loop0: detected capacity change from 0 to 1024 ======================================================= WARNING: The mand mount option has been deprecated and and is ignored by this kernel. Remove the mand option from the mount to silence this warning. ======================================================= EXT4-fs (loop0): mounted filesystem 00000000-0000-0006-0000-000000000000 r/w without journal. Quota mode: none. ext4 filesystem being mounted at /0/file1 supports timestamps until 2038-01-19 (0x7fffffff) ------------[ cut here ]------------ WARNING: mm/page-writeback.c:2710 at __folio_mark_dirty+0x202/0xe10 mm/page-writeback.c:2710, CPU#0: syz.0.0/5347 Modules linked in: CPU: 0 UID: 0 PID: 5347 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 RIP: 0010:__folio_mark_dirty+0x202/0xe10 mm/page-writeback.c:2710 Code: 3c 20 00 74 08 48 89 df e8 fb ce 2a 00 4c 8b 33 4c 89 f6 48 83 e6 08 31 ff e8 2a 29 c3 ff 49 83 e6 08 75 20 e8 3f 24 c3 ff 90 <0f> 0b 90 eb 1a e8 34 24 c3 ff 48 8b 2c 24 e9 5d 07 00 00 e8 26 24 RSP: 0018:ffffc9000de27368 EFLAGS: 00010046 RAX: ffffffff81fde321 RBX: ffffea00013905c0 RCX: 0000000000100000 RDX: ffffc90020391000 RSI: 00000000000fffff RDI: 0000000000100000 RBP: ffff888045466e98 R08: ffffea00013905c7 R09: 1ffffd40002720b8 R10: dffffc0000000000 R11: fffff940002720b9 R12: dffffc0000000000 R13: ffff888045466ea0 R14: 0000000000000000 R15: 0000000000000001 FS: 00007f298ebd86c0(0000) GS:ffff88808d414000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000020000000060c CR3: 00000000114da000 CR4: 0000000000352ef0 Call Trace: block_dirty_folio+0x17a/0x1d0 fs/buffer.c:754 fault_dirty_shared_page+0x103/0x550 mm/memory.c:3558 wp_page_shared mm/memory.c:3945 [inline] do_wp_page+0x26ec/0x5810 mm/memory.c:4148 handle_pte_fault mm/memory.c:6289 [inline] __handle_mm_fault mm/memory.c:6411 [inline] handle_mm_fault+0x14c5/0x32b0 mm/memory.c:6580 do_user_addr_fault+0x764/0x1380 arch/x86/mm/fault.c:1387 handle_page_fault arch/x86/mm/fault.c:1476 [inline] exc_page_fault+0x71/0xd0 arch/x86/mm/fault.c:1532 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:618 RIP: 0010:rep_movs_alternative+0x11/0x90 arch/x86/lib/copy_user_64.S:47 Code: e9 14 41 04 00 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 83 f9 40 73 44 83 f9 08 73 25 85 c9 74 0f 8a 06 <88> 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 cc cc cc cc 66 2e 0f 1f RSP: 0018:ffffc9000de279e8 EFLAGS: 00050202 RAX: ffffffff848f9268 RBX: 0000000000000004 RCX: 0000000000000004 RDX: 0000000000000000 RSI: ffffc9000de27aa0 RDI: 000020000000060c RBP: ffffc9000de27b40 R08: 0000000000000003 R09: 0000000000000004 R10: dffffc0000000000 R11: fffff52001bc4f54 R12: 0000200000000610 R13: 00007ffffffff000 R14: ffffc9000de27aa0 R15: 000020000000060c copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline] raw_copy_to_user arch/x86/include/asm/uaccess_64.h:147 [inline] _inline_copy_to_user include/linux/uaccess.h:206 [inline] _copy_to_user+0x8a/0xb0 lib/usercopy.c:26 copy_to_user include/linux/uaccess.h:236 [inline] bpf_test_finish+0x1dd/0x6d0 net/bpf/test_run.c:491 bpf_prog_test_run_xdp+0x891/0x10e0 net/bpf/test_run.c:1400 bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4703 __sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6182 __do_sys_bpf kernel/bpf/syscall.c:6274 [inline] __se_sys_bpf kernel/bpf/syscall.c:6272 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6272 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f298dd8f7c9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f298ebd8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007f298dfe5fa0 RCX: 00007f298dd8f7c9 RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a RBP: 00007f298de13f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f298dfe6038 R14: 00007f298dfe5fa0 R15: 00007ffc71676578 ---------------- Code disassembly (best guess): 0: e9 14 41 04 00 jmp 0x44119 5: cc int3 6: cc int3 7: cc int3 8: cc int3 9: 90 nop a: 90 nop b: 90 nop c: 90 nop d: 90 nop e: 90 nop f: 90 nop 10: 90 nop 11: 90 nop 12: 90 nop 13: 90 nop 14: 90 nop 15: 90 nop 16: 90 nop 17: 90 nop 18: 90 nop 19: 48 83 f9 40 cmp $0x40,%rcx 1d: 73 44 jae 0x63 1f: 83 f9 08 cmp $0x8,%ecx 22: 73 25 jae 0x49 24: 85 c9 test %ecx,%ecx 26: 74 0f je 0x37 28: 8a 06 mov (%rsi),%al * 2a: 88 07 mov %al,(%rdi) <-- trapping instruction 2c: 48 ff c7 inc %rdi 2f: 48 ff c6 inc %rsi 32: 48 ff c9 dec %rcx 35: 75 f1 jne 0x28 37: c3 ret 38: cc int3 39: cc int3 3a: cc int3 3b: cc int3 3c: 66 data16 3d: 2e cs 3e: 0f .byte 0xf 3f: 1f (bad)