T32116] ? unlock_page_memcg+0xc3/0xe0 [ 709.924470][T32116] ? page_remove_rmap+0x1de/0x230 [ 709.924499][T32116] wp_page_copy+0x14c/0x10c0 [ 709.924523][T32116] ? release_pages+0x8d0/0x900 [ 709.924543][T32116] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 709.924569][T32116] ? __list_add_valid+0x28/0x90 [ 709.950196][T32116] do_wp_page+0x5a8/0xba0 [ 709.950227][T32116] handle_mm_fault+0xb31/0x1a70 [ 709.950332][T32116] ? follow_page_mask+0xc2c/0x1040 [ 709.950351][T32116] __get_user_pages+0x947/0xee0 [ 709.950389][T32116] populate_vma_page_range+0xaf/0xc0 [ 709.950419][T32116] mprotect_fixup+0x3a4/0x570 [ 709.950440][T32116] do_mprotect_pkey+0x543/0x6f0 [ 709.950461][T32116] __x64_sys_mprotect+0x44/0x50 08:04:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x1a, 0x0, 0x40}, [{}]}, 0x78) 08:04:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000003f00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 709.950479][T32116] do_syscall_64+0x4a/0x90 [ 709.950585][T32116] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 709.950606][T32116] RIP: 0033:0x4665d9 [ 709.950620][T32116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 709.950633][T32116] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 709.950650][T32116] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 709.950662][T32116] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 709.950673][T32116] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 709.950683][T32116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 709.950693][T32116] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 710.034832][T32134] FAULT_INJECTION: forcing a failure. [ 710.034832][T32134] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 710.111007][T32134] CPU: 0 PID: 32134 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 710.111032][T32134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.111078][T32134] Call Trace: [ 710.111086][T32134] dump_stack+0x137/0x19d [ 710.137709][T32134] should_fail+0x23c/0x250 [ 710.137735][T32134] __alloc_pages+0x102/0x320 [ 710.137747][T32134] alloc_pages_vma+0x391/0x660 [ 710.137830][T32134] ? unlock_page_memcg+0xc3/0xe0 [ 710.137840][T32134] ? page_remove_rmap+0x1de/0x230 [ 710.137853][T32134] wp_page_copy+0x14c/0x10c0 [ 710.137976][T32134] ? release_pages+0x8d0/0x900 [ 710.137989][T32134] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 710.138003][T32134] ? __list_add_valid+0x28/0x90 [ 710.138016][T32134] do_wp_page+0x5a8/0xba0 [ 710.138068][T32134] handle_mm_fault+0xb31/0x1a70 [ 710.138081][T32134] ? follow_page_mask+0xc2c/0x1040 [ 710.138093][T32134] __get_user_pages+0x947/0xee0 [ 710.138106][T32134] populate_vma_page_range+0xaf/0xc0 [ 710.138119][T32134] mprotect_fixup+0x3a4/0x570 [ 710.138159][T32134] do_mprotect_pkey+0x543/0x6f0 [ 710.138190][T32134] __x64_sys_mprotect+0x44/0x50 [ 710.138274][T32134] do_syscall_64+0x4a/0x90 [ 710.138288][T32134] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 710.138303][T32134] RIP: 0033:0x4665d9 [ 710.138314][T32134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x700000000000000}]}, 0x78) 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000048000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:52 executing program 0 (fault-call:3 fault-nth:55): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200b}, [{}]}, 0x78) 08:04:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}]}, 0x78) 08:04:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x1b, 0x0, 0x40}, [{}]}, 0x78) 08:04:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00}]}, 0x78) [ 710.138403][T32134] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 710.138415][T32134] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 710.138422][T32134] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 710.138502][T32134] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 710.138514][T32134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 710.138527][T32134] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x800000000000000}]}, 0x78) 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000fffe00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xc0, 0x0, 0x40}, [{}]}, 0x78) 08:04:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200c}, [{}]}, 0x78) 08:04:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xe0, 0x0, 0x40}, [{}]}, 0x78) 08:04:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200d}, [{}]}, 0x78) 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000feff00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:52 executing program 0 (fault-call:3 fault-nth:56): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x900000000000000}]}, 0x78) 08:04:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00}]}, 0x78) 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000004000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 710.456748][T32170] FAULT_INJECTION: forcing a failure. [ 710.456748][T32170] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 710.470140][T32170] CPU: 1 PID: 32170 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 710.478938][T32170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.489233][T32170] Call Trace: [ 710.492521][T32170] dump_stack+0x137/0x19d 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000008000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 710.492559][T32170] should_fail+0x23c/0x250 [ 710.492580][T32170] __alloc_pages+0x102/0x320 [ 710.492648][T32170] alloc_pages_vma+0x391/0x660 [ 710.492666][T32170] ? unlock_page_memcg+0xc3/0xe0 [ 710.492685][T32170] ? page_remove_rmap+0x1de/0x230 [ 710.492706][T32170] wp_page_copy+0x14c/0x10c0 [ 710.492748][T32170] ? release_pages+0x8d0/0x900 [ 710.492765][T32170] ? mem_cgroup_update_lru_size+0x53/0xf0 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000400008000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000010000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 710.492784][T32170] ? __list_add_valid+0x28/0x90 [ 710.492799][T32170] do_wp_page+0x5a8/0xba0 [ 710.492831][T32170] handle_mm_fault+0xb31/0x1a70 [ 710.492887][T32170] ? follow_page_mask+0xc2c/0x1040 [ 710.492941][T32170] __get_user_pages+0x947/0xee0 [ 710.492960][T32170] populate_vma_page_range+0xaf/0xc0 [ 710.492979][T32170] mprotect_fixup+0x3a4/0x570 [ 710.492995][T32170] do_mprotect_pkey+0x543/0x6f0 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000020000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000010b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 710.493045][T32170] __x64_sys_mprotect+0x44/0x50 [ 710.493060][T32170] do_syscall_64+0x4a/0x90 [ 710.493078][T32170] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 710.493128][T32170] RIP: 0033:0x4665d9 [ 710.493143][T32170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 710.493158][T32170] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 710.493240][T32170] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 710.493251][T32170] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 710.493261][T32170] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 710.493273][T32170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 710.493338][T32170] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 710.593645][T32186] FAULT_INJECTION: forcing a failure. [ 710.593645][T32186] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 710.708486][T32186] CPU: 0 PID: 32186 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 710.717313][T32186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.727453][T32186] Call Trace: [ 710.730809][T32186] dump_stack+0x137/0x19d [ 710.735161][T32186] should_fail+0x23c/0x250 [ 710.739565][T32186] __alloc_pages+0x102/0x320 [ 710.744192][T32186] alloc_pages_vma+0x391/0x660 [ 710.748968][T32186] ? unlock_page_memcg+0xc3/0xe0 [ 710.753901][T32186] ? page_remove_rmap+0x1de/0x230 [ 710.759137][T32186] wp_page_copy+0x14c/0x10c0 [ 710.764017][T32186] ? release_pages+0x8d0/0x900 [ 710.768923][T32186] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 710.774789][T32186] ? __list_add_valid+0x28/0x90 [ 710.779631][T32186] do_wp_page+0x5a8/0xba0 [ 710.784027][T32186] handle_mm_fault+0xb31/0x1a70 [ 710.788923][T32186] ? follow_page_mask+0xc2c/0x1040 [ 710.794139][T32186] __get_user_pages+0x947/0xee0 [ 710.798981][T32186] populate_vma_page_range+0xaf/0xc0 [ 710.804366][T32186] mprotect_fixup+0x3a4/0x570 [ 710.809034][T32186] do_mprotect_pkey+0x543/0x6f0 [ 710.814024][T32186] __x64_sys_mprotect+0x44/0x50 [ 710.819170][T32186] do_syscall_64+0x4a/0x90 [ 710.823610][T32186] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 710.829495][T32186] RIP: 0033:0x4665d9 [ 710.833386][T32186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf0, 0x0, 0x40}, [{}]}, 0x78) 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000020b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200e}, [{}]}, 0x78) 08:04:52 executing program 0 (fault-call:3 fault-nth:57): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xa00000000000000}]}, 0x78) 08:04:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}]}, 0x78) 08:04:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200f}, [{}]}, 0x78) 08:04:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf8, 0x0, 0x40}, [{}]}, 0x78) 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000004020b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 710.852988][T32186] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 710.861388][T32186] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 710.869429][T32186] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 710.877394][T32186] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 710.885695][T32186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 710.893876][T32186] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xb00000000000000}]}, 0x78) 08:04:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00}]}, 0x78) 08:04:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeff}, [{}]}, 0x78) 08:04:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000030b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xfc, 0x0, 0x40}, [{}]}, 0x78) 08:04:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}]}, 0x78) [ 711.102243][T32242] FAULT_INJECTION: forcing a failure. [ 711.102243][T32242] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 711.116154][T32242] CPU: 0 PID: 32242 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 711.125094][T32242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.135342][T32242] Call Trace: [ 711.138630][T32242] dump_stack+0x137/0x19d [ 711.143070][T32242] should_fail+0x23c/0x250 [ 711.147549][T32242] __alloc_pages+0x102/0x320 [ 711.152149][T32242] alloc_pages_vma+0x391/0x660 [ 711.156916][T32242] ? unlock_page_memcg+0xc3/0xe0 [ 711.162015][T32242] ? page_remove_rmap+0x1de/0x230 [ 711.167308][T32242] wp_page_copy+0x14c/0x10c0 [ 711.172070][T32242] ? release_pages+0x8d0/0x900 [ 711.177198][T32242] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 711.183555][T32242] ? __list_add_valid+0x28/0x90 [ 711.188696][T32242] do_wp_page+0x5a8/0xba0 [ 711.193024][T32242] handle_mm_fault+0xb31/0x1a70 [ 711.198026][T32242] ? follow_page_mask+0xc2c/0x1040 [ 711.203373][T32242] __get_user_pages+0x947/0xee0 [ 711.208224][T32242] populate_vma_page_range+0xaf/0xc0 [ 711.213615][T32242] mprotect_fixup+0x3a4/0x570 [ 711.218302][T32242] do_mprotect_pkey+0x543/0x6f0 [ 711.223271][T32242] __x64_sys_mprotect+0x44/0x50 [ 711.228289][T32242] do_syscall_64+0x4a/0x90 [ 711.232704][T32242] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 711.238887][T32242] RIP: 0033:0x4665d9 [ 711.242768][T32242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 711.262778][T32242] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 711.271498][T32242] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 711.281699][T32242] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 711.290709][T32242] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 08:04:53 executing program 0 (fault-call:3 fault-nth:58): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}, [{}]}, 0x78) 08:04:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xc00000000000000}]}, 0x78) 08:04:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}]}, 0x78) 08:04:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x180, 0x0, 0x40}, [{}]}, 0x78) 08:04:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000040b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xd00000000000000}]}, 0x78) 08:04:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000050b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}]}, 0x78) [ 711.300544][T32242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 711.309241][T32242] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x700, 0x0, 0x40}, [{}]}, 0x78) 08:04:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2}, [{}]}, 0x78) 08:04:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe00000000000000}]}, 0x78) [ 711.476384][T32273] FAULT_INJECTION: forcing a failure. [ 711.476384][T32273] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 711.489763][T32273] CPU: 1 PID: 32273 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 711.498532][T32273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.508652][T32273] Call Trace: [ 711.512033][T32273] dump_stack+0x137/0x19d [ 711.516371][T32273] should_fail+0x23c/0x250 [ 711.520893][T32273] __alloc_pages+0x102/0x320 [ 711.525535][T32273] alloc_pages_vma+0x391/0x660 [ 711.530483][T32273] ? unlock_page_memcg+0xc3/0xe0 [ 711.535409][T32273] ? page_remove_rmap+0x1de/0x230 [ 711.540437][T32273] wp_page_copy+0x14c/0x10c0 [ 711.545124][T32273] ? release_pages+0x8d0/0x900 [ 711.549997][T32273] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 711.555984][T32273] ? __list_add_valid+0x28/0x90 [ 711.561135][T32273] do_wp_page+0x5a8/0xba0 [ 711.565466][T32273] handle_mm_fault+0xb31/0x1a70 [ 711.570322][T32273] ? follow_page_mask+0xc2c/0x1040 [ 711.575544][T32273] __get_user_pages+0x947/0xee0 [ 711.580627][T32273] populate_vma_page_range+0xaf/0xc0 [ 711.586812][T32273] mprotect_fixup+0x3a4/0x570 [ 711.591610][T32273] do_mprotect_pkey+0x543/0x6f0 [ 711.596466][T32273] __x64_sys_mprotect+0x44/0x50 [ 711.601354][T32273] do_syscall_64+0x4a/0x90 [ 711.605849][T32273] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 711.612247][T32273] RIP: 0033:0x4665d9 08:04:53 executing program 0 (fault-call:3 fault-nth:59): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}]}, 0x78) 08:04:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7}, [{}]}, 0x78) 08:04:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x900, 0x0, 0x40}, [{}]}, 0x78) [ 711.616185][T32273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 711.636027][T32273] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 711.644909][T32273] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 711.652903][T32273] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 711.660905][T32273] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 711.669061][T32273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000060b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf00000000000000}]}, 0x78) 08:04:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x8}, [{}]}, 0x78) 08:04:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1800000000000000}]}, 0x78) 08:04:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000004060b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 711.677233][T32273] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00}]}, 0x78) 08:04:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9}, [{}]}, 0x78) 08:04:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xa00, 0x0, 0x40}, [{}]}, 0x78) [ 711.845693][T32306] FAULT_INJECTION: forcing a failure. [ 711.845693][T32306] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 711.859137][T32306] CPU: 1 PID: 32306 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 711.867886][T32306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.878010][T32306] Call Trace: [ 711.881314][T32306] dump_stack+0x137/0x19d [ 711.885684][T32306] should_fail+0x23c/0x250 [ 711.890088][T32306] __alloc_pages+0x102/0x320 [ 711.894671][T32306] alloc_pages_vma+0x391/0x660 [ 711.899446][T32306] ? unlock_page_memcg+0xc3/0xe0 [ 711.904391][T32306] ? page_remove_rmap+0x1de/0x230 [ 711.909489][T32306] wp_page_copy+0x14c/0x10c0 [ 711.914203][T32306] ? release_pages+0x8d0/0x900 [ 711.919042][T32306] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 711.924876][T32306] ? __list_add_valid+0x28/0x90 [ 711.929760][T32306] do_wp_page+0x5a8/0xba0 [ 711.934230][T32306] handle_mm_fault+0xb31/0x1a70 [ 711.939113][T32306] ? follow_page_mask+0xc2c/0x1040 [ 711.944304][T32306] __get_user_pages+0x947/0xee0 [ 711.949277][T32306] populate_vma_page_range+0xaf/0xc0 [ 711.954600][T32306] mprotect_fixup+0x3a4/0x570 [ 711.959437][T32306] do_mprotect_pkey+0x543/0x6f0 [ 711.964349][T32306] __x64_sys_mprotect+0x44/0x50 [ 711.969623][T32306] do_syscall_64+0x4a/0x90 [ 711.974234][T32306] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 711.980232][T32306] RIP: 0033:0x4665d9 08:04:53 executing program 0 (fault-call:3 fault-nth:60): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000070b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1900000000000000}]}, 0x78) 08:04:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xa}, [{}]}, 0x78) 08:04:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 08:04:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xb00, 0x0, 0x40}, [{}]}, 0x78) [ 711.984201][T32306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 712.004247][T32306] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 712.012741][T32306] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 712.021194][T32306] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 712.029801][T32306] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 712.037839][T32306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xb}, [{}]}, 0x78) 08:04:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1a00000000000000}]}, 0x78) 08:04:53 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 08:04:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xc00, 0x0, 0x40}, [{}]}, 0x78) [ 712.045953][T32306] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000080b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc}, [{}]}, 0x78) [ 712.216959][T32337] FAULT_INJECTION: forcing a failure. [ 712.216959][T32337] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 712.230621][T32337] CPU: 0 PID: 32337 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 712.239620][T32337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.249829][T32337] Call Trace: [ 712.253127][T32337] dump_stack+0x137/0x19d [ 712.257449][T32337] should_fail+0x23c/0x250 [ 712.261852][T32337] __alloc_pages+0x102/0x320 [ 712.266535][T32337] alloc_pages_vma+0x391/0x660 [ 712.271383][T32337] ? unlock_page_memcg+0xc3/0xe0 [ 712.276308][T32337] ? page_remove_rmap+0x1de/0x230 [ 712.281421][T32337] wp_page_copy+0x14c/0x10c0 [ 712.286018][T32337] ? release_pages+0x8d0/0x900 [ 712.290768][T32337] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 712.296476][T32337] ? __list_add_valid+0x28/0x90 [ 712.301314][T32337] do_wp_page+0x5a8/0xba0 [ 712.305770][T32337] handle_mm_fault+0xb31/0x1a70 [ 712.310677][T32337] ? follow_page_mask+0xc2c/0x1040 [ 712.315821][T32337] __get_user_pages+0x947/0xee0 [ 712.320659][T32337] populate_vma_page_range+0xaf/0xc0 [ 712.325928][T32337] mprotect_fixup+0x3a4/0x570 [ 712.330686][T32337] do_mprotect_pkey+0x543/0x6f0 [ 712.335646][T32337] __x64_sys_mprotect+0x44/0x50 [ 712.340516][T32337] do_syscall_64+0x4a/0x90 [ 712.344921][T32337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 712.350894][T32337] RIP: 0033:0x4665d9 08:04:54 executing program 0 (fault-call:3 fault-nth:61): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 08:04:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x1b00000000000000}]}, 0x78) 08:04:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xd00, 0x0, 0x40}, [{}]}, 0x78) 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000110b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xd}, [{}]}, 0x78) [ 712.354959][T32337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 712.374611][T32337] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 712.383125][T32337] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 712.391105][T32337] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 712.399062][T32337] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 712.407060][T32337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 712.415179][T32337] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x3f00000000000000}]}, 0x78) 08:04:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 08:04:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe}, [{}]}, 0x78) 08:04:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 08:04:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xe00, 0x0, 0x40}, [{}]}, 0x78) 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000180b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 712.596476][T32366] FAULT_INJECTION: forcing a failure. [ 712.596476][T32366] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 712.609796][T32366] CPU: 0 PID: 32366 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 712.618683][T32366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.628928][T32366] Call Trace: [ 712.632251][T32366] dump_stack+0x137/0x19d [ 712.636946][T32366] should_fail+0x23c/0x250 [ 712.641374][T32366] __alloc_pages+0x102/0x320 [ 712.645996][T32366] alloc_pages_vma+0x391/0x660 [ 712.650791][T32366] ? unlock_page_memcg+0xc3/0xe0 [ 712.655752][T32366] ? page_remove_rmap+0x1de/0x230 [ 712.660881][T32366] wp_page_copy+0x14c/0x10c0 [ 712.665507][T32366] ? release_pages+0x8d0/0x900 [ 712.670277][T32366] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 712.676128][T32366] ? __list_add_valid+0x28/0x90 [ 712.681039][T32366] do_wp_page+0x5a8/0xba0 [ 712.685410][T32366] handle_mm_fault+0xb31/0x1a70 [ 712.690292][T32366] ? follow_page_mask+0xc2c/0x1040 [ 712.695612][T32366] __get_user_pages+0x947/0xee0 [ 712.700474][T32366] populate_vma_page_range+0xaf/0xc0 [ 712.705796][T32366] mprotect_fixup+0x3a4/0x570 [ 712.710503][T32366] do_mprotect_pkey+0x543/0x6f0 [ 712.715363][T32366] __x64_sys_mprotect+0x44/0x50 [ 712.720221][T32366] do_syscall_64+0x4a/0x90 [ 712.724652][T32366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 712.730561][T32366] RIP: 0033:0x4665d9 [ 712.734522][T32366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 712.754224][T32366] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 712.762911][T32366] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 712.770893][T32366] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 712.778879][T32366] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 712.787233][T32366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:54 executing program 0 (fault-call:3 fault-nth:62): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x7f00000000000000}]}, 0x78) 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000000000001c0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 08:04:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf00, 0x0, 0x40}, [{}]}, 0x78) 08:04:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf}, [{}]}, 0x78) [ 712.795217][T32366] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x1800, 0x0, 0x40}, [{}]}, 0x78) 08:04:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 08:04:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x8000000000000000}]}, 0x78) 08:04:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x18}, [{}]}, 0x78) 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000260b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 08:04:54 executing program 0 (fault-call:3 fault-nth:63): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:54 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x1a00, 0x0, 0x40}, [{}]}, 0x78) 08:04:54 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 08:04:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a}, [{}]}, 0x78) 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000005310b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.030920][T32397] FAULT_INJECTION: forcing a failure. [ 713.030920][T32397] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 713.044428][T32397] CPU: 0 PID: 32397 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 713.053243][T32397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.053259][T32397] Call Trace: [ 713.053268][T32397] dump_stack+0x137/0x19d 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000000000003f0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.053296][T32397] should_fail+0x23c/0x250 [ 713.053315][T32397] __alloc_pages+0x102/0x320 [ 713.053334][T32397] alloc_pages_vma+0x391/0x660 [ 713.053354][T32397] ? unlock_page_memcg+0xc3/0xe0 [ 713.053390][T32397] ? page_remove_rmap+0x1de/0x230 [ 713.053413][T32397] wp_page_copy+0x14c/0x10c0 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000800400b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000004800b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.053437][T32397] ? release_pages+0x8d0/0x900 [ 713.053454][T32397] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 713.053533][T32397] ? __list_add_valid+0x28/0x90 [ 713.053551][T32397] do_wp_page+0x5a8/0xba0 [ 713.053571][T32397] handle_mm_fault+0xb31/0x1a70 [ 713.053592][T32397] ? follow_page_mask+0xc2c/0x1040 [ 713.053610][T32397] __get_user_pages+0x947/0xee0 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000fffffff60b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.053676][T32397] populate_vma_page_range+0xaf/0xc0 [ 713.053696][T32397] mprotect_fixup+0x3a4/0x570 [ 713.053713][T32397] do_mprotect_pkey+0x543/0x6f0 [ 713.053730][T32397] __x64_sys_mprotect+0x44/0x50 [ 713.053747][T32397] do_syscall_64+0x4a/0x90 [ 713.053821][T32397] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 713.053842][T32397] RIP: 0033:0x4665d9 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000fffffffe0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000f6ffffff0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.053857][T32397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 713.053873][T32397] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 713.053898][T32397] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 713.053922][T32397] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 713.053984][T32397] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 713.053994][T32397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 713.054006][T32397] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 713.166796][T32410] FAULT_INJECTION: forcing a failure. [ 713.166796][T32410] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 713.296963][T32410] CPU: 1 PID: 32410 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 713.297044][T32410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.297055][T32410] Call Trace: [ 713.297064][T32410] dump_stack+0x137/0x19d [ 713.297094][T32410] should_fail+0x23c/0x250 [ 713.297117][T32410] __alloc_pages+0x102/0x320 [ 713.297134][T32410] alloc_pages_vma+0x391/0x660 [ 713.297167][T32410] ? unlock_page_memcg+0xc3/0xe0 [ 713.297185][T32410] ? page_remove_rmap+0x1de/0x230 [ 713.297207][T32410] wp_page_copy+0x14c/0x10c0 [ 713.297230][T32410] ? release_pages+0x8d0/0x900 [ 713.297245][T32410] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 713.297374][T32410] ? __list_add_valid+0x28/0x90 [ 713.297393][T32410] do_wp_page+0x5a8/0xba0 [ 713.297413][T32410] handle_mm_fault+0xb31/0x1a70 [ 713.297434][T32410] ? follow_page_mask+0xc2c/0x1040 [ 713.297449][T32410] __get_user_pages+0x947/0xee0 [ 713.297465][T32410] populate_vma_page_range+0xaf/0xc0 [ 713.297503][T32410] mprotect_fixup+0x3a4/0x570 [ 713.297518][T32410] do_mprotect_pkey+0x543/0x6f0 [ 713.297609][T32410] __x64_sys_mprotect+0x44/0x50 [ 713.297626][T32410] do_syscall_64+0x4a/0x90 [ 713.297644][T32410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 713.297662][T32410] RIP: 0033:0x4665d9 [ 713.297709][T32410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 713.297745][T32410] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 713.297760][T32410] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 713.297769][T32410] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 713.297778][T32410] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:04:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x9bffffff00000000}]}, 0x78) 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000feffffff0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:55 executing program 0 (fault-call:3 fault-nth:64): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x1b00, 0x0, 0x40}, [{}]}, 0x78) 08:04:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b}, [{}]}, 0x78) 08:04:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}]}, 0x78) [ 713.297787][T32410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 713.297796][T32410] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc0}, [{}]}, 0x78) 08:04:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 08:04:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xc000000000000000}]}, 0x78) 08:04:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x3f00, 0x0, 0x40}, [{}]}, 0x78) 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000050000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe000000000000000}]}, 0x78) 08:04:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 08:04:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe0}, [{}]}, 0x78) 08:04:55 executing program 0 (fault-call:3 fault-nth:65): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000200000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.639278][T32453] FAULT_INJECTION: forcing a failure. [ 713.639278][T32453] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 713.652555][T32453] CPU: 0 PID: 32453 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 713.652580][T32453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.652591][T32453] Call Trace: [ 713.652599][T32453] dump_stack+0x137/0x19d [ 713.679368][T32453] should_fail+0x23c/0x250 [ 713.679398][T32453] __alloc_pages+0x102/0x320 [ 713.679415][T32453] alloc_pages_vma+0x391/0x660 [ 713.679492][T32453] ? unlock_page_memcg+0xc3/0xe0 [ 713.679507][T32453] ? page_remove_rmap+0x1de/0x230 [ 713.679525][T32453] wp_page_copy+0x14c/0x10c0 [ 713.679621][T32453] ? release_pages+0x8d0/0x900 [ 713.679640][T32453] ? mem_cgroup_update_lru_size+0x53/0xf0 08:04:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x7f00, 0x0, 0x40}, [{}]}, 0x78) 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000300000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000400000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.679758][T32453] ? __list_add_valid+0x28/0x90 [ 713.679777][T32453] do_wp_page+0x5a8/0xba0 [ 713.679804][T32453] handle_mm_fault+0xb31/0x1a70 [ 713.679826][T32453] ? follow_page_mask+0xc2c/0x1040 [ 713.679847][T32453] __get_user_pages+0x947/0xee0 [ 713.679873][T32453] populate_vma_page_range+0xaf/0xc0 [ 713.679892][T32453] mprotect_fixup+0x3a4/0x570 [ 713.679928][T32453] do_mprotect_pkey+0x543/0x6f0 [ 713.679961][T32453] __x64_sys_mprotect+0x44/0x50 [ 713.679980][T32453] do_syscall_64+0x4a/0x90 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000500000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.680001][T32453] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 713.680021][T32453] RIP: 0033:0x4665d9 [ 713.680063][T32453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 713.680076][T32453] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 713.680136][T32453] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 713.680147][T32453] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000600000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.680157][T32453] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 713.680167][T32453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 713.680175][T32453] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 713.776228][T32469] FAULT_INJECTION: forcing a failure. [ 713.776228][T32469] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 713.895446][T32469] CPU: 1 PID: 32469 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 08:04:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x78) [ 713.895471][T32469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.895524][T32469] Call Trace: [ 713.895533][T32469] dump_stack+0x137/0x19d [ 713.895562][T32469] should_fail+0x23c/0x250 [ 713.926777][T32469] __alloc_pages+0x102/0x320 [ 713.926805][T32469] alloc_pages_vma+0x391/0x660 [ 713.926822][T32469] ? unlock_page_memcg+0xc3/0xe0 [ 713.926836][T32469] ? page_remove_rmap+0x1de/0x230 [ 713.926928][T32469] wp_page_copy+0x14c/0x10c0 [ 713.926954][T32469] ? release_pages+0x8d0/0x900 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000700000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 713.926972][T32469] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 713.927070][T32469] ? __list_add_valid+0x28/0x90 [ 713.927086][T32469] do_wp_page+0x5a8/0xba0 [ 713.927104][T32469] handle_mm_fault+0xb31/0x1a70 [ 713.927121][T32469] ? follow_page_mask+0xc2c/0x1040 [ 713.927156][T32469] __get_user_pages+0x947/0xee0 [ 713.927172][T32469] populate_vma_page_range+0xaf/0xc0 [ 713.927244][T32469] mprotect_fixup+0x3a4/0x570 [ 713.927259][T32469] do_mprotect_pkey+0x543/0x6f0 [ 713.927274][T32469] __x64_sys_mprotect+0x44/0x50 [ 713.927288][T32469] do_syscall_64+0x4a/0x90 [ 713.927307][T32469] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 713.927327][T32469] RIP: 0033:0x4665d9 [ 713.927401][T32469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.040569][T32469] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 714.040594][T32469] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 08:04:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xe803000000000000}]}, 0x78) 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000800000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf0}, [{}]}, 0x78) 08:04:55 executing program 0 (fault-call:3 fault-nth:66): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 08:04:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xc000, 0x0, 0x40}, [{}]}, 0x78) 08:04:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf000000000000000}]}, 0x78) [ 714.040605][T32469] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 714.040615][T32469] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.040680][T32469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 714.040690][T32469] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf8}, [{}]}, 0x78) 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:55 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}]}, 0x78) 08:04:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xf800000000000000}]}, 0x78) 08:04:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xe000, 0x0, 0x40}, [{}]}, 0x78) 08:04:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001100000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xfc}, [{}]}, 0x78) 08:04:55 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf000, 0x0, 0x40}, [{}]}, 0x78) 08:04:56 executing program 0 (fault-call:3 fault-nth:67): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 08:04:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xfc00000000000000}]}, 0x78) 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001800000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 714.300807][T32528] FAULT_INJECTION: forcing a failure. [ 714.300807][T32528] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 714.314265][T32528] CPU: 0 PID: 32528 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 714.314283][T32528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.314290][T32528] Call Trace: [ 714.314296][T32528] dump_stack+0x137/0x19d 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000001c00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 714.314375][T32528] should_fail+0x23c/0x250 [ 714.314395][T32528] __alloc_pages+0x102/0x320 [ 714.314414][T32528] alloc_pages_vma+0x391/0x660 [ 714.314436][T32528] ? unlock_page_memcg+0xc3/0xe0 [ 714.314452][T32528] ? page_remove_rmap+0x1de/0x230 [ 714.314474][T32528] wp_page_copy+0x14c/0x10c0 [ 714.314496][T32528] ? release_pages+0x8d0/0x900 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000002600000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000fe00000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 714.314516][T32528] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 714.314537][T32528] ? __list_add_valid+0x28/0x90 [ 714.314553][T32528] do_wp_page+0x5a8/0xba0 [ 714.314642][T32528] handle_mm_fault+0xb31/0x1a70 [ 714.314672][T32528] ? follow_page_mask+0xc2c/0x1040 [ 714.314695][T32528] __get_user_pages+0x947/0xee0 [ 714.314716][T32528] populate_vma_page_range+0xaf/0xc0 [ 714.314745][T32528] mprotect_fixup+0x3a4/0x570 [ 714.314816][T32528] do_mprotect_pkey+0x543/0x6f0 [ 714.314834][T32528] __x64_sys_mprotect+0x44/0x50 [ 714.314849][T32528] do_syscall_64+0x4a/0x90 [ 714.314871][T32528] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 714.314957][T32528] RIP: 0033:0x4665d9 [ 714.314972][T32528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000402000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 714.314988][T32528] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 714.315006][T32528] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 714.315016][T32528] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 714.315025][T32528] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.315036][T32528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 714.315049][T32528] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 714.428509][T32537] FAULT_INJECTION: forcing a failure. 08:04:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf800, 0x0, 0x40}, [{}]}, 0x78) [ 714.428509][T32537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 714.559121][T32537] CPU: 1 PID: 32537 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 714.559149][T32537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.559159][T32537] Call Trace: [ 714.559167][T32537] dump_stack+0x137/0x19d [ 714.559193][T32537] should_fail+0x23c/0x250 [ 714.559215][T32537] __alloc_pages+0x102/0x320 [ 714.559333][T32537] alloc_pages_vma+0x391/0x660 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000003000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 714.559354][T32537] ? unlock_page_memcg+0xc3/0xe0 [ 714.559373][T32537] ? page_remove_rmap+0x1de/0x230 [ 714.559466][T32537] wp_page_copy+0x14c/0x10c0 [ 714.559489][T32537] ? release_pages+0x8d0/0x900 [ 714.559509][T32537] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 714.559534][T32537] ? __list_add_valid+0x28/0x90 [ 714.559633][T32537] do_wp_page+0x5a8/0xba0 [ 714.559724][T32537] handle_mm_fault+0xb31/0x1a70 [ 714.639657][T32537] ? follow_page_mask+0xc2c/0x1040 [ 714.639693][T32537] __get_user_pages+0x947/0xee0 [ 714.639711][T32537] populate_vma_page_range+0xaf/0xc0 [ 714.639736][T32537] mprotect_fixup+0x3a4/0x570 [ 714.639754][T32537] do_mprotect_pkey+0x543/0x6f0 [ 714.639788][T32537] __x64_sys_mprotect+0x44/0x50 [ 714.669434][T32537] do_syscall_64+0x4a/0x90 [ 714.669466][T32537] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 714.669560][T32537] RIP: 0033:0x4665d9 [ 714.669574][T32537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.669637][T32537] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 714.669656][T32537] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 714.669667][T32537] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 714.669679][T32537] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:04:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x180}, [{}]}, 0x78) 08:04:56 executing program 0 (fault-call:3 fault-nth:68): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000204000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 08:04:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xfc00, 0x0, 0x40}, [{}]}, 0x78) 08:04:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xffffffff00000000}]}, 0x78) 08:04:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x700}, [{}]}, 0x78) [ 714.669699][T32537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 714.669711][T32537] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000604000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf00000, 0x0, 0x40}, [{}]}, 0x78) 08:04:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0xffffffffffffffff}]}, 0x78) 08:04:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}]}, 0x78) 08:04:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x1000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x900}, [{}]}, 0x78) 08:04:56 executing program 0 (fault-call:3 fault-nth:69): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x2}]}, 0x78) 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000008004000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:56 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) [ 714.944149][T32591] FAULT_INJECTION: forcing a failure. [ 714.944149][T32591] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 714.957870][T32591] CPU: 1 PID: 32591 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 714.957887][T32591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.957894][T32591] Call Trace: [ 714.957901][T32591] dump_stack+0x137/0x19d [ 714.957920][T32591] should_fail+0x23c/0x250 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000005000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 714.958005][T32591] __alloc_pages+0x102/0x320 [ 714.958017][T32591] alloc_pages_vma+0x391/0x660 [ 714.958030][T32591] ? unlock_page_memcg+0xc3/0xe0 [ 714.958042][T32591] ? page_remove_rmap+0x1de/0x230 [ 714.958055][T32591] wp_page_copy+0x14c/0x10c0 [ 714.958078][T32591] ? release_pages+0x8d0/0x900 [ 714.958091][T32591] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 714.958106][T32591] ? __list_add_valid+0x28/0x90 [ 714.958118][T32591] do_wp_page+0x5a8/0xba0 [ 714.958132][T32591] handle_mm_fault+0xb31/0x1a70 [ 714.958150][T32591] ? follow_page_mask+0xc2c/0x1040 [ 714.958162][T32591] __get_user_pages+0x947/0xee0 [ 714.958173][T32591] populate_vma_page_range+0xaf/0xc0 [ 714.958185][T32591] mprotect_fixup+0x3a4/0x570 [ 714.958264][T32591] do_mprotect_pkey+0x543/0x6f0 [ 714.958276][T32591] __x64_sys_mprotect+0x44/0x50 [ 714.958317][T32591] do_syscall_64+0x4a/0x90 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000003105000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 714.958333][T32591] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 714.958348][T32591] RIP: 0033:0x4665d9 [ 714.958358][T32591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 714.958369][T32591] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 714.958380][T32591] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 08:04:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xa00}, [{}]}, 0x78) 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000006000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 714.958387][T32591] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 714.958394][T32591] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 714.958401][T32591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 714.958470][T32591] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 715.070973][T32603] FAULT_INJECTION: forcing a failure. [ 715.070973][T32603] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:04:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000406000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 715.192666][T32603] CPU: 1 PID: 32603 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 715.201627][T32603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.201650][T32603] Call Trace: [ 715.201658][T32603] dump_stack+0x137/0x19d [ 715.201687][T32603] should_fail+0x23c/0x250 [ 715.201706][T32603] __alloc_pages+0x102/0x320 [ 715.201723][T32603] alloc_pages_vma+0x391/0x660 08:04:56 executing program 0 (fault-call:3 fault-nth:70): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 715.201757][T32603] ? unlock_page_memcg+0xc3/0xe0 [ 715.201774][T32603] ? page_remove_rmap+0x1de/0x230 [ 715.201865][T32603] wp_page_copy+0x14c/0x10c0 [ 715.201963][T32603] ? release_pages+0x8d0/0x900 [ 715.201980][T32603] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 715.202000][T32603] ? __list_add_valid+0x28/0x90 [ 715.202018][T32603] do_wp_page+0x5a8/0xba0 [ 715.202072][T32603] handle_mm_fault+0xb31/0x1a70 [ 715.202094][T32603] ? follow_page_mask+0xc2c/0x1040 [ 715.202154][T32603] __get_user_pages+0x947/0xee0 [ 715.202185][T32603] populate_vma_page_range+0xaf/0xc0 [ 715.202237][T32603] mprotect_fixup+0x3a4/0x570 [ 715.202259][T32603] do_mprotect_pkey+0x543/0x6f0 [ 715.202281][T32603] __x64_sys_mprotect+0x44/0x50 [ 715.202303][T32603] do_syscall_64+0x4a/0x90 [ 715.202367][T32603] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 715.202389][T32603] RIP: 0033:0x4665d9 [ 715.202404][T32603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 715.202470][T32603] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 715.202492][T32603] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 715.202505][T32603] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:04:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x1800000, 0x0, 0x40}, [{}]}, 0x78) 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000007000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 715.202518][T32603] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 715.202531][T32603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 715.202543][T32603] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 715.343212][T32620] FAULT_INJECTION: forcing a failure. [ 715.343212][T32620] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 715.438781][T32620] CPU: 0 PID: 32620 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000011000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 715.447668][T32620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.457837][T32620] Call Trace: [ 715.461146][T32620] dump_stack+0x137/0x19d [ 715.465494][T32620] should_fail+0x23c/0x250 [ 715.470248][T32620] __alloc_pages+0x102/0x320 [ 715.475089][T32620] alloc_pages_vma+0x391/0x660 [ 715.475165][T32620] ? unlock_page_memcg+0xc3/0xe0 [ 715.475181][T32620] ? page_remove_rmap+0x1de/0x230 [ 715.475201][T32620] wp_page_copy+0x14c/0x10c0 [ 715.475223][T32620] ? release_pages+0x8d0/0x900 [ 715.475280][T32620] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 715.475303][T32620] ? __list_add_valid+0x28/0x90 [ 715.475322][T32620] do_wp_page+0x5a8/0xba0 [ 715.475404][T32620] handle_mm_fault+0xb31/0x1a70 [ 715.475425][T32620] ? follow_page_mask+0xc2c/0x1040 [ 715.475444][T32620] __get_user_pages+0x947/0xee0 [ 715.475460][T32620] populate_vma_page_range+0xaf/0xc0 [ 715.475481][T32620] mprotect_fixup+0x3a4/0x570 [ 715.475555][T32620] do_mprotect_pkey+0x543/0x6f0 [ 715.475571][T32620] __x64_sys_mprotect+0x44/0x50 [ 715.475653][T32620] do_syscall_64+0x4a/0x90 [ 715.475727][T32620] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 715.475794][T32620] RIP: 0033:0x4665d9 [ 715.475820][T32620] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x5}]}, 0x78) 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000018000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 08:04:57 executing program 0 (fault-call:3 fault-nth:71): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xb00}, [{}]}, 0x78) 08:04:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x2000000, 0x0, 0x40}, [{}]}, 0x78) [ 715.475836][T32620] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 715.475854][T32620] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 715.475865][T32620] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 715.475938][T32620] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 715.475947][T32620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 715.475960][T32620] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000001c000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9bffffff}]}, 0x78) 08:04:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x6}]}, 0x78) 08:04:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc00}, [{}]}, 0x78) 08:04:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x7000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000}]}, 0x78) 08:04:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xd00}, [{}]}, 0x78) 08:04:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x7}]}, 0x78) 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000020000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 715.821469][T32658] FAULT_INJECTION: forcing a failure. [ 715.821469][T32658] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 715.834964][T32658] CPU: 1 PID: 32658 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 715.834990][T32658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.835015][T32658] Call Trace: [ 715.835024][T32658] dump_stack+0x137/0x19d [ 715.835052][T32658] should_fail+0x23c/0x250 [ 715.866198][T32658] __alloc_pages+0x102/0x320 08:04:57 executing program 0 (fault-call:3 fault-nth:72): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x8000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000026000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 715.866228][T32658] alloc_pages_vma+0x391/0x660 [ 715.866246][T32658] ? unlock_page_memcg+0xc3/0xe0 [ 715.866276][T32658] ? page_remove_rmap+0x1de/0x230 [ 715.866297][T32658] wp_page_copy+0x14c/0x10c0 [ 715.866323][T32658] ? release_pages+0x8d0/0x900 [ 715.866341][T32658] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 715.866361][T32658] ? __list_add_valid+0x28/0x90 [ 715.866413][T32658] do_wp_page+0x5a8/0xba0 [ 715.866432][T32658] handle_mm_fault+0xb31/0x1a70 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000531000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 715.866450][T32658] ? follow_page_mask+0xc2c/0x1040 [ 715.866467][T32658] __get_user_pages+0x947/0xee0 [ 715.866482][T32658] populate_vma_page_range+0xaf/0xc0 [ 715.866557][T32658] mprotect_fixup+0x3a4/0x570 [ 715.866575][T32658] do_mprotect_pkey+0x543/0x6f0 [ 715.866593][T32658] __x64_sys_mprotect+0x44/0x50 [ 715.866691][T32658] do_syscall_64+0x4a/0x90 [ 715.866712][T32658] entry_SYSCALL_64_after_hwframe+0x44/0xae 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000003f000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 715.866789][T32658] RIP: 0033:0x4665d9 [ 715.866802][T32658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 715.866818][T32658] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 715.866836][T32658] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 08:04:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe00}, [{}]}, 0x78) 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000480000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 715.866850][T32658] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 715.866862][T32658] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 715.866873][T32658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 715.866885][T32658] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 716.044009][T32675] FAULT_INJECTION: forcing a failure. [ 716.044009][T32675] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000fffe000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 716.068732][T32675] CPU: 0 PID: 32675 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 716.077812][T32675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.077828][T32675] Call Trace: [ 716.077837][T32675] dump_stack+0x137/0x19d [ 716.077863][T32675] should_fail+0x23c/0x250 [ 716.077885][T32675] __alloc_pages+0x102/0x320 [ 716.077955][T32675] alloc_pages_vma+0x391/0x660 [ 716.077975][T32675] ? unlock_page_memcg+0xc3/0xe0 [ 716.077993][T32675] ? page_remove_rmap+0x1de/0x230 [ 716.078015][T32675] wp_page_copy+0x14c/0x10c0 [ 716.078042][T32675] ? release_pages+0x8d0/0x900 [ 716.078127][T32675] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 716.078200][T32675] ? __list_add_valid+0x28/0x90 [ 716.078263][T32675] do_wp_page+0x5a8/0xba0 [ 716.078285][T32675] handle_mm_fault+0xb31/0x1a70 [ 716.078308][T32675] ? follow_page_mask+0xc2c/0x1040 [ 716.078330][T32675] __get_user_pages+0x947/0xee0 [ 716.078350][T32675] populate_vma_page_range+0xaf/0xc0 [ 716.078371][T32675] mprotect_fixup+0x3a4/0x570 [ 716.078399][T32675] do_mprotect_pkey+0x543/0x6f0 [ 716.078415][T32675] __x64_sys_mprotect+0x44/0x50 [ 716.078434][T32675] do_syscall_64+0x4a/0x90 [ 716.078456][T32675] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 716.078553][T32675] RIP: 0033:0x4665d9 08:04:57 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000}]}, 0x78) 08:04:57 executing program 0 (fault-call:3 fault-nth:73): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x8}]}, 0x78) 08:04:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000feff000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 716.078566][T32675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 716.078583][T32675] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 716.078603][T32675] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 716.078616][T32675] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 716.078628][T32675] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 716.078640][T32675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:57 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x9000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf00}, [{}]}, 0x78) 08:04:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000}]}, 0x78) [ 716.078652][T32675] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000400000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x9}]}, 0x78) 08:04:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xa000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1800}, [{}]}, 0x78) 08:04:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8000000}]}, 0x78) 08:04:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xa}]}, 0x78) [ 716.431407][T32718] FAULT_INJECTION: forcing a failure. [ 716.431407][T32718] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 716.444956][T32718] CPU: 1 PID: 32718 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 716.454094][T32718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.464432][T32718] Call Trace: 08:04:58 executing program 0 (fault-call:3 fault-nth:74): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xb000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000fffffffe0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000002000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 716.464444][T32718] dump_stack+0x137/0x19d [ 716.464469][T32718] should_fail+0x23c/0x250 [ 716.464488][T32718] __alloc_pages+0x102/0x320 [ 716.464564][T32718] alloc_pages_vma+0x391/0x660 [ 716.464584][T32718] ? unlock_page_memcg+0xc3/0xe0 [ 716.464600][T32718] ? page_remove_rmap+0x1de/0x230 [ 716.464621][T32718] wp_page_copy+0x14c/0x10c0 [ 716.464644][T32718] ? release_pages+0x8d0/0x900 [ 716.464667][T32718] ? mem_cgroup_update_lru_size+0x53/0xf0 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000003000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 716.464752][T32718] ? __list_add_valid+0x28/0x90 [ 716.464771][T32718] do_wp_page+0x5a8/0xba0 [ 716.464793][T32718] handle_mm_fault+0xb31/0x1a70 [ 716.464821][T32718] ? follow_page_mask+0xc2c/0x1040 [ 716.464839][T32718] __get_user_pages+0x947/0xee0 [ 716.464856][T32718] populate_vma_page_range+0xaf/0xc0 [ 716.464920][T32718] mprotect_fixup+0x3a4/0x570 [ 716.464941][T32718] do_mprotect_pkey+0x543/0x6f0 08:04:58 executing program 0 (fault-call:3 fault-nth:75): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000004000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 716.464960][T32718] __x64_sys_mprotect+0x44/0x50 [ 716.464979][T32718] do_syscall_64+0x4a/0x90 [ 716.464999][T32718] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 716.465066][T32718] RIP: 0033:0x4665d9 [ 716.465081][T32718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000005000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000006000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 716.465098][T32718] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 716.465118][T32718] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 716.465130][T32718] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 716.465143][T32718] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 716.465156][T32718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 716.465169][T32718] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 716.587057][T32729] FAULT_INJECTION: forcing a failure. [ 716.587057][T32729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 716.587081][T32729] CPU: 0 PID: 32729 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 716.587099][T32729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.587108][T32729] Call Trace: [ 716.587130][T32729] dump_stack+0x137/0x19d [ 716.587159][T32729] should_fail+0x23c/0x250 [ 716.587187][T32729] __alloc_pages+0x102/0x320 [ 716.587206][T32729] alloc_pages_vma+0x391/0x660 [ 716.587226][T32729] ? unlock_page_memcg+0xc3/0xe0 [ 716.587241][T32729] ? page_remove_rmap+0x1de/0x230 [ 716.587263][T32729] wp_page_copy+0x14c/0x10c0 [ 716.587284][T32729] ? release_pages+0x8d0/0x900 [ 716.587326][T32729] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 716.587348][T32729] ? __list_add_valid+0x28/0x90 [ 716.587364][T32729] do_wp_page+0x5a8/0xba0 [ 716.587426][T32729] handle_mm_fault+0xb31/0x1a70 [ 716.587453][T32729] ? follow_page_mask+0xc2c/0x1040 [ 716.587471][T32729] __get_user_pages+0x947/0xee0 [ 716.587489][T32729] populate_vma_page_range+0xaf/0xc0 [ 716.587545][T32729] mprotect_fixup+0x3a4/0x570 [ 716.587562][T32729] do_mprotect_pkey+0x543/0x6f0 [ 716.587608][T32729] __x64_sys_mprotect+0x44/0x50 [ 716.587627][T32729] do_syscall_64+0x4a/0x90 [ 716.587649][T32729] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 716.587698][T32729] RIP: 0033:0x4665d9 [ 716.587712][T32729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 716.587729][T32729] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 716.587747][T32729] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 716.587758][T32729] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 716.587769][T32729] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 716.587779][T32729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 716.587790][T32729] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 716.678225][T32741] FAULT_INJECTION: forcing a failure. [ 716.678225][T32741] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 716.915201][T32741] CPU: 0 PID: 32741 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 716.923975][T32741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.934112][T32741] Call Trace: [ 716.934124][T32741] dump_stack+0x137/0x19d [ 716.934155][T32741] should_fail+0x23c/0x250 [ 716.934227][T32741] __alloc_pages+0x102/0x320 [ 716.934248][T32741] alloc_pages_vma+0x391/0x660 [ 716.934268][T32741] ? unlock_page_memcg+0xc3/0xe0 [ 716.934286][T32741] ? page_remove_rmap+0x1de/0x230 [ 716.934377][T32741] wp_page_copy+0x14c/0x10c0 [ 716.934399][T32741] ? release_pages+0x8d0/0x900 [ 716.934415][T32741] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 716.934485][T32741] ? __list_add_valid+0x28/0x90 [ 716.934500][T32741] do_wp_page+0x5a8/0xba0 [ 716.934518][T32741] handle_mm_fault+0xb31/0x1a70 [ 716.934540][T32741] ? follow_page_mask+0xc2c/0x1040 [ 716.934560][T32741] __get_user_pages+0x947/0xee0 [ 716.934581][T32741] populate_vma_page_range+0xaf/0xc0 [ 716.934630][T32741] mprotect_fixup+0x3a4/0x570 [ 716.934646][T32741] do_mprotect_pkey+0x543/0x6f0 [ 716.934668][T32741] __x64_sys_mprotect+0x44/0x50 [ 716.934701][T32741] do_syscall_64+0x4a/0x90 [ 716.934722][T32741] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 716.934748][T32741] RIP: 0033:0x4665d9 [ 716.934763][T32741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 716.934785][T32741] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 716.934804][T32741] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 716.934827][T32741] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:04:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xb}]}, 0x78) 08:04:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a00}, [{}]}, 0x78) 08:04:58 executing program 0 (fault-call:3 fault-nth:76): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000007000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xc000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000}]}, 0x78) 08:04:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xd000000, 0x0, 0x40}, [{}]}, 0x78) [ 716.934838][T32741] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 716.934849][T32741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 716.934861][T32741] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000008000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 08:04:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xc}]}, 0x78) 08:04:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b00}, [{}]}, 0x78) 08:04:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xe000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:58 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9b}]}, 0x78) 08:04:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000010000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:59 executing program 0 (fault-call:3 fault-nth:77): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000011000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 717.237774][ T309] FAULT_INJECTION: forcing a failure. [ 717.237774][ T309] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 717.251441][ T309] CPU: 1 PID: 309 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 717.260227][ T309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.270615][ T309] Call Trace: [ 717.270626][ T309] dump_stack+0x137/0x19d 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000018000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 717.270656][ T309] should_fail+0x23c/0x250 [ 717.270752][ T309] __alloc_pages+0x102/0x320 [ 717.270771][ T309] alloc_pages_vma+0x391/0x660 [ 717.270790][ T309] ? unlock_page_memcg+0xc3/0xe0 [ 717.270805][ T309] ? page_remove_rmap+0x1de/0x230 [ 717.270826][ T309] wp_page_copy+0x14c/0x10c0 [ 717.270885][ T309] ? release_pages+0x8d0/0x900 [ 717.270905][ T309] ? mem_cgroup_update_lru_size+0x53/0xf0 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000001c000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000026000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 717.270931][ T309] ? __list_add_valid+0x28/0x90 [ 717.270950][ T309] do_wp_page+0x5a8/0xba0 [ 717.271040][ T309] handle_mm_fault+0xb31/0x1a70 [ 717.271060][ T309] ? follow_page_mask+0xc2c/0x1040 [ 717.271080][ T309] __get_user_pages+0x947/0xee0 [ 717.271099][ T309] populate_vma_page_range+0xaf/0xc0 [ 717.271119][ T309] mprotect_fixup+0x3a4/0x570 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000000000fe000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 717.271166][ T309] do_mprotect_pkey+0x543/0x6f0 [ 717.271182][ T309] __x64_sys_mprotect+0x44/0x50 [ 717.271203][ T309] do_syscall_64+0x4a/0x90 [ 717.271223][ T309] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 717.271272][ T309] RIP: 0033:0x4665d9 [ 717.271287][ T309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.271304][ T309] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000004020b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 717.271325][ T309] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 717.271337][ T309] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 717.271349][ T309] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 717.271360][ T309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 717.271371][ T309] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 717.388712][ T321] FAULT_INJECTION: forcing a failure. [ 717.388712][ T321] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 717.492659][ T321] CPU: 1 PID: 321 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 717.492684][ T321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.492693][ T321] Call Trace: [ 717.492703][ T321] dump_stack+0x137/0x19d [ 717.492731][ T321] should_fail+0x23c/0x250 [ 717.492805][ T321] __alloc_pages+0x102/0x320 [ 717.492875][ T321] alloc_pages_vma+0x391/0x660 [ 717.492891][ T321] ? unlock_page_memcg+0xc3/0xe0 [ 717.492906][ T321] ? page_remove_rmap+0x1de/0x230 [ 717.492991][ T321] wp_page_copy+0x14c/0x10c0 [ 717.493015][ T321] ? release_pages+0x8d0/0x900 [ 717.493032][ T321] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 717.493056][ T321] ? __list_add_valid+0x28/0x90 [ 717.493076][ T321] do_wp_page+0x5a8/0xba0 [ 717.493110][ T321] handle_mm_fault+0xb31/0x1a70 [ 717.493130][ T321] ? follow_page_mask+0xc2c/0x1040 [ 717.493150][ T321] __get_user_pages+0x947/0xee0 [ 717.493245][ T321] populate_vma_page_range+0xaf/0xc0 [ 717.493341][ T321] mprotect_fixup+0x3a4/0x570 [ 717.493358][ T321] do_mprotect_pkey+0x543/0x6f0 [ 717.493373][ T321] __x64_sys_mprotect+0x44/0x50 [ 717.493387][ T321] do_syscall_64+0x4a/0x90 [ 717.493413][ T321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 717.493486][ T321] RIP: 0033:0x4665d9 08:04:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xd}]}, 0x78) [ 717.493498][ T321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 717.493511][ T321] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 717.493526][ T321] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 717.493605][ T321] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 717.493620][ T321] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 717.493652][ T321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3f00}, [{}]}, 0x78) 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000030b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:59 executing program 0 (fault-call:3 fault-nth:78): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}]}, 0x78) 08:04:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe}]}, 0x78) [ 717.493663][ T321] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:04:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7f00}, [{}]}, 0x78) 08:04:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x18000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000002040b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf}]}, 0x78) 08:04:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x1a000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 08:04:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc000}, [{}]}, 0x78) [ 717.896486][ T376] FAULT_INJECTION: forcing a failure. [ 717.896486][ T376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 717.909964][ T376] CPU: 0 PID: 376 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 717.919050][ T376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.929455][ T376] Call Trace: [ 717.932754][ T376] dump_stack+0x137/0x19d [ 717.937103][ T376] should_fail+0x23c/0x250 [ 717.941536][ T376] __alloc_pages+0x102/0x320 [ 717.946257][ T376] alloc_pages_vma+0x391/0x660 [ 717.951043][ T376] ? unlock_page_memcg+0xc3/0xe0 [ 717.956005][ T376] ? page_remove_rmap+0x1de/0x230 [ 717.961022][ T376] wp_page_copy+0x14c/0x10c0 [ 717.965656][ T376] ? release_pages+0x8d0/0x900 [ 717.970410][ T376] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 717.976211][ T376] ? __list_add_valid+0x28/0x90 [ 717.981166][ T376] do_wp_page+0x5a8/0xba0 [ 717.985595][ T376] handle_mm_fault+0xb31/0x1a70 [ 717.990590][ T376] ? follow_page_mask+0xc2c/0x1040 [ 717.995693][ T376] __get_user_pages+0x947/0xee0 [ 718.000562][ T376] populate_vma_page_range+0xaf/0xc0 [ 718.005838][ T376] mprotect_fixup+0x3a4/0x570 [ 718.010504][ T376] do_mprotect_pkey+0x543/0x6f0 [ 718.015378][ T376] __x64_sys_mprotect+0x44/0x50 [ 718.020482][ T376] do_syscall_64+0x4a/0x90 [ 718.025344][ T376] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 718.031501][ T376] RIP: 0033:0x4665d9 [ 718.035701][ T376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.055555][ T376] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 718.064145][ T376] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 718.072630][ T376] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 718.080596][ T376] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.088796][ T376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:04:59 executing program 0 (fault-call:3 fault-nth:79): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000006040b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x1b000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe000}, [{}]}, 0x78) 08:04:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x18}]}, 0x78) 08:04:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) 08:04:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf000}, [{}]}, 0x78) 08:04:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x3f000000, 0x0, 0x40}, [{}]}, 0x78) 08:04:59 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) [ 718.097156][ T376] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:04:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000080040b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:04:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x19}]}, 0x78) 08:04:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf800}, [{}]}, 0x78) [ 718.263711][ T408] FAULT_INJECTION: forcing a failure. [ 718.263711][ T408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.277115][ T408] CPU: 1 PID: 408 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 718.285712][ T408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.295832][ T408] Call Trace: [ 718.299769][ T408] dump_stack+0x137/0x19d [ 718.304364][ T408] should_fail+0x23c/0x250 [ 718.308773][ T408] __alloc_pages+0x102/0x320 [ 718.313479][ T408] alloc_pages_vma+0x391/0x660 [ 718.318591][ T408] ? unlock_page_memcg+0xc3/0xe0 [ 718.323523][ T408] ? page_remove_rmap+0x1de/0x230 [ 718.328854][ T408] wp_page_copy+0x14c/0x10c0 [ 718.333548][ T408] ? release_pages+0x8d0/0x900 [ 718.338405][ T408] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 718.344210][ T408] ? __list_add_valid+0x28/0x90 [ 718.349157][ T408] do_wp_page+0x5a8/0xba0 [ 718.353722][ T408] handle_mm_fault+0xb31/0x1a70 [ 718.358562][ T408] ? follow_page_mask+0xc2c/0x1040 [ 718.363662][ T408] __get_user_pages+0x947/0xee0 [ 718.368520][ T408] populate_vma_page_range+0xaf/0xc0 [ 718.373854][ T408] mprotect_fixup+0x3a4/0x570 [ 718.378529][ T408] do_mprotect_pkey+0x543/0x6f0 [ 718.383388][ T408] __x64_sys_mprotect+0x44/0x50 [ 718.388373][ T408] do_syscall_64+0x4a/0x90 [ 718.392831][ T408] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 718.398859][ T408] RIP: 0033:0x4665d9 [ 718.402828][ T408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.422658][ T408] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 718.431064][ T408] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 718.439115][ T408] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 718.447104][ T408] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.455280][ T408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 08:05:00 executing program 0 (fault-call:3 fault-nth:80): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 08:05:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x7f000000, 0x0, 0x40}, [{}]}, 0x78) 08:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000050b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1a}]}, 0x78) 08:05:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xfc00}, [{}]}, 0x78) 08:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000031050b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 718.463251][ T408] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:05:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1b}]}, 0x78) 08:05:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf00000}, [{}]}, 0x78) 08:05:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 08:05:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x9bffffff, 0x0, 0x40}, [{}]}, 0x78) 08:05:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xc0}]}, 0x78) [ 718.607090][ T434] FAULT_INJECTION: forcing a failure. [ 718.607090][ T434] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.620497][ T434] CPU: 1 PID: 434 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 718.620523][ T434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.620535][ T434] Call Trace: [ 718.620543][ T434] dump_stack+0x137/0x19d [ 718.620603][ T434] should_fail+0x23c/0x250 [ 718.620623][ T434] __alloc_pages+0x102/0x320 08:05:00 executing program 0 (fault-call:3 fault-nth:81): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 08:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000060b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 718.620642][ T434] alloc_pages_vma+0x391/0x660 [ 718.660964][ T434] ? unlock_page_memcg+0xc3/0xe0 [ 718.660990][ T434] ? page_remove_rmap+0x1de/0x230 [ 718.661009][ T434] wp_page_copy+0x14c/0x10c0 [ 718.661106][ T434] ? release_pages+0x8d0/0x900 [ 718.661120][ T434] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 718.661140][ T434] ? __list_add_valid+0x28/0x90 [ 718.661159][ T434] do_wp_page+0x5a8/0xba0 08:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000004060b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 718.661196][ T434] handle_mm_fault+0xb31/0x1a70 [ 718.661215][ T434] ? follow_page_mask+0xc2c/0x1040 [ 718.661231][ T434] __get_user_pages+0x947/0xee0 [ 718.661248][ T434] populate_vma_page_range+0xaf/0xc0 [ 718.661265][ T434] mprotect_fixup+0x3a4/0x570 [ 718.661318][ T434] do_mprotect_pkey+0x543/0x6f0 08:05:00 executing program 0 (fault-call:3 fault-nth:82): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000070b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 718.661332][ T434] __x64_sys_mprotect+0x44/0x50 [ 718.661346][ T434] do_syscall_64+0x4a/0x90 [ 718.661395][ T434] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 718.661425][ T434] RIP: 0033:0x4665d9 08:05:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xc0000000, 0x0, 0x40}, [{}]}, 0x78) [ 718.661439][ T434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.661453][ T434] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 718.661469][ T434] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 718.661528][ T434] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000110b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 718.661538][ T434] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.661548][ T434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 718.661557][ T434] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 718.775693][ T447] FAULT_INJECTION: forcing a failure. [ 718.775693][ T447] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 718.775793][ T447] CPU: 1 PID: 447 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 718.775817][ T447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.775828][ T447] Call Trace: [ 718.775837][ T447] dump_stack+0x137/0x19d [ 718.775927][ T447] should_fail+0x23c/0x250 [ 718.775944][ T447] __alloc_pages+0x102/0x320 [ 718.775963][ T447] alloc_pages_vma+0x391/0x660 [ 718.775983][ T447] ? unlock_page_memcg+0xc3/0xe0 [ 718.776055][ T447] ? page_remove_rmap+0x1de/0x230 [ 718.776079][ T447] wp_page_copy+0x14c/0x10c0 [ 718.776167][ T447] ? release_pages+0x8d0/0x900 [ 718.776187][ T447] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 718.776224][ T447] ? __list_add_valid+0x28/0x90 [ 718.776276][ T447] do_wp_page+0x5a8/0xba0 [ 718.776296][ T447] handle_mm_fault+0xb31/0x1a70 [ 718.776320][ T447] ? follow_page_mask+0xc2c/0x1040 [ 718.776342][ T447] __get_user_pages+0x947/0xee0 [ 718.776386][ T447] populate_vma_page_range+0xaf/0xc0 [ 718.776404][ T447] mprotect_fixup+0x3a4/0x570 [ 718.776422][ T447] do_mprotect_pkey+0x543/0x6f0 [ 718.776441][ T447] __x64_sys_mprotect+0x44/0x50 [ 718.776457][ T447] do_syscall_64+0x4a/0x90 [ 718.776475][ T447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 718.776559][ T447] RIP: 0033:0x4665d9 [ 718.776573][ T447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 718.776587][ T447] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 718.776635][ T447] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 718.776646][ T447] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 718.776658][ T447] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 718.776670][ T447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 718.776683][ T447] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 718.856254][ T452] FAULT_INJECTION: forcing a failure. [ 718.856254][ T452] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 719.105480][ T452] CPU: 1 PID: 452 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 08:05:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1000000}, [{}]}, 0x78) 08:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000180b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.105560][ T452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.105569][ T452] Call Trace: [ 719.105577][ T452] dump_stack+0x137/0x19d [ 719.105601][ T452] should_fail+0x23c/0x250 [ 719.137257][ T452] __alloc_pages+0x102/0x320 [ 719.141874][ T452] alloc_pages_vma+0x391/0x660 [ 719.141900][ T452] ? unlock_page_memcg+0xc3/0xe0 [ 719.141914][ T452] ? page_remove_rmap+0x1de/0x230 [ 719.141935][ T452] wp_page_copy+0x14c/0x10c0 08:05:00 executing program 0 (fault-call:3 fault-nth:83): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 719.141955][ T452] ? release_pages+0x8d0/0x900 [ 719.166448][ T452] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 719.166486][ T452] ? __list_add_valid+0x28/0x90 [ 719.166507][ T452] do_wp_page+0x5a8/0xba0 [ 719.166530][ T452] handle_mm_fault+0xb31/0x1a70 [ 719.166553][ T452] ? follow_page_mask+0xc2c/0x1040 [ 719.166595][ T452] __get_user_pages+0x947/0xee0 [ 719.166615][ T452] populate_vma_page_range+0xaf/0xc0 08:05:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe0}]}, 0x78) 08:05:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000000000001c0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.166664][ T452] mprotect_fixup+0x3a4/0x570 [ 719.166683][ T452] do_mprotect_pkey+0x543/0x6f0 [ 719.166702][ T452] __x64_sys_mprotect+0x44/0x50 [ 719.166721][ T452] do_syscall_64+0x4a/0x90 [ 719.166858][ T452] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 719.166882][ T452] RIP: 0033:0x4665d9 [ 719.166897][ T452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 719.166911][ T452] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 719.166926][ T452] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 719.166935][ T452] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 719.166944][ T452] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 719.166954][ T452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 719.167040][ T452] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:05:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x78) 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000200b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.253671][ T468] FAULT_INJECTION: forcing a failure. [ 719.253671][ T468] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 719.334015][ T468] CPU: 0 PID: 468 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 719.334037][ T468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.334046][ T468] Call Trace: [ 719.334055][ T468] dump_stack+0x137/0x19d [ 719.334079][ T468] should_fail+0x23c/0x250 [ 719.334110][ T468] __alloc_pages+0x102/0x320 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000260b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:01 executing program 0 (fault-call:3 fault-nth:84): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 719.370897][ T468] alloc_pages_vma+0x391/0x660 [ 719.375686][ T468] ? unlock_page_memcg+0xc3/0xe0 [ 719.375710][ T468] ? page_remove_rmap+0x1de/0x230 [ 719.375730][ T468] wp_page_copy+0x14c/0x10c0 [ 719.390358][ T468] ? release_pages+0x8d0/0x900 [ 719.390391][ T468] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 719.390484][ T468] ? __list_add_valid+0x28/0x90 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000005310b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.390506][ T468] do_wp_page+0x5a8/0xba0 [ 719.390525][ T468] handle_mm_fault+0xb31/0x1a70 [ 719.390607][ T468] ? follow_page_mask+0xc2c/0x1040 [ 719.390625][ T468] __get_user_pages+0x947/0xee0 [ 719.390645][ T468] populate_vma_page_range+0xaf/0xc0 [ 719.390673][ T468] mprotect_fixup+0x3a4/0x570 [ 719.390691][ T468] do_mprotect_pkey+0x543/0x6f0 [ 719.390778][ T468] __x64_sys_mprotect+0x44/0x50 08:05:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xe0000000, 0x0, 0x40}, [{}]}, 0x78) 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000000000003f0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.390824][ T468] do_syscall_64+0x4a/0x90 [ 719.390845][ T468] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 719.390872][ T468] RIP: 0033:0x4665d9 [ 719.390888][ T468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 719.390905][ T468] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 719.390925][ T468] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 719.390938][ T468] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 719.390951][ T468] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 719.390984][ T468] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 719.390993][ T468] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 719.507279][ T487] FAULT_INJECTION: forcing a failure. [ 719.507279][ T487] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 719.572281][ T487] CPU: 1 PID: 487 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 719.572299][ T487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.572306][ T487] Call Trace: [ 719.572312][ T487] dump_stack+0x137/0x19d [ 719.572331][ T487] should_fail+0x23c/0x250 [ 719.572399][ T487] __alloc_pages+0x102/0x320 [ 719.572411][ T487] alloc_pages_vma+0x391/0x660 [ 719.572424][ T487] ? unlock_page_memcg+0xc3/0xe0 [ 719.572454][ T487] ? page_remove_rmap+0x1de/0x230 [ 719.572467][ T487] wp_page_copy+0x14c/0x10c0 [ 719.572481][ T487] ? release_pages+0x8d0/0x900 [ 719.572492][ T487] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 719.572540][ T487] ? __list_add_valid+0x28/0x90 [ 719.572551][ T487] do_wp_page+0x5a8/0xba0 [ 719.572563][ T487] handle_mm_fault+0xb31/0x1a70 [ 719.572608][ T487] ? follow_page_mask+0xc2c/0x1040 [ 719.572619][ T487] __get_user_pages+0x947/0xee0 [ 719.572709][ T487] populate_vma_page_range+0xaf/0xc0 [ 719.572720][ T487] mprotect_fixup+0x3a4/0x570 [ 719.572731][ T487] do_mprotect_pkey+0x543/0x6f0 [ 719.572742][ T487] __x64_sys_mprotect+0x44/0x50 [ 719.572887][ T487] do_syscall_64+0x4a/0x90 [ 719.572900][ T487] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 719.572914][ T487] RIP: 0033:0x4665d9 [ 719.572923][ T487] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:05:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1800000}, [{}]}, 0x78) 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000004800b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:01 executing program 0 (fault-call:3 fault-nth:85): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf0}]}, 0x78) 08:05:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf0000000, 0x0, 0x40}, [{}]}, 0x78) 08:05:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}]}, 0x78) [ 719.572934][ T487] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 719.572946][ T487] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 719.572952][ T487] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 719.572959][ T487] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 719.572990][ T487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 719.573036][ T487] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000000000fffe0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2000000}, [{}]}, 0x78) 08:05:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf8}]}, 0x78) 08:05:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xf8000000, 0x0, 0x40}, [{}]}, 0x78) 08:05:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}]}, 0x78) 08:05:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7000000}, [{}]}, 0x78) 08:05:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xfc000000, 0x0, 0x40}, [{}]}, 0x78) 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000000000feff0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:01 executing program 0 (fault-call:3 fault-nth:86): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xfc}]}, 0x78) 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000050000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.930796][ T526] FAULT_INJECTION: forcing a failure. [ 719.930796][ T526] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 719.944296][ T526] CPU: 1 PID: 526 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 719.952987][ T526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.963291][ T526] Call Trace: [ 719.963304][ T526] dump_stack+0x137/0x19d 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000020b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.963393][ T526] should_fail+0x23c/0x250 [ 719.963412][ T526] __alloc_pages+0x102/0x320 [ 719.963428][ T526] alloc_pages_vma+0x391/0x660 [ 719.963445][ T526] ? unlock_page_memcg+0xc3/0xe0 [ 719.963515][ T526] ? page_remove_rmap+0x1de/0x230 [ 719.963534][ T526] wp_page_copy+0x14c/0x10c0 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000030b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.963560][ T526] ? release_pages+0x8d0/0x900 [ 719.963631][ T526] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 719.963721][ T526] ? __list_add_valid+0x28/0x90 [ 719.963738][ T526] do_wp_page+0x5a8/0xba0 [ 719.963771][ T526] handle_mm_fault+0xb31/0x1a70 [ 719.963793][ T526] ? follow_page_mask+0xc2c/0x1040 [ 719.963814][ T526] __get_user_pages+0x947/0xee0 [ 719.963884][ T526] populate_vma_page_range+0xaf/0xc0 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000040b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000050b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.963903][ T526] mprotect_fixup+0x3a4/0x570 [ 719.963919][ T526] do_mprotect_pkey+0x543/0x6f0 [ 719.963940][ T526] __x64_sys_mprotect+0x44/0x50 [ 719.963959][ T526] do_syscall_64+0x4a/0x90 [ 719.964013][ T526] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 719.964037][ T526] RIP: 0033:0x4665d9 [ 719.964052][ T526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 08:05:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000060b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 719.964068][ T526] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 719.964084][ T526] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 719.964093][ T526] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 719.964102][ T526] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 719.964111][ T526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 719.964151][ T526] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 720.091182][ T541] FAULT_INJECTION: forcing a failure. [ 720.091182][ T541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 720.198755][ T541] CPU: 1 PID: 541 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 720.198783][ T541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.198868][ T541] Call Trace: [ 720.198876][ T541] dump_stack+0x137/0x19d [ 720.198900][ T541] should_fail+0x23c/0x250 [ 720.198917][ T541] __alloc_pages+0x102/0x320 [ 720.198940][ T541] alloc_pages_vma+0x391/0x660 [ 720.199021][ T541] ? unlock_page_memcg+0xc3/0xe0 [ 720.199035][ T541] ? page_remove_rmap+0x1de/0x230 [ 720.199056][ T541] wp_page_copy+0x14c/0x10c0 [ 720.199083][ T541] ? release_pages+0x8d0/0x900 [ 720.199124][ T541] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 720.199148][ T541] ? __list_add_valid+0x28/0x90 [ 720.199168][ T541] do_wp_page+0x5a8/0xba0 [ 720.199192][ T541] handle_mm_fault+0xb31/0x1a70 [ 720.199290][ T541] ? follow_page_mask+0xc2c/0x1040 08:05:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}]}, 0x78) 08:05:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x8000000}, [{}]}, 0x78) [ 720.199325][ T541] __get_user_pages+0x947/0xee0 [ 720.199352][ T541] populate_vma_page_range+0xaf/0xc0 [ 720.199374][ T541] mprotect_fixup+0x3a4/0x570 [ 720.300597][ T541] do_mprotect_pkey+0x543/0x6f0 [ 720.300629][ T541] __x64_sys_mprotect+0x44/0x50 [ 720.300645][ T541] do_syscall_64+0x4a/0x90 [ 720.300703][ T541] ? irqentry_exit_to_user_mode+0x5/0x20 [ 720.300769][ T541] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 720.326638][ T541] RIP: 0033:0x4665d9 [ 720.330547][ T541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.330565][ T541] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 720.330583][ T541] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 720.330594][ T541] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 720.330606][ T541] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 08:05:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xffffff9b, 0x0, 0x40}, [{}]}, 0x78) 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000070b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x78) 08:05:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x180}]}, 0x78) 08:05:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9000000}, [{}]}, 0x78) 08:05:02 executing program 0 (fault-call:3 fault-nth:87): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 720.330617][ T541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 720.391267][ T541] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:05:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}]}, 0x78) 08:05:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0xffffffff, 0x0, 0x40}, [{}]}, 0x78) 08:05:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xa000000}, [{}]}, 0x78) 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000080b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x3e8}]}, 0x78) 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000110b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 720.524549][ T575] FAULT_INJECTION: forcing a failure. [ 720.524549][ T575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 720.538227][ T575] CPU: 0 PID: 575 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 720.538251][ T575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.538262][ T575] Call Trace: [ 720.538271][ T575] dump_stack+0x137/0x19d [ 720.538372][ T575] should_fail+0x23c/0x250 [ 720.538394][ T575] __alloc_pages+0x102/0x320 08:05:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000}]}, 0x78) [ 720.538411][ T575] alloc_pages_vma+0x391/0x660 [ 720.538429][ T575] ? unlock_page_memcg+0xc3/0xe0 [ 720.538445][ T575] ? page_remove_rmap+0x1de/0x230 [ 720.538464][ T575] wp_page_copy+0x14c/0x10c0 [ 720.538540][ T575] ? release_pages+0x8d0/0x900 [ 720.538574][ T575] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 720.538595][ T575] ? __list_add_valid+0x28/0x90 [ 720.538660][ T575] do_wp_page+0x5a8/0xba0 [ 720.538677][ T575] handle_mm_fault+0xb31/0x1a70 [ 720.538698][ T575] ? follow_page_mask+0xc2c/0x1040 08:05:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xb000000}, [{}]}, 0x78) 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000180b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:02 executing program 0 (fault-call:3 fault-nth:88): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 720.623277][ T575] __get_user_pages+0x947/0xee0 [ 720.628236][ T575] populate_vma_page_range+0xaf/0xc0 [ 720.628268][ T575] mprotect_fixup+0x3a4/0x570 [ 720.638230][ T575] do_mprotect_pkey+0x543/0x6f0 [ 720.643171][ T575] __x64_sys_mprotect+0x44/0x50 [ 720.648209][ T575] do_syscall_64+0x4a/0x90 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f0000000000000000010000000000001c0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 720.652640][ T575] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 720.652673][ T575] RIP: 0033:0x4665d9 [ 720.652695][ T575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.652712][ T575] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000260b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:02 executing program 0 (fault-call:3 fault-nth:89): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 720.652728][ T575] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 720.652738][ T575] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 720.652747][ T575] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 720.652756][ T575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 720.652765][ T575] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 720.762473][ T606] FAULT_INJECTION: forcing a failure. [ 720.762473][ T606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 720.762498][ T606] CPU: 1 PID: 606 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 720.762517][ T606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 08:05:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x2, 0x40}, [{}]}, 0x78) 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000fe0b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000400000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 720.762557][ T606] Call Trace: [ 720.762565][ T606] dump_stack+0x137/0x19d [ 720.762592][ T606] should_fail+0x23c/0x250 [ 720.762662][ T606] __alloc_pages+0x102/0x320 [ 720.762680][ T606] alloc_pages_vma+0x391/0x660 [ 720.762700][ T606] ? unlock_page_memcg+0xc3/0xe0 [ 720.762718][ T606] ? page_remove_rmap+0x1de/0x230 [ 720.762739][ T606] wp_page_copy+0x14c/0x10c0 [ 720.762762][ T606] ? release_pages+0x8d0/0x900 [ 720.762805][ T606] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 720.762867][ T606] ? __list_add_valid+0x28/0x90 [ 720.762886][ T606] do_wp_page+0x5a8/0xba0 [ 720.762906][ T606] handle_mm_fault+0xb31/0x1a70 [ 720.762924][ T606] ? follow_page_mask+0xc2c/0x1040 [ 720.762940][ T606] __get_user_pages+0x947/0xee0 [ 720.763035][ T606] populate_vma_page_range+0xaf/0xc0 [ 720.763056][ T606] mprotect_fixup+0x3a4/0x570 [ 720.763075][ T606] do_mprotect_pkey+0x543/0x6f0 [ 720.763095][ T606] __x64_sys_mprotect+0x44/0x50 [ 720.763114][ T606] do_syscall_64+0x4a/0x90 [ 720.763210][ T606] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 720.763260][ T606] RIP: 0033:0x4665d9 [ 720.763274][ T606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.763292][ T606] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 720.763342][ T606] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 720.763351][ T606] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 720.763360][ T606] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 720.763369][ T606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 720.763380][ T606] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 720.856465][ T613] FAULT_INJECTION: forcing a failure. [ 720.856465][ T613] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:05:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x500}]}, 0x78) 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000fffe0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 721.019820][ T613] CPU: 1 PID: 613 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 721.019846][ T613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.019858][ T613] Call Trace: [ 721.019867][ T613] dump_stack+0x137/0x19d [ 721.019897][ T613] should_fail+0x23c/0x250 [ 721.051631][ T613] __alloc_pages+0x102/0x320 [ 721.056245][ T613] alloc_pages_vma+0x391/0x660 [ 721.056272][ T613] ? unlock_page_memcg+0xc3/0xe0 [ 721.056289][ T613] ? page_remove_rmap+0x1de/0x230 [ 721.056365][ T613] wp_page_copy+0x14c/0x10c0 08:05:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000}]}, 0x78) 08:05:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc000000}, [{}]}, 0x78) 08:05:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x7, 0x40}, [{}]}, 0x78) [ 721.056386][ T613] ? release_pages+0x8d0/0x900 [ 721.056406][ T613] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 721.086690][ T613] ? __list_add_valid+0x28/0x90 [ 721.086719][ T613] do_wp_page+0x5a8/0xba0 [ 721.097484][ T613] handle_mm_fault+0xb31/0x1a70 [ 721.102397][ T613] ? follow_page_mask+0xc2c/0x1040 [ 721.102420][ T613] __get_user_pages+0x947/0xee0 [ 721.102437][ T613] populate_vma_page_range+0xaf/0xc0 [ 721.102471][ T613] mprotect_fixup+0x3a4/0x570 [ 721.102489][ T613] do_mprotect_pkey+0x543/0x6f0 [ 721.102508][ T613] __x64_sys_mprotect+0x44/0x50 [ 721.102526][ T613] do_syscall_64+0x4a/0x90 [ 721.137027][ T613] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 721.143032][ T613] RIP: 0033:0x4665d9 [ 721.147102][ T613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 721.166834][ T613] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:05:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000050000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:02 executing program 0 (fault-call:3 fault-nth:90): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x8, 0x40}, [{}]}, 0x78) 08:05:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x600}]}, 0x78) 08:05:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xd000000}, [{}]}, 0x78) 08:05:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000}]}, 0x78) [ 721.175700][ T613] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 721.175719][ T613] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 721.175729][ T613] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 721.175738][ T613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 721.175750][ T613] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:05:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe000000}, [{}]}, 0x78) 08:05:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x9, 0x40}, [{}]}, 0x78) 08:05:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x700}]}, 0x78) 08:05:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000fe0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x78) 08:05:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf000000}, [{}]}, 0x78) 08:05:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x900}]}, 0x78) [ 721.410614][ T668] FAULT_INJECTION: forcing a failure. [ 721.410614][ T668] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 721.424099][ T668] CPU: 0 PID: 668 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 721.424122][ T668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.424199][ T668] Call Trace: [ 721.424206][ T668] dump_stack+0x137/0x19d [ 721.424233][ T668] should_fail+0x23c/0x250 [ 721.424254][ T668] __alloc_pages+0x102/0x320 [ 721.424308][ T668] alloc_pages_vma+0x391/0x660 [ 721.465788][ T668] ? unlock_page_memcg+0xc3/0xe0 [ 721.470921][ T668] ? page_remove_rmap+0x1de/0x230 [ 721.470955][ T668] wp_page_copy+0x14c/0x10c0 [ 721.470989][ T668] ? release_pages+0x8d0/0x900 [ 721.471008][ T668] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 721.491256][ T668] ? __list_add_valid+0x28/0x90 [ 721.491280][ T668] do_wp_page+0x5a8/0xba0 [ 721.491302][ T668] handle_mm_fault+0xb31/0x1a70 [ 721.491387][ T668] ? follow_page_mask+0xc2c/0x1040 [ 721.491407][ T668] __get_user_pages+0x947/0xee0 [ 721.491428][ T668] populate_vma_page_range+0xaf/0xc0 [ 721.491499][ T668] mprotect_fixup+0x3a4/0x570 [ 721.491535][ T668] do_mprotect_pkey+0x543/0x6f0 [ 721.491555][ T668] __x64_sys_mprotect+0x44/0x50 [ 721.491573][ T668] do_syscall_64+0x4a/0x90 [ 721.540363][ T668] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 721.546894][ T668] RIP: 0033:0x4665d9 [ 721.550778][ T668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 721.571598][ T668] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 721.580333][ T668] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 721.588383][ T668] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 721.596352][ T668] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 08:05:03 executing program 0 (fault-call:3 fault-nth:91): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xa, 0x40}, [{}]}, 0x78) 08:05:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000}]}, 0x78) 08:05:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000feff00008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xa00}]}, 0x78) 08:05:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x18000000}, [{}]}, 0x78) 08:05:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a000000}, [{}]}, 0x78) 08:05:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xb, 0x40}, [{}]}, 0x78) [ 721.604398][ T668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 721.612582][ T668] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:05:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}]}, 0x78) 08:05:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f00000000000000000100000000000000feffffff8000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xb00}]}, 0x78) 08:05:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xc, 0x40}, [{}]}, 0x78) [ 721.800653][ T701] FAULT_INJECTION: forcing a failure. [ 721.800653][ T701] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 721.814150][ T701] CPU: 0 PID: 701 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 721.823096][ T701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.834323][ T701] Call Trace: [ 721.837778][ T701] dump_stack+0x137/0x19d [ 721.842230][ T701] should_fail+0x23c/0x250 [ 721.846712][ T701] __alloc_pages+0x102/0x320 [ 721.851589][ T701] alloc_pages_vma+0x391/0x660 [ 721.856416][ T701] ? unlock_page_memcg+0xc3/0xe0 [ 721.861372][ T701] ? page_remove_rmap+0x1de/0x230 [ 721.866387][ T701] wp_page_copy+0x14c/0x10c0 [ 721.871086][ T701] ? release_pages+0x8d0/0x900 [ 721.876732][ T701] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 721.882444][ T701] ? __list_add_valid+0x28/0x90 [ 721.887284][ T701] do_wp_page+0x5a8/0xba0 [ 721.892448][ T701] handle_mm_fault+0xb31/0x1a70 [ 721.897330][ T701] ? follow_page_mask+0xc2c/0x1040 [ 721.902461][ T701] __get_user_pages+0x947/0xee0 [ 721.907331][ T701] populate_vma_page_range+0xaf/0xc0 [ 721.912696][ T701] mprotect_fixup+0x3a4/0x570 [ 721.917508][ T701] do_mprotect_pkey+0x543/0x6f0 [ 721.922681][ T701] __x64_sys_mprotect+0x44/0x50 [ 721.927658][ T701] do_syscall_64+0x4a/0x90 [ 721.932102][ T701] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 721.938185][ T701] RIP: 0033:0x4665d9 [ 721.942374][ T701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 721.963059][ T701] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 721.971741][ T701] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 721.980502][ T701] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 721.988708][ T701] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 08:05:03 executing program 0 (fault-call:3 fault-nth:92): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b000000}, [{}]}, 0x78) 08:05:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 08:05:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000100000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xc00}]}, 0x78) 08:05:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xd, 0x40}, [{}]}, 0x78) [ 721.996673][ T701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 722.004730][ T701] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:05:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xd00}]}, 0x78) 08:05:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0200008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3f000000}, [{}]}, 0x78) 08:05:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9bffffff00000000}]}, 0x78) 08:05:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xe, 0x40}, [{}]}, 0x78) 08:05:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7f000000}, [{}]}, 0x78) [ 722.157910][ T734] FAULT_INJECTION: forcing a failure. [ 722.157910][ T734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 722.171485][ T734] CPU: 0 PID: 734 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 722.180142][ T734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.190462][ T734] Call Trace: [ 722.193737][ T734] dump_stack+0x137/0x19d [ 722.198156][ T734] should_fail+0x23c/0x250 [ 722.202578][ T734] __alloc_pages+0x102/0x320 08:05:03 executing program 0 (fault-call:3 fault-nth:93): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0300008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:03 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf, 0x40}, [{}]}, 0x78) 08:05:03 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000000000}]}, 0x78) 08:05:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe00}]}, 0x78) [ 722.207325][ T734] alloc_pages_vma+0x391/0x660 [ 722.212160][ T734] ? unlock_page_memcg+0xc3/0xe0 [ 722.217197][ T734] ? page_remove_rmap+0x1de/0x230 [ 722.217232][ T734] wp_page_copy+0x14c/0x10c0 [ 722.217257][ T734] ? release_pages+0x8d0/0x900 [ 722.217274][ T734] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 722.217432][ T734] ? __list_add_valid+0x28/0x90 [ 722.217452][ T734] do_wp_page+0x5a8/0xba0 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0400008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 722.217474][ T734] handle_mm_fault+0xb31/0x1a70 [ 722.217529][ T734] ? follow_page_mask+0xc2c/0x1040 [ 722.217545][ T734] __get_user_pages+0x947/0xee0 [ 722.217566][ T734] populate_vma_page_range+0xaf/0xc0 [ 722.217586][ T734] mprotect_fixup+0x3a4/0x570 [ 722.217632][ T734] do_mprotect_pkey+0x543/0x6f0 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0500008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0600008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 722.217676][ T734] __x64_sys_mprotect+0x44/0x50 [ 722.217691][ T734] do_syscall_64+0x4a/0x90 [ 722.217710][ T734] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 722.217788][ T734] RIP: 0033:0x4665d9 [ 722.217800][ T734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.217817][ T734] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0700008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 722.217890][ T734] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 722.217900][ T734] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 722.217909][ T734] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 722.218028][ T734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 722.218038][ T734] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 722.333419][ T746] FAULT_INJECTION: forcing a failure. 08:05:04 executing program 0 (fault-call:3 fault-nth:94): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0800008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 722.333419][ T746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 722.412488][ T746] CPU: 0 PID: 746 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 722.412507][ T746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.412515][ T746] Call Trace: [ 722.412523][ T746] dump_stack+0x137/0x19d [ 722.412546][ T746] should_fail+0x23c/0x250 [ 722.412564][ T746] __alloc_pages+0x102/0x320 [ 722.412582][ T746] alloc_pages_vma+0x391/0x660 [ 722.412609][ T746] ? unlock_page_memcg+0xc3/0xe0 [ 722.412622][ T746] ? page_remove_rmap+0x1de/0x230 [ 722.412637][ T746] wp_page_copy+0x14c/0x10c0 [ 722.412721][ T746] ? release_pages+0x8d0/0x900 [ 722.412736][ T746] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 722.412758][ T746] ? __list_add_valid+0x28/0x90 [ 722.412778][ T746] do_wp_page+0x5a8/0xba0 [ 722.412856][ T746] handle_mm_fault+0xb31/0x1a70 [ 722.412954][ T746] ? follow_page_mask+0xc2c/0x1040 [ 722.412974][ T746] __get_user_pages+0x947/0xee0 [ 722.412994][ T746] populate_vma_page_range+0xaf/0xc0 [ 722.413011][ T746] mprotect_fixup+0x3a4/0x570 [ 722.413026][ T746] do_mprotect_pkey+0x543/0x6f0 [ 722.413079][ T746] __x64_sys_mprotect+0x44/0x50 [ 722.413097][ T746] do_syscall_64+0x4a/0x90 [ 722.413117][ T746] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 722.413136][ T746] RIP: 0033:0x4665d9 [ 722.413147][ T746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.413165][ T746] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 722.413184][ T746] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 722.413239][ T746] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 722.413252][ T746] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 722.413264][ T746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 722.413273][ T746] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 [ 722.510374][ T767] FAULT_INJECTION: forcing a failure. [ 722.510374][ T767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 722.510399][ T767] CPU: 1 PID: 767 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 722.510418][ T767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.510428][ T767] Call Trace: [ 722.510435][ T767] dump_stack+0x137/0x19d [ 722.510458][ T767] should_fail+0x23c/0x250 [ 722.510473][ T767] __alloc_pages+0x102/0x320 [ 722.510512][ T767] alloc_pages_vma+0x391/0x660 [ 722.510526][ T767] ? unlock_page_memcg+0xc3/0xe0 [ 722.510538][ T767] ? page_remove_rmap+0x1de/0x230 [ 722.510578][ T767] wp_page_copy+0x14c/0x10c0 [ 722.510600][ T767] ? release_pages+0x8d0/0x900 [ 722.510654][ T767] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 722.510679][ T767] ? __list_add_valid+0x28/0x90 [ 722.510697][ T767] do_wp_page+0x5a8/0xba0 [ 722.510779][ T767] handle_mm_fault+0xb31/0x1a70 [ 722.510798][ T767] ? follow_page_mask+0xc2c/0x1040 [ 722.510817][ T767] __get_user_pages+0x947/0xee0 [ 722.510837][ T767] populate_vma_page_range+0xaf/0xc0 [ 722.510856][ T767] mprotect_fixup+0x3a4/0x570 [ 722.510924][ T767] do_mprotect_pkey+0x543/0x6f0 [ 722.510953][ T767] __x64_sys_mprotect+0x44/0x50 [ 722.510972][ T767] do_syscall_64+0x4a/0x90 [ 722.510995][ T767] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 722.511016][ T767] RIP: 0033:0x4665d9 [ 722.511029][ T767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 722.511091][ T767] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:05:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x80ffffff}, [{}]}, 0x78) 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b1000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:04 executing program 0 (fault-call:3 fault-nth:95): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x18, 0x40}, [{}]}, 0x78) 08:05:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000}]}, 0x78) 08:05:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf00}]}, 0x78) [ 722.511114][ T767] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 722.511127][ T767] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 722.511139][ T767] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 722.511150][ T767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 722.511160][ T767] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:05:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9bffffff}, [{}]}, 0x78) 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b1100008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1a, 0x40}, [{}]}, 0x78) 08:05:04 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000000000000}]}, 0x78) 08:05:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1800}]}, 0x78) 08:05:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc0000000}, [{}]}, 0x78) 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b1800008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b1c00008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 722.998745][ T795] FAULT_INJECTION: forcing a failure. [ 722.998745][ T795] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 723.012101][ T795] CPU: 1 PID: 795 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 723.012120][ T795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.012128][ T795] Call Trace: [ 723.012135][ T795] dump_stack+0x137/0x19d [ 723.012179][ T795] should_fail+0x23c/0x250 [ 723.012198][ T795] __alloc_pages+0x102/0x320 08:05:04 executing program 0 (fault-call:3 fault-nth:96): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b2600008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 723.047725][ T795] alloc_pages_vma+0x391/0x660 [ 723.047753][ T795] ? unlock_page_memcg+0xc3/0xe0 [ 723.047770][ T795] ? page_remove_rmap+0x1de/0x230 [ 723.047790][ T795] wp_page_copy+0x14c/0x10c0 [ 723.047813][ T795] ? release_pages+0x8d0/0x900 [ 723.047829][ T795] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 723.047868][ T795] ? __list_add_valid+0x28/0x90 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000bfe00008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 723.047891][ T795] do_wp_page+0x5a8/0xba0 [ 723.047910][ T795] handle_mm_fault+0xb31/0x1a70 [ 723.047930][ T795] ? follow_page_mask+0xc2c/0x1040 [ 723.047947][ T795] __get_user_pages+0x947/0xee0 [ 723.048024][ T795] populate_vma_page_range+0xaf/0xc0 [ 723.048044][ T795] mprotect_fixup+0x3a4/0x570 [ 723.048124][ T795] do_mprotect_pkey+0x543/0x6f0 08:05:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0402008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:04 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1b, 0x40}, [{}]}, 0x78) [ 723.048142][ T795] __x64_sys_mprotect+0x44/0x50 [ 723.048158][ T795] do_syscall_64+0x4a/0x90 [ 723.048232][ T795] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 723.048254][ T795] RIP: 0033:0x4665d9 [ 723.048266][ T795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 723.048281][ T795] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:05:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0003008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0204008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 723.048299][ T795] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 723.048310][ T795] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 723.048366][ T795] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 723.048376][ T795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 723.048387][ T795] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 [ 723.170570][ T809] FAULT_INJECTION: forcing a failure. [ 723.170570][ T809] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 723.253171][ T809] CPU: 0 PID: 809 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 723.253202][ T809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.253230][ T809] Call Trace: [ 723.253237][ T809] dump_stack+0x137/0x19d [ 723.253261][ T809] should_fail+0x23c/0x250 [ 723.253277][ T809] __alloc_pages+0x102/0x320 [ 723.253337][ T809] alloc_pages_vma+0x391/0x660 [ 723.253356][ T809] ? unlock_page_memcg+0xc3/0xe0 [ 723.253372][ T809] ? page_remove_rmap+0x1de/0x230 [ 723.253422][ T809] wp_page_copy+0x14c/0x10c0 [ 723.253442][ T809] ? release_pages+0x8d0/0x900 [ 723.253455][ T809] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 723.253531][ T809] ? __list_add_valid+0x28/0x90 [ 723.253549][ T809] do_wp_page+0x5a8/0xba0 [ 723.253614][ T809] handle_mm_fault+0xb31/0x1a70 [ 723.253635][ T809] ? follow_page_mask+0xc2c/0x1040 [ 723.253654][ T809] __get_user_pages+0x947/0xee0 [ 723.253737][ T809] populate_vma_page_range+0xaf/0xc0 [ 723.253752][ T809] mprotect_fixup+0x3a4/0x570 [ 723.253772][ T809] do_mprotect_pkey+0x543/0x6f0 [ 723.253787][ T809] __x64_sys_mprotect+0x44/0x50 [ 723.253800][ T809] do_syscall_64+0x4a/0x90 [ 723.253820][ T809] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 723.253897][ T809] RIP: 0033:0x4665d9 [ 723.253910][ T809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 723.253924][ T809] RSP: 002b:00007f68a7aa8188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 723.253937][ T809] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 723.253946][ T809] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 08:05:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800000000000000}]}, 0x78) 08:05:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1900}]}, 0x78) 08:05:05 executing program 0 (fault-call:3 fault-nth:97): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0604008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe0000000}, [{}]}, 0x78) 08:05:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xc0, 0x40}, [{}]}, 0x78) 08:05:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000}]}, 0x78) [ 723.253954][ T809] RBP: 00007f68a7aa81d0 R08: 0000000000000000 R09: 0000000000000000 [ 723.253963][ T809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 723.254003][ T809] R13: 00007fffc0a6456f R14: 00007f68a7aa8300 R15: 0000000000022000 08:05:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf0000000}, [{}]}, 0x78) 08:05:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1a00}]}, 0x78) 08:05:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b8004008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xe0, 0x40}, [{}]}, 0x78) 08:05:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}]}, 0x78) 08:05:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf8000000}, [{}]}, 0x78) 08:05:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1b00}]}, 0x78) [ 723.676061][ T866] FAULT_INJECTION: forcing a failure. [ 723.676061][ T866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 723.689494][ T866] CPU: 0 PID: 866 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 723.689525][ T866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.689535][ T866] Call Trace: [ 723.689542][ T866] dump_stack+0x137/0x19d [ 723.689569][ T866] should_fail+0x23c/0x250 [ 723.689588][ T866] __alloc_pages+0x102/0x320 [ 723.689607][ T866] alloc_pages_vma+0x391/0x660 [ 723.730013][ T866] ? unlock_page_memcg+0xc3/0xe0 [ 723.735026][ T866] ? page_remove_rmap+0x1de/0x230 [ 723.740080][ T866] wp_page_copy+0x14c/0x10c0 [ 723.745396][ T866] ? release_pages+0x8d0/0x900 [ 723.750316][ T866] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 723.756390][ T866] ? __list_add_valid+0x28/0x90 [ 723.761520][ T866] do_wp_page+0x5a8/0xba0 [ 723.766065][ T866] handle_mm_fault+0xb31/0x1a70 [ 723.770913][ T866] ? follow_page_mask+0xc2c/0x1040 [ 723.776672][ T866] __get_user_pages+0x947/0xee0 [ 723.781931][ T866] populate_vma_page_range+0xaf/0xc0 [ 723.787941][ T866] mprotect_fixup+0x3a4/0x570 [ 723.792648][ T866] do_mprotect_pkey+0x543/0x6f0 [ 723.797502][ T866] __x64_sys_mprotect+0x44/0x50 [ 723.802528][ T866] do_syscall_64+0x4a/0x90 [ 723.807094][ T866] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 723.813153][ T866] RIP: 0033:0x4665d9 [ 723.817156][ T866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 723.836952][ T866] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 723.845711][ T866] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 723.854760][ T866] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 723.863048][ T866] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 08:05:05 executing program 0 (fault-call:3 fault-nth:98): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0005008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf0, 0x40}, [{}]}, 0x78) 08:05:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}]}, 0x78) 08:05:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x3f00}]}, 0x78) 08:05:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xfc000000}, [{}]}, 0x78) 08:05:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b3105008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x7f00}]}, 0x78) [ 723.871045][ T866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 723.879055][ T866] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:05:05 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x78) 08:05:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffff80}, [{}]}, 0x78) 08:05:05 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf8, 0x40}, [{}]}, 0x78) 08:05:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0006008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 724.078061][ T900] FAULT_INJECTION: forcing a failure. [ 724.078061][ T900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 724.092100][ T900] CPU: 0 PID: 900 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 724.100734][ T900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.111068][ T900] Call Trace: [ 724.114537][ T900] dump_stack+0x137/0x19d [ 724.119143][ T900] should_fail+0x23c/0x250 [ 724.124153][ T900] __alloc_pages+0x102/0x320 [ 724.129019][ T900] alloc_pages_vma+0x391/0x660 [ 724.134078][ T900] ? unlock_page_memcg+0xc3/0xe0 [ 724.139019][ T900] ? page_remove_rmap+0x1de/0x230 [ 724.144083][ T900] wp_page_copy+0x14c/0x10c0 [ 724.148744][ T900] ? release_pages+0x8d0/0x900 [ 724.153852][ T900] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 724.159678][ T900] ? __list_add_valid+0x28/0x90 [ 724.164583][ T900] do_wp_page+0x5a8/0xba0 [ 724.168941][ T900] handle_mm_fault+0xb31/0x1a70 [ 724.173895][ T900] ? follow_page_mask+0xc2c/0x1040 [ 724.179092][ T900] __get_user_pages+0x947/0xee0 [ 724.184456][ T900] populate_vma_page_range+0xaf/0xc0 [ 724.189777][ T900] mprotect_fixup+0x3a4/0x570 [ 724.194782][ T900] do_mprotect_pkey+0x543/0x6f0 [ 724.199937][ T900] __x64_sys_mprotect+0x44/0x50 [ 724.204877][ T900] do_syscall_64+0x4a/0x90 [ 724.209417][ T900] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 724.215615][ T900] RIP: 0033:0x4665d9 08:05:06 executing program 0 (fault-call:3 fault-nth:99): r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xc000}]}, 0x78) 08:05:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xfc, 0x40}, [{}]}, 0x78) 08:05:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}]}, 0x78) [ 724.219528][ T900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 724.239449][ T900] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 724.248134][ T900] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 724.256664][ T900] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 724.264937][ T900] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 08:05:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffff9b}, [{}]}, 0x78) 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0406008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 724.272943][ T900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 724.281471][ T900] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:05:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x10000000000}, [{}]}, 0x78) 08:05:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x78) 08:05:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x180, 0x40}, [{}]}, 0x78) 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0007008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe000}]}, 0x78) 08:05:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf0000000000000}, [{}]}, 0x78) 08:05:06 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x700, 0x40}, [{}]}, 0x78) 08:05:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}, 0x78) 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0011008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 724.451241][ T927] FAULT_INJECTION: forcing a failure. [ 724.451241][ T927] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 724.464909][ T927] CPU: 1 PID: 927 Comm: syz-executor.0 Not tainted 5.13.0-rc2-syzkaller #0 [ 724.464936][ T927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.464948][ T927] Call Trace: [ 724.464957][ T927] dump_stack+0x137/0x19d [ 724.464987][ T927] should_fail+0x23c/0x250 [ 724.465006][ T927] __alloc_pages+0x102/0x320 [ 724.465024][ T927] alloc_pages_vma+0x391/0x660 [ 724.465105][ T927] ? unlock_page_memcg+0xc3/0xe0 [ 724.465122][ T927] ? page_remove_rmap+0x1de/0x230 [ 724.465142][ T927] wp_page_copy+0x14c/0x10c0 [ 724.465183][ T927] ? release_pages+0x8d0/0x900 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0018008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 724.465197][ T927] ? mem_cgroup_update_lru_size+0x53/0xf0 [ 724.465216][ T927] ? __list_add_valid+0x28/0x90 [ 724.465257][ T927] do_wp_page+0x5a8/0xba0 [ 724.465276][ T927] handle_mm_fault+0xb31/0x1a70 [ 724.465298][ T927] ? follow_page_mask+0xc2c/0x1040 [ 724.465318][ T927] __get_user_pages+0x947/0xee0 [ 724.465334][ T927] populate_vma_page_range+0xaf/0xc0 [ 724.465366][ T927] mprotect_fixup+0x3a4/0x570 [ 724.465381][ T927] do_mprotect_pkey+0x543/0x6f0 08:05:06 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800002, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b001c008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) [ 724.465396][ T927] __x64_sys_mprotect+0x44/0x50 [ 724.465422][ T927] do_syscall_64+0x4a/0x90 [ 724.465456][ T927] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 724.465482][ T927] RIP: 0033:0x4665d9 [ 724.465495][ T927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 724.465584][ T927] RSP: 002b:00007f68a7a87188 EFLAGS: 00000246 ORIG_RAX: 000000000000000a 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0020008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x900, 0x40}, [{}]}, 0x78) 08:05:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}, 0x78) [ 724.465605][ T927] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 724.465616][ T927] RDX: 0000000000000002 RSI: 0000000000800000 RDI: 0000000020000000 [ 724.465642][ T927] RBP: 00007f68a7a871d0 R08: 0000000000000000 R09: 0000000000000000 [ 724.465660][ T927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 08:05:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe803}]}, 0x78) 08:05:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x100000000000000}, [{}]}, 0x78) 08:05:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xa00, 0x40}, [{}]}, 0x78) [ 724.465672][ T927] R13: 00007fffc0a6456f R14: 00007f68a7a87300 R15: 0000000000022000 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0026008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf000}]}, 0x78) 08:05:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}]}, 0x78) 08:05:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x180000000000000}, [{}]}, 0x78) 08:05:06 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800008, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0531008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf800}]}, 0x78) 08:05:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xb00, 0x40}, [{}]}, 0x78) 08:05:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x200000000000000}, [{}]}, 0x78) 08:05:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}]}, 0x78) 08:05:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}]}, 0x78) 08:05:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x700000000000000}, [{}]}, 0x78) 08:05:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xfc00}]}, 0x78) 08:05:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xc00, 0x40}, [{}]}, 0x78) 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b003f008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x78) 08:05:06 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x80000c, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 08:05:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0480008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:06 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xd00, 0x40}, [{}]}, 0x78) 08:05:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x800000000000000}, [{}]}, 0x78) 08:05:06 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}]}, 0x78) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}]}, 0x78) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x900000000000000}, [{}]}, 0x78) 08:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000bfffe008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xe00, 0x40}, [{}]}, 0x78) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 08:05:07 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x8000ef, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xa00000000000000}, [{}]}, 0x78) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a}]}, 0x78) 08:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000bfeff008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf00, 0x40}, [{}]}, 0x78) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 08:05:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1800, 0x40}, [{}]}, 0x78) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xb00000000000000}, [{}]}, 0x78) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}]}, 0x78) 08:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0002008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x5000000}]}, 0x78) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}]}, 0x78) 08:05:07 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800c00, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc00000000000000}, [{}]}, 0x78) 08:05:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1a00, 0x40}, [{}]}, 0x78) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x6000000}]}, 0x78) 08:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0003008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0}]}, 0x78) 08:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0004008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xd00000000000000}, [{}]}, 0x78) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}]}, 0x78) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 08:05:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1b00, 0x40}, [{}]}, 0x78) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe00000000000000}, [{}]}, 0x78) 08:05:07 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x804000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0005008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x3f00, 0x40}, [{}]}, 0x78) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8}]}, 0x78) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf00000000000000}, [{}]}, 0x78) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc}]}, 0x78) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1800000000000000}, [{}]}, 0x78) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 08:05:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x7f00, 0x40}, [{}]}, 0x78) 08:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0006008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180}]}, 0x78) 08:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0007008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a00000000000000}, [{}]}, 0x78) 08:05:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xc000, 0x40}, [{}]}, 0x78) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 08:05:07 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x80efff, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x78) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}]}, 0x78) 08:05:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xb000000}]}, 0x78) 08:05:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1b00000000000000}, [{}]}, 0x78) 08:05:07 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xe000, 0x40}, [{}]}, 0x78) 08:05:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0008008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x78) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf000, 0x40}, [{}]}, 0x78) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 08:05:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}]}, 0x78) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3f00000000000000}, [{}]}, 0x78) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 08:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0010008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:08 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x80ffef, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf800, 0x40}, [{}]}, 0x78) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7f00000000000000}, [{}]}, 0x78) 08:05:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}]}, 0x78) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xfc00, 0x40}, [{}]}, 0x78) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe000000}]}, 0x78) 08:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0011008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}]}, 0x78) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf00000, 0x40}, [{}]}, 0x78) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x8000000000000000}, [{}]}, 0x78) 08:05:08 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 08:05:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x78) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x80ffffff00000000}, [{}]}, 0x78) 08:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0018008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1000000, 0x40}, [{}]}, 0x78) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x18000000}]}, 0x78) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1800000, 0x40}, [{}]}, 0x78) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9bffffff00000000}, [{}]}, 0x78) 08:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b001c008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}]}, 0x78) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x19000000}]}, 0x78) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x2000000, 0x40}, [{}]}, 0x78) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc000000000000000}, [{}]}, 0x78) 08:05:08 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x8) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}]}, 0x78) 08:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0026008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe000000000000000}, [{}]}, 0x78) 08:05:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00}]}, 0x78) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x7000000, 0x40}, [{}]}, 0x78) 08:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00fe008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x3f000000}]}, 0x78) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf000000000000000}, [{}]}, 0x78) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x8000000, 0x40}, [{}]}, 0x78) 08:05:08 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00}]}, 0x78) 08:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0004028000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf800000000000000}, [{}]}, 0x78) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x9000000, 0x40}, [{}]}, 0x78) 08:05:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 08:05:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000038000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xfc00000000000000}, [{}]}, 0x78) 08:05:08 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}]}, 0x78) 08:05:08 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xa000000, 0x40}, [{}]}, 0x78) 08:05:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffffff00000000}, [{}]}, 0x78) 08:05:09 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xf) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00}]}, 0x78) 08:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0002048000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x9bffffff}]}, 0x78) 08:05:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xb000000, 0x40}, [{}]}, 0x78) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0xffffffffffffffff}, [{}]}, 0x78) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xc0000000}]}, 0x78) 08:05:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xc000000, 0x40}, [{}]}, 0x78) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}]}, 0x78) 08:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0006048000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2}, [{}]}, 0x78) 08:05:09 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x10) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xd000000, 0x40}, [{}]}, 0x78) 08:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0080048000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe0000000}]}, 0x78) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000}]}, 0x78) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7}, [{}]}, 0x78) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}]}, 0x78) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x8}, [{}]}, 0x78) 08:05:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xe000000, 0x40}, [{}]}, 0x78) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe8030000}]}, 0x78) 08:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000058000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9}, [{}]}, 0x78) 08:05:09 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf0000000}]}, 0x78) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800}]}, 0x78) 08:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0031058000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf000000, 0x40}, [{}]}, 0x78) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xa}, [{}]}, 0x78) 08:05:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x18000000, 0x40}, [{}]}, 0x78) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xb}, [{}]}, 0x78) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00}]}, 0x78) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf8000000}]}, 0x78) 08:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000068000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xfc000000}]}, 0x78) 08:05:09 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r1 = open(&(0x7f0000000040)='./file0\x00', 0x2800, 0x11d) mmap(&(0x7f000060d000/0x3000)=nil, 0x3000, 0x8, 0x810, r1, 0x50f15000) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1a000000, 0x40}, [{}]}, 0x78) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xc}, [{}]}, 0x78) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 08:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0004068000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xd}, [{}]}, 0x78) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xffffff9b}]}, 0x78) 08:05:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1b000000, 0x40}, [{}]}, 0x78) 08:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000078000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 08:05:09 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000380)=[{&(0x7f0000000040)=""/52, 0x34}, {&(0x7f0000000440)=""/92, 0x5c}, {&(0x7f0000000140)=""/130, 0x82}, {&(0x7f00000000c0)=""/120, 0x78}], 0x4, 0x40c1f, 0x3) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f00000002c0)='dirsync\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xe}, [{}]}, 0x78) 08:05:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000118000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x3f000000, 0x40}, [{}]}, 0x78) 08:05:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x10000000000}]}, 0x78) 08:05:09 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x7f000000, 0x40}, [{}]}, 0x78) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000188000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf}, [{}]}, 0x78) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 08:05:10 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) r1 = syz_io_uring_setup(0x15e6, &(0x7f0000000280), &(0x7f0000002000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r1, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/95, 0x5f}], 0x46}, 0x0) r4 = syz_io_uring_setup(0x15e6, &(0x7f0000000280), &(0x7f0000002000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f0000000400)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000040)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r4, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/95, 0x5f}], 0x46}, 0x0) syz_io_uring_submit(r2, r6, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index, 0x62, 0x0, 0x8000}, 0x9) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x18}, [{}]}, 0x78) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x9bffffff, 0x40}, [{}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00001c8000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xc0000000, 0x40}, [{}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000208000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1a}, [{}]}, 0x78) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xe0000000, 0x40}, [{}]}, 0x78) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000268000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1b}, [{}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x500000000000000}]}, 0x78) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf0000000, 0x40}, [{}]}, 0x78) 08:05:10 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x86003, 0x0) mmap(&(0x7f00004b4000/0x2000)=nil, 0x2000, 0x2, 0x12, r1, 0x5754c000) ioctl$BTRFS_IOC_RM_DEV(r1, 0x5000940b, &(0x7f0000000440)={{r1}, "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"}) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) bind(r2, &(0x7f00000002c0)=@vsock={0x28, 0x0, 0x2710, @my=0x1}, 0x80) sendmsg$NL80211_CMD_DISCONNECT(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='@\f\b\x00', @ANYRES16=r3, @ANYBLOB="00358c5db5bac860cc88040028bd7000fddbdf2530f0509b906094e7", @ANYRES32=0x0, @ANYBLOB="0c009900ffffff7f03000000060036000c0000005fff360011000000060036003d000000"], 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x44800) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x87d5, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffc}, 0x0, 0x0, r4, 0x0) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0005318000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xc0}, [{}]}, 0x78) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf8000000, 0x40}, [{}]}, 0x78) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x600000000000000}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xe0}, [{}]}, 0x78) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xfc000000, 0x40}, [{}]}, 0x78) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00003f8000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf0}, [{}]}, 0x78) 08:05:10 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x8c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r1 = shmget(0x2, 0x3000, 0x810, &(0x7f0000ffb000/0x3000)=nil) shmat(r1, &(0x7f0000383000/0x3000)=nil, 0x1000) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xffffff9b, 0x40}, [{}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf8}, [{}]}, 0x78) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0004808000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00fffe8000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x10000000000, 0x40}, [{}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x78) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xfc}, [{}]}, 0x78) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00feff8000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x180}, [{}]}, 0x78) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf0000000000000, 0x40}, [{}]}, 0x78) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x78) 08:05:10 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2c86b00ebd556b3295928976471255e9aeab72b4fe4edaff94a316a33dd8746d269fcc5d23a0cfb032f726d66329235c", 0x30}], 0x1, 0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)=0xdd) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x50, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fork() r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x40) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x301000, 0x0) kcmp(r3, r4, 0x6, 0xffffffffffffffff, r5) ioctl$CHAR_RAW_RRPART(r2, 0x125f, 0x0) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000100000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xb00000000000000}]}, 0x78) 08:05:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x700}, [{}]}, 0x78) 08:05:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000028000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:10 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x100000000000000, 0x40}, [{}]}, 0x78) 08:05:10 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}]}, 0x78) 08:05:10 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000363000/0x3000)=nil, 0x3000, 0x13) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x900}, [{}]}, 0x78) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000038000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x180000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xc00000000000000}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xa00}, [{}]}, 0x78) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x200000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000048000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xd00000000000000}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xb00}, [{}]}, 0x78) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000058000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x700000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xc00}, [{}]}, 0x78) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x78) 08:05:11 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x6) memfd_create(&(0x7f0000000040)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x2) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, &(0x7f0000000100)={0x100, 0x8, '\x00', 0x0, &(0x7f00000000c0)=[0x0]}) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x800000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x2, 0x7, 0x2, 0x3, 0x0, 0x200000000000000, 0x30000, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xc5, 0x4, @perf_config_ext={0x4, 0xfff}, 0xc010, 0x0, 0x1, 0x6, 0x2af, 0x0, 0xffed, 0x0, 0x0, 0x0, 0x80000001}, r1, 0x2, r2, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) tkill(r1, 0x36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf00000000000000}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000068000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xd00}, [{}]}, 0x78) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x900000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xe00}, [{}]}, 0x78) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1800000000000000}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000078000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xa00000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf00}, [{}]}, 0x78) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9bffffff}]}, 0x78) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1900000000000000}]}, 0x78) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xb00000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1800}, [{}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000088000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) pread64(r1, &(0x7f0000000080)=""/44, 0x2c, 0xc7) ftruncate(r0, 0x80079a0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x7) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1a00000000000000}]}, 0x78) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xc00000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1a00}, [{}]}, 0x78) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000118000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x1b00000000000000}]}, 0x78) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xd00000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1b00}, [{}]}, 0x78) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0000000}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000188000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xe00000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x3f00}, [{}]}, 0x78) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00001c8000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf00000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/167, 0xa7}, {&(0x7f0000000100)=""/87, 0x57}], 0x2, 0x401, 0x1ff) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = fork() waitid(0x2, r2, &(0x7f00000001c0), 0x1, &(0x7f00000002c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x3, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x0) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf8000000}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7f00}, [{}]}, 0x78) 08:05:11 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1800000000000000, 0x40}, [{}]}, 0x78) 08:05:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x7f00000000000000}]}, 0x78) 08:05:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000268000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:11 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000}]}, 0x78) 08:05:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xc000}, [{}]}, 0x78) 08:05:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x8000000000000000}]}, 0x78) 08:05:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1a00000000000000, 0x40}, [{}]}, 0x78) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xe000}, [{}]}, 0x78) 08:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000fe8000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:12 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 08:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000001000000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x1b00000000000000, 0x40}, [{}]}, 0x78) 08:05:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 08:05:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf000}, [{}]}, 0x78) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf800}, [{}]}, 0x78) 08:05:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff9b}]}, 0x78) 08:05:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x40}, [{}]}, 0x78) 08:05:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x9bffffff00000000}]}, 0x78) 08:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080087fa000000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xfc00}, [{}]}, 0x78) [ 730.506797][ T1801] ================================================================== [ 730.515428][ T1801] BUG: KCSAN: data-race in __d_drop / __d_lookup [ 730.521766][ T1801] [ 730.524088][ T1801] write to 0xffff888102be63d0 of 8 bytes by task 1785 on cpu 0: [ 730.531781][ T1801] __d_drop+0x10c/0x1e0 [ 730.535920][ T1801] d_invalidate+0x4a/0x1d0 [ 730.540531][ T1801] proc_invalidate_siblings_dcache+0x203/0x2f0 [ 730.547339][ T1801] proc_flush_pid+0x16/0x20 [ 730.551854][ T1801] release_task+0xad7/0xbe0 [ 730.556441][ T1801] wait_consider_task+0x10ce/0x19e0 [ 730.561657][ T1801] do_wait+0x1d1/0x6b0 [ 730.565797][ T1801] kernel_wait4+0x13c/0x1a0 [ 730.570294][ T1801] __x64_sys_wait4+0x7a/0x100 [ 730.575095][ T1801] do_syscall_64+0x4a/0x90 [ 730.579671][ T1801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 730.585737][ T1801] [ 730.588048][ T1801] read to 0xffff888102be63d0 of 8 bytes by task 1801 on cpu 1: [ 730.595584][ T1801] __d_lookup+0x15d/0x400 [ 730.599921][ T1801] lookup_fast+0x67/0x350 [ 730.604344][ T1801] walk_component+0x5c/0x350 [ 730.609037][ T1801] link_path_walk+0x4ba/0x780 [ 730.613700][ T1801] path_lookupat+0x7b/0x570 [ 730.618191][ T1801] filename_lookup+0xff/0x390 [ 730.622875][ T1801] user_path_at_empty+0x3b/0x50 [ 730.627715][ T1801] __x64_sys_umount+0x75/0xd0 [ 730.632525][ T1801] do_syscall_64+0x4a/0x90 [ 730.637030][ T1801] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 730.642923][ T1801] [ 730.645229][ T1801] Reported by Kernel Concurrency Sanitizer on: [ 730.651362][ T1801] CPU: 1 PID: 1801 Comm: syz-executor.4 Not tainted 5.13.0-rc2-syzkaller #0 [ 730.660104][ T1801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.670152][ T1801] ================================================================== 08:05:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x7f00000000000000, 0x40}, [{}]}, 0x78) 08:05:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xc000000000000000}]}, 0x78) 08:05:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000}]}, 0x78) 08:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000807ffff000000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:12 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mmap(&(0x7f00007f4000/0x1000)=nil, 0x1000, 0x8, 0x80011, r0, 0x1fc91000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x22820, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x40) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf00000}, [{}]}, 0x78) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1000000}, [{}]}, 0x78) 08:05:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 08:05:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe000000000000000}]}, 0x78) 08:05:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x8000000000000000, 0x40}, [{}]}, 0x78) 08:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000001000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1800000}, [{}]}, 0x78) 08:05:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x9bffffff00000000, 0x40}, [{}]}, 0x78) 08:05:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 08:05:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xe803000000000000}]}, 0x78) 08:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000001001000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xc000000000000000, 0x40}, [{}]}, 0x78) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x2000000}, [{}]}, 0x78) 08:05:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf000000000000000}]}, 0x78) 08:05:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) 08:05:12 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) r1 = dup3(r0, r0, 0x80000) sendmsg$inet6(r1, &(0x7f0000000200)={&(0x7f0000000040)={0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, '\x00', 0x43}, 0x2}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000080)="e6b422818b5c4f3ee2f524eae6b1b47276e127a82e7d5cbcbd6533231b9f9c75904ea764c6ad4d67aac554e1b9907adfcc8b0e82d3995f4f94ac4746ca2d23dc1e4079ea4dda4b7d2deca7773901ace009fc719faf78a15446b64156ab72005ef1fdfb6d301f5b38f30fc975fb03ada2a68dbfbeaea9b4f59205d48f7fb130eed6071e32ce1b8f16fa4271ea867cad4f7dc3f45316e2600bd05e08f10b508d30bfce5b6a2ce7766c5afc9c87ff29c89fe4e0c9e72815232c92db60922cd735b246cd4bc003bb71a43cc75b21f45c66df768e20fd", 0xd4}, {&(0x7f0000000180)}], 0x2}, 0x48004) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000007000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xf800000000000000}]}, 0x78) 08:05:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xe000000000000000, 0x40}, [{}]}, 0x78) 08:05:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7000000}, [{}]}, 0x78) 08:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008002000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:12 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf000000000000000, 0x40}, [{}]}, 0x78) 08:05:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xfc00000000000000}]}, 0x78) 08:05:12 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 08:05:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x8000000}, [{}]}, 0x78) 08:05:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008003000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xffffffff00000000}]}, 0x78) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xf800000000000000, 0x40}, [{}]}, 0x78) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9000000}, [{}]}, 0x78) 08:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008004000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "17bccbca1507fe2186fbdd1bf45aca2fedd35520335aa625433b8f2d4f21b35f30c4ff9cb097f12ff159a29c5d877cb431c33e27dbf706239efd708b61bb4c90a093f0324de8cffde83309c6e673e41662a8aa8aada9f75d755918fc829bf49fda9da1b3709d8fb75dfd4a7aaa1799937ddd369736ab64da12d54bc999e5b7ec4de61dcdc457f6f9e1dfed00a3fbdb68d56864a4f84b8b3a4f8354d174bbdc84a2caba51fe06e9cd3fae2f79be71554307ea1fd728b173248164a490b8969fc45e3991e3c1a011a7b32488ef811017fd87705046dec78d14d2601f6250e8155824b195cd1de666f0d898ee31036e14d4f5c7ccf01961509dff"}, 0xfd) creat(&(0x7f0000000140)='./file0\x00', 0x30) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r1 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xfc00000000000000, 0x40}, [{}]}, 0x78) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xa000000}, [{}]}, 0x78) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0xffffffffffffffff}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 08:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008005000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x78) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x40}, [{}]}, 0x78) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xb000000}, [{}]}, 0x78) 08:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008006000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x40}, [{}]}, 0x78) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x5}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}]}, 0x78) 08:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008007000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9b}, [{}]}, 0x78) 08:05:13 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002e00)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000040)=""/172, 0xac}, {&(0x7f00000030c0)=""/82, 0x49}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000180)=""/185, 0xb9}, {&(0x7f00000002c0)=""/156, 0x9c}], 0x3b, &(0x7f00000014c0)=""/213, 0xd5}, 0x10001}, {{&(0x7f00000015c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001640)=""/141, 0x8d}, {&(0x7f0000001700)=""/166, 0xa6}, {&(0x7f0000003140)=""/152, 0x98}, {&(0x7f0000000380)}, {&(0x7f0000001880)=""/97, 0x61}, {&(0x7f0000001900)=""/227, 0xe3}, {&(0x7f0000001a00)=""/221, 0xdd}, {&(0x7f0000001b00)=""/162, 0xa2}, {&(0x7f0000001bc0)=""/144, 0x90}], 0x9}, 0x2}, {{&(0x7f0000001d40)=@rc={0x1f, @none}, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001dc0)=""/226, 0xe2}, {&(0x7f0000001ec0)=""/223, 0xdf}, {&(0x7f0000001fc0)=""/199, 0xc7}, {&(0x7f00000020c0)=""/213, 0xd5}], 0x4, &(0x7f0000002200)=""/249, 0xf9}, 0x6}, {{&(0x7f0000002300)=@alg, 0x80, &(0x7f00000024c0)=[{&(0x7f0000002380)=""/64, 0x40}, {&(0x7f00000023c0)=""/174, 0xae}, {&(0x7f0000002480)=""/36, 0x24}], 0x3}, 0x41}, {{&(0x7f0000002500)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f0000002ac0)=[{&(0x7f0000002580)=""/203, 0xcb}, {&(0x7f0000002680)=""/208, 0xd0}, {&(0x7f0000002780)=""/241, 0xf1}, {&(0x7f0000002880)=""/43, 0x2b}, {&(0x7f00000028c0)=""/188, 0xbc}, {&(0x7f0000000380)=""/23, 0x17}, {&(0x7f00000029c0)=""/223, 0xdf}], 0x7}, 0xfffffffa}, {{&(0x7f0000002b40)=@rc={0x1f, @fixed}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002bc0)=""/239, 0xef}, {&(0x7f0000002cc0)=""/236, 0xec}], 0x2}, 0x6}], 0x6, 0x40000120, &(0x7f0000002f80)={0x0, 0x3938700}) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000003080)={&(0x7f0000002fc0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000003040)={&(0x7f0000003000)={0x24, 0x0, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xff}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x8000) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xc000000}, [{}]}, 0x78) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0xc0}, [{}]}, 0x78) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x6}]}, 0x78) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xd000000}, [{}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}]}, 0x78) 08:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008008000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0xe0}, [{}]}, 0x78) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x7}]}, 0x78) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xe000000}, [{}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}]}, 0x78) 08:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008010000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf000000}, [{}]}, 0x78) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0xf0}, [{}]}, 0x78) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x78) 08:05:13 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) flock(r0, 0xd) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x3}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x37}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000820) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x38, r1, 0x20, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0xffffffe1, 0x7a}}}}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x2}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x40080) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000659000/0x4000)=nil, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x3c, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c}, 0x5) 08:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008011000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0xf8}, [{}]}, 0x78) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x18000000}, [{}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}]}, 0x78) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x9}]}, 0x78) 08:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008018000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1a000000}, [{}]}, 0x78) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfc}, [{}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000}]}, 0x78) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xa}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000}]}, 0x78) 08:05:13 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x101, 0x8, 0x2e, 0x1}, {0x1, 0x1, 0x3, 0x2}, {0x5, 0xa0, 0x8, 0x80000001}, {0x800, 0x2}, {0x1a, 0x8, 0x4, 0xffffffff}]}) epoll_create1(0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0xffffffffffffa112}, 0x11010, 0x1, 0x0, 0x0, 0x5527}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') socket$inet(0x2, 0x3, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0xe0) openat$hwrng(0xffffff9c, 0x0, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$null(0xffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 08:05:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1b000000}, [{}]}, 0x78) 08:05:13 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200b}, [{}]}, 0x78) 08:05:13 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000}]}, 0x78) 08:05:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000801c000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xb}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xc}]}, 0x78) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200c}, [{}]}, 0x78) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008026000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x78) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x3f000000}, [{}]}, 0x78) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200d}, [{}]}, 0x78) 08:05:14 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fchmod(r1, 0xd2) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080fe000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xd}]}, 0x78) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x7f000000}, [{}]}, 0x78) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200e}, [{}]}, 0x78) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}]}, 0x78) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008004020008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x200f}, [{}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x78) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x80ffffff}, [{}]}, 0x78) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 08:05:14 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x9, 0xcfb) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000030008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0xfeff}, [{}]}, 0x78) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9bffffff00000000}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xf}]}, 0x78) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9bffffff}, [{}]}, 0x78) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xc0000000}, [{}]}, 0x78) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000000000000}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x18}]}, 0x78) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2}, [{}]}, 0x78) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008002040008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xe0000000}, [{}]}, 0x78) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000000000000}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x19}]}, 0x78) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008006040008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf0000000}, [{}]}, 0x78) 08:05:14 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r1 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x6, 0x80001) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) fcntl$dupfd(r3, 0x0, r2) ioctl$INCFS_IOC_PERMIT_FILL(r1, 0x40046721, &(0x7f0000000080)={r2}) mprotect(&(0x7f00006da000/0x1000)=nil, 0x1000, 0x4) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x7}, [{}]}, 0x78) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x8}, [{}]}, 0x78) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000000000000}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x1a}]}, 0x78) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xf8000000}, [{}]}, 0x78) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008080040008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x9}, [{}]}, 0x78) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xfc000000}, [{}]}, 0x78) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf800000000000000}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x1b}]}, 0x78) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000050008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040), 0x6, 0x8000) fcntl$addseals(r1, 0x409, 0x0) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0xa}, [{}]}, 0x78) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000}]}, 0x78) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffff80}, [{}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xc0}]}, 0x78) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008031050008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffff9b}, [{}]}, 0x78) 08:05:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000060008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:14 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0xb}, [{}]}, 0x78) 08:05:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xe0}]}, 0x78) 08:05:14 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}]}, 0x78) 08:05:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0xffffffff}, [{}]}, 0x78) 08:05:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0xc}, [{}]}, 0x78) 08:05:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008004060008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}]}, 0x78) 08:05:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xf0}]}, 0x78) 08:05:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 08:05:15 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fallocate(r1, 0x2, 0x5, 0x1ff) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xf8}]}, 0x78) 08:05:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x2}, [{}]}, 0x78) 08:05:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000070008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0xfdef) 08:05:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0xd}, [{}]}, 0x78) 08:05:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x7}, [{}]}, 0x78) 08:05:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0xfc}]}, 0x78) 08:05:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0xe}, [{}]}, 0x78) 08:05:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000110008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x180}]}, 0x78) 08:05:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x8}, [{}]}, 0x78) 08:05:15 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x200000f8) 08:05:15 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0xf}, [{}]}, 0x78) 08:05:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x9}, [{}]}, 0x78) 08:05:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x3e8}]}, 0x78) 08:05:15 executing program 0: ftruncate(0xffffffffffffffff, 0x80079a0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f00000001c0)='gfs2\x00', 0x0) mmap(&(0x7f0000247000/0x1000)=nil, 0x1000, 0x2000008, 0x2010, r0, 0x1e1a6000) io_submit(0x0, 0x2, &(0x7f0000000000)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x21, 0xffffffffffffffff, &(0x7f0000000440)="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", 0x1000, 0x1, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x2f, 0xffffffffffffffff, &(0x7f00000000c0)="344443228665122bab57d576e7e7184103e91ce1d4f78b9af4130013a3307d4736da9e3b241793cc01107a4014a95ac03412c77cb6b0b5105874ce76a3f61e5001000000dda557847f55e6367a7d5297568deaf0be1fd5e7289c40bde13e7d885047a948238d832900a988e55c6d", 0x6e, 0x2, 0x0, 0x2}]) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x40000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000180008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080001c0008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000200008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:15 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001d40), 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f0000000000)) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x1010, r0, 0xffffd000) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req={0xd0c7, 0x8, 0x45, 0x8000}, 0x10) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r1, 0xf504, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x2af}, 0x0, 0x3, 0xffffffff, 0x0, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_audit(0x10, 0x3, 0x9) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000100), &(0x7f0000000080)=0x4) 08:05:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000260008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:15 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r1 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) 08:05:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008005310008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:16 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x7ffff000) 08:05:16 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x18}, [{}]}, 0x78) 08:05:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080003f0008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x500}]}, 0x78) 08:05:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xa}, [{}]}, 0x78) 08:05:16 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r1 = perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0xfd4, 0xde, 0x200, 0x1}) 08:05:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008004800008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080fffe0008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080feff0008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:16 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f00000002c0)={{'\x00', 0x1}, {0x7fffffff}, 0x0, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="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", 0x106, 0x0, &(0x7f0000000440)={0x2, 0x15e, {0x1, 0xc, 0x68, "a3dd25d9c4505d18d51713870eb70d7a288848cb5de9a341fdcf827159cdf2617a464cfbb0df22bc84cda206f7a57fccd411688d4eea16a1b633da49de8c0679a1189df71c3d9e48db24d377f0d0c39fcd0d10a3a492a52f3324a7fcc9cbca1d4ff7cf50baa408f7", 0xe9, "13c3344969d17393da1724e57e5517ad42078975ee53d07a3f4e8750e8044e0ee68554d55f1fb97466f3b4025161883f528c465d0ce368da625d249fc94dde0f8a2db1527b2976b382c4dee4035b04d4ff5620badb9c37ee3a6a5f7504a9490e8f39c0ff6ae3a0f61e6fe137626ca7fdf6572b582af79f4afdfc0c415bfdacdf67187f8085faa445897a5a6d70151826b473c8d87179b4c6e925f7c9a1ca60b1cc798b89954d4fbc2818119ba2dbc9274871d543da22a4e9cbbe0e66acc6671147beb1c1e22a54c9a0620baaecb5780360b233ec30629a90d1d87542f07b1dd29daf2591267852088c"}, 0x1000, "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"}, 0x116a}) preadv(r0, &(0x7f0000001780)=[{&(0x7f0000000340)=""/101, 0x65}, {&(0x7f00000015c0)=""/182, 0xb6}, {&(0x7f0000001680)=""/149, 0x95}, {&(0x7f0000000200)=""/47, 0x2f}, {&(0x7f0000001740)=""/29, 0x1d}], 0x5, 0xfffffff8, 0x7) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000408000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008020011608000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:17 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0xfffffdef) 08:05:17 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r0, 0x80079a0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) io_setup(0x202, &(0x7f0000000100)=0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) r3 = syz_open_dev$rtc(&(0x7f0000000140), 0x30cc3e72, 0x20201) io_submit(r1, 0x2, &(0x7f00000001c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0xf, 0x277, r0, &(0x7f0000000040)="a127d018758a10de5f40f833f6f3c50df91ac89605d7cccc8ff2223c584b5bc077ea1deb0102e6ce56b75eb7d68267fc8d3e35e64277d295a43765c3d1e319c2ecd566fa54cd6c28bc8d920e0c2ee246a41d2366efb287b291e991a4c95a5309d6f776500e8dcc84d29095d2f09072c3d1600442e78efc8d3438be8e276b8c27588cd46e3ebd1f38852f9b0eb819ae3e26ee00", 0x93, 0x6f, 0x0, 0x2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x4, r3, &(0x7f00000002c0)="a23bb57caf15edb210497a7f24a64f9475b85e9661a8fe468d529f524fccf93b56dd1cd0cadf5c92f519ae41539d49791fae62cc9a7fa2fd65e5d213bf59af247582ad94d0f74e5e7dce3bbe6b7ba11c27580addbaebfc11c4c014c696880ed9ee7c66a2c55c4674a0dff6dbd29ba02d46868a6f76527869359756448d372fff15d38a06476cc5049de8636b0e7800986eba38c92d4d9885a64b3c92860118d6b02bcbbb14e29c997add3116bcf1587f1521a1b1dd95ae6c1c5255bcec6d603f71ecd8b19d999f4631a1240b5178628e106b1082c84981dd154b4c73320fd658e30952c20755fbf9ebd020d9b587a62830e6ba358b3e3e8e37d1", 0xfa, 0x8}]) mprotect(&(0x7f0000599000/0x1000)=nil, 0x1000, 0x2000008) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:05:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000a000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:17 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6e, 0x9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a}, [{}]}, 0x78) 08:05:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x600}]}, 0x78) 08:05:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xb}, [{}]}, 0x78) 08:05:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000f000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000040000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080fffffdef000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080fffffffe000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000088000000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000020008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:18 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0xfffffffffffffdef) 08:05:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000030008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="746573745f64756d6d795f656e6372797074696f6e2c7265736769643dffb752b5bd6497069db638ede7061ce9290af5028483054cc3288b9d1c38652ab8560a11fe33af9096912e2e5e5c51e6685be8754f9620c8ace30cb9220b7a56a11c2c6aa22a352483ff9ea8e3702c7e6563012c5b46b90abdc6af8e1c5f17a76d8a27addd37ca5038831f21b38da068f7", @ANYRESHEX, @ANYBLOB="095bae1ca3637d"]) 08:05:18 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x