./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/88, 0x58) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000080)="3666440f50f564ff0941c3c4e2c9975842c4c2a37d794e005cc4c1b62ac13e0f1110c442019dccd3196f27") socket$inet6(0xa, 0x3, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x0) [ 296.608283] net_ratelimit: 10 callbacks suppressed [ 296.608291] protocol 88fb is buggy, dev hsr_slave_0 [ 296.618440] protocol 88fb is buggy, dev hsr_slave_1 [ 296.629474] device lo entered promiscuous mode [ 296.653297] device lo left promiscuous mode 01:31:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, 0x0) 01:31:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x8, &(0x7f0000000080)=0xfffffffffffffffb, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) sendto$inet6(r2, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x0) close(r2) [ 296.694812] device lo entered promiscuous mode 01:31:19 executing program 3: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000002c0), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x0, 0x2}, 0x20) accept4(r0, 0x0, 0x0, 0x0) [ 296.723163] device lo left promiscuous mode 01:31:19 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200), 0x0, 0x1e00) 01:31:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x81, 0x7, 0x3000}, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 296.852962] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 296.920778] EXT4-fs (sda1): re-mounted. Opts: [ 296.957871] device lo entered promiscuous mode [ 297.000628] device lo left promiscuous mode 01:31:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, 0x0) 01:31:19 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200), 0x0, 0x1e00) 01:31:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000), 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/rt6_stats\x00') sendfile(r1, r2, 0x0, 0x80000003) [ 297.030814] device lo entered promiscuous mode [ 297.046821] device lo left promiscuous mode 01:31:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:19 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x6, 0x44c0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000100)=r3) 01:31:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 297.211147] EXT4-fs (sda1): re-mounted. Opts: 01:31:19 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e438", 0x100, 0x1e00) [ 297.240006] device lo entered promiscuous mode [ 297.248270] protocol 88fb is buggy, dev hsr_slave_0 [ 297.253343] protocol 88fb is buggy, dev hsr_slave_1 [ 297.275618] device lo left promiscuous mode 01:31:19 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) 01:31:19 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 297.367853] device lo entered promiscuous mode 01:31:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, 0x0) [ 297.400978] device lo left promiscuous mode 01:31:19 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x100, 0x1e00) [ 297.489685] FAULT_INJECTION: forcing a failure. [ 297.489685] name failslab, interval 1, probability 0, space 0, times 0 [ 297.502489] CPU: 1 PID: 9979 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 297.509609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.518974] Call Trace: [ 297.521620] dump_stack+0x1db/0x2d0 [ 297.525268] ? dump_stack_print_info.cold+0x20/0x20 [ 297.530345] ? __might_fault+0x12b/0x1e0 [ 297.534418] should_fail.cold+0xa/0x15 [ 297.538327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 297.543445] ? ___might_sleep+0x1e7/0x310 [ 297.547586] ? arch_local_save_flags+0x50/0x50 [ 297.552170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.557734] __should_failslab+0x121/0x190 [ 297.561975] should_failslab+0x9/0x14 [ 297.565775] __kmalloc+0x2dc/0x740 [ 297.569320] ? find_held_lock+0x35/0x120 [ 297.573449] ? drm_ioctl+0x4a9/0xb50 [ 297.577204] drm_ioctl+0x4a9/0xb50 [ 297.580800] ? drm_syncobj_fd_to_handle_ioctl+0x4c0/0x4c0 [ 297.586380] ? lock_downgrade+0x910/0x910 [ 297.590545] ? drm_version+0x3d0/0x3d0 [ 297.594499] ? smk_tskacc+0x3d3/0x520 [ 297.598321] ? smack_privileged+0xd0/0xd0 [ 297.602493] ? iterate_fd+0x4b0/0x4b0 [ 297.606296] ? drm_version+0x3d0/0x3d0 [ 297.610245] do_vfs_ioctl+0x107b/0x17d0 [ 297.614222] ? smk_curacc+0x7f/0xa0 [ 297.617836] ? ioctl_preallocate+0x2f0/0x2f0 [ 297.622243] ? smack_inode_setattr+0x290/0x290 [ 297.626847] ? __fget_light+0x2db/0x420 [ 297.630830] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 297.636369] ? fput+0x128/0x1a0 [ 297.639652] ? do_syscall_64+0x8c/0x800 [ 297.643625] ? do_syscall_64+0x8c/0x800 [ 297.647591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.653172] ? security_file_ioctl+0x93/0xc0 [ 297.657601] ksys_ioctl+0xab/0xd0 [ 297.661070] __x64_sys_ioctl+0x73/0xb0 [ 297.664976] do_syscall_64+0x1a3/0x800 [ 297.668867] ? syscall_return_slowpath+0x5f0/0x5f0 [ 297.673794] ? prepare_exit_to_usermode+0x232/0x3b0 [ 297.678816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.683679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.688865] RIP: 0033:0x458099 [ 297.692060] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.710948] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 297.721197] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 297.728477] RDX: 00000000200003c0 RSI: ffffffffffffffc3 RDI: 0000000000000003 01:31:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @dev}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) [ 297.735752] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 297.743022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 297.750297] R13: 00000000004bf2d5 R14: 00000000004d0a30 R15: 0000000000000004 01:31:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 297.802930] EXT4-fs (sda1): re-mounted. Opts: 01:31:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) 01:31:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)) 01:31:20 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 297.908217] device lo entered promiscuous mode [ 297.941083] device lo left promiscuous mode 01:31:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e438", 0x100, 0x1e00) [ 297.999402] device lo entered promiscuous mode [ 298.004502] device lo left promiscuous mode 01:31:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) 01:31:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, 0x0) 01:31:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) socket$unix(0x1, 0x2, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) [ 298.098825] EXT4-fs (sda1): re-mounted. Opts: 01:31:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x180, 0x1e00) 01:31:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)) [ 298.237416] device lo entered promiscuous mode [ 298.255355] device lo left promiscuous mode [ 298.275991] EXT4-fs (sda1): re-mounted. Opts: 01:31:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00000002, &(0x7f00000003c0)) 01:31:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x1e00) 01:31:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, 0x0) [ 298.386974] EXT4-fs (sda1): re-mounted. Opts: 01:31:20 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000240)={0x0, @broadcast, @multicast2}, &(0x7f0000000380)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', r1}) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x80003, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x30, r4, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1f}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004004}, 0x841) r5 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) getsockopt$XDP_STATISTICS(r5, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) close(r0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f00000003c0)={0x0, 0x3}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000440)={r6}, &(0x7f0000000480)=0x8) 01:31:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x180, 0x1e00) 01:31:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005421, &(0x7f00000003c0)) [ 298.516371] device lo entered promiscuous mode 01:31:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000200)="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", 0x200, 0x1e00) [ 298.549758] device lo left promiscuous mode [ 298.561347] EXT4-fs (sda1): re-mounted. Opts: 01:31:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)) 01:31:20 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x180, 0x1e00) 01:31:20 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005450, &(0x7f00000003c0)) [ 298.600324] device lo entered promiscuous mode [ 298.608266] protocol 88fb is buggy, dev hsr_slave_0 [ 298.613371] protocol 88fb is buggy, dev hsr_slave_1 [ 298.622635] device lo left promiscuous mode 01:31:21 executing program 1: r0 = socket$packet(0x11, 0x1000000000143, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x80000000000088) ioctl$NBD_CLEAR_QUE(r2, 0xab05) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r3 = shmget(0x2, 0x1000, 0x78000810, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(r3, 0xb) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000240)={r4, 0x0, &(0x7f0000000140), &(0x7f0000000180)=[0x2f, 0x8, 0x8, 0x40, 0x0], 0x20, 0xa, 0x0, &(0x7f00000001c0)=[0x7, 0x0, 0x1, 0x1, 0x8, 0x7, 0x6, 0xffffffff, 0x7, 0x100000000], &(0x7f0000000200)=[0x4, 0x0, 0x7]}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r2) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video1\x00', 0x2, 0x0) 01:31:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, 0x0) [ 298.751345] EXT4-fs (sda1): re-mounted. Opts: 01:31:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005451, &(0x7f00000003c0)) 01:31:21 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1c0, 0x1e00) 01:31:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x1e00) 01:31:21 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2001}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x8, 0x70bd2d, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0xc010) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000200)) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @dev}, 0x10) close(r2) [ 298.985750] EXT4-fs (sda1): re-mounted. Opts: 01:31:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005452, &(0x7f00000003c0)) 01:31:21 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1c0, 0x1e00) 01:31:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) 01:31:21 executing program 0 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)) [ 299.152960] FAULT_INJECTION: forcing a failure. [ 299.152960] name failslab, interval 1, probability 0, space 0, times 0 [ 299.155391] device lo entered promiscuous mode [ 299.229111] device lo left promiscuous mode [ 299.235430] CPU: 0 PID: 10100 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #39 [ 299.242726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.242734] Call Trace: [ 299.242760] dump_stack+0x1db/0x2d0 [ 299.242784] ? dump_stack_print_info.cold+0x20/0x20 [ 299.242819] should_fail.cold+0xa/0x15 [ 299.242843] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 299.258392] ? ___might_sleep+0x1e7/0x310 01:31:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005460, &(0x7f00000003c0)) [ 299.258416] ? arch_local_save_flags+0x50/0x50 [ 299.258444] __should_failslab+0x121/0x190 [ 299.258471] should_failslab+0x9/0x14 [ 299.271650] EXT4-fs (sda1): re-mounted. Opts: [ 299.272447] __kmalloc+0x2dc/0x740 [ 299.297301] ? strncpy_from_user+0x4e0/0x4e0 [ 299.301911] ? fput+0x128/0x1a0 [ 299.305205] ? do_syscall_64+0x8c/0x800 [ 299.309171] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 299.314012] __x64_sys_memfd_create+0x13c/0x4b0 [ 299.318668] ? memfd_fcntl+0x1870/0x1870 [ 299.322729] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 299.327493] do_syscall_64+0x1a3/0x800 [ 299.331368] ? syscall_return_slowpath+0x5f0/0x5f0 [ 299.336300] ? prepare_exit_to_usermode+0x232/0x3b0 [ 299.341335] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.346172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.351361] RIP: 0033:0x458099 [ 299.354561] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:31:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) [ 299.373455] RSP: 002b:00007fada5fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.381152] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 299.388413] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 299.395678] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 [ 299.402941] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fada5ff06d4 [ 299.410222] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 [ 299.421769] device lo entered promiscuous mode 01:31:21 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1c0, 0x1e00) [ 299.427555] device lo left promiscuous mode 01:31:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)) 01:31:21 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:21 executing program 0 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) 01:31:21 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1e0, 0x1e00) 01:31:21 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff40049409, &(0x7f00000003c0)) [ 299.632824] device lo entered promiscuous mode [ 299.675015] FAULT_INJECTION: forcing a failure. [ 299.675015] name failslab, interval 1, probability 0, space 0, times 0 [ 299.693229] device lo left promiscuous mode [ 299.733162] CPU: 1 PID: 10129 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #39 [ 299.740389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.749742] Call Trace: [ 299.749771] dump_stack+0x1db/0x2d0 [ 299.749801] ? dump_stack_print_info.cold+0x20/0x20 [ 299.749826] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 299.749844] ? print_usage_bug+0xd0/0xd0 [ 299.766320] should_fail.cold+0xa/0x15 [ 299.766342] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 299.766366] ? ___might_sleep+0x1e7/0x310 [ 299.766383] ? arch_local_save_flags+0x50/0x50 [ 299.788117] __should_failslab+0x121/0x190 [ 299.792367] should_failslab+0x9/0x14 [ 299.796183] kmem_cache_alloc+0x2be/0x710 [ 299.800456] ? shmem_destroy_callback+0xc0/0xc0 [ 299.805140] shmem_alloc_inode+0x1c/0x50 [ 299.809224] alloc_inode+0x66/0x190 [ 299.812862] new_inode_pseudo+0x71/0x1b0 [ 299.816928] ? prune_icache_sb+0x1c0/0x1c0 [ 299.821180] ? _raw_spin_unlock+0x2d/0x50 [ 299.825352] new_inode+0x1f/0x40 [ 299.828730] shmem_get_inode+0xe1/0x8d0 01:31:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff4020940d, &(0x7f00000003c0)) [ 299.832713] ? shmem_encode_fh+0x340/0x340 [ 299.836953] ? lock_downgrade+0x910/0x910 [ 299.841119] ? lock_release+0xc40/0xc40 [ 299.845104] ? __check_object_size+0xa3/0x790 [ 299.845134] __shmem_file_setup.part.0+0x7e/0x2b0 [ 299.845157] shmem_file_setup+0x66/0x90 [ 299.845176] __x64_sys_memfd_create+0x2a2/0x4b0 [ 299.845200] ? memfd_fcntl+0x1870/0x1870 [ 299.845220] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 299.863217] do_syscall_64+0x1a3/0x800 [ 299.863239] ? syscall_return_slowpath+0x5f0/0x5f0 01:31:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) [ 299.863258] ? prepare_exit_to_usermode+0x232/0x3b0 [ 299.863281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.863307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.863322] RIP: 0033:0x458099 [ 299.899105] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.918014] RSP: 002b:00007fada5fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 299.925727] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 01:31:22 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1e0, 0x1e00) 01:31:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xc0045878, &(0x7f00000003c0)) 01:31:22 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c090", 0x1e0, 0x1e00) [ 299.933000] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 299.933010] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 [ 299.933020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fada5ff06d4 [ 299.933033] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 [ 299.964825] device lo entered promiscuous mode [ 299.970014] device lo left promiscuous mode 01:31:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)) 01:31:22 executing program 0 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:22 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc0045878, &(0x7f00000003c0)) 01:31:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) 01:31:22 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1f0, 0x1e00) [ 300.220638] device lo entered promiscuous mode [ 300.235013] device lo left promiscuous mode [ 300.241711] FAULT_INJECTION: forcing a failure. [ 300.241711] name failslab, interval 1, probability 0, space 0, times 0 [ 300.254798] device lo entered promiscuous mode [ 300.293498] device lo left promiscuous mode [ 300.334429] CPU: 1 PID: 10169 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #39 [ 300.341652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.351019] Call Trace: [ 300.353626] dump_stack+0x1db/0x2d0 [ 300.357272] ? dump_stack_print_info.cold+0x20/0x20 [ 300.362331] ? __save_stack_trace+0x8a/0xf0 [ 300.366672] should_fail.cold+0xa/0x15 [ 300.370573] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 300.375692] ? ___might_sleep+0x1e7/0x310 [ 300.379850] ? shmem_get_inode+0xe1/0x8d0 01:31:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x120000000000, 0x400000) setsockopt$inet_udp_int(r2, 0x11, 0xb, &(0x7f00000000c0)=0x8, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)) [ 300.384007] ? arch_local_save_flags+0x50/0x50 [ 300.388599] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.394029] ? percpu_ref_put_many+0x129/0x270 [ 300.398636] __should_failslab+0x121/0x190 [ 300.402887] should_failslab+0x9/0x14 [ 300.402904] kmem_cache_alloc+0x2be/0x710 [ 300.402921] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 300.415901] ? map_id_range_down+0x1ee/0x430 [ 300.420329] new_inode_smack+0x20/0xb0 [ 300.424233] smack_inode_alloc_security+0x97/0x100 [ 300.429182] security_inode_alloc+0x90/0xe0 [ 300.433535] inode_init_always+0x662/0xd30 [ 300.437788] ? __address_space_init_once+0x240/0x240 [ 300.442903] ? rcu_read_lock_sched_held+0x110/0x130 [ 300.447979] alloc_inode+0x83/0x190 [ 300.451637] new_inode_pseudo+0x71/0x1b0 [ 300.452279] device lo entered promiscuous mode [ 300.455708] ? prune_icache_sb+0x1c0/0x1c0 [ 300.455730] ? _raw_spin_unlock+0x2d/0x50 [ 300.455749] new_inode+0x1f/0x40 [ 300.455766] shmem_get_inode+0xe1/0x8d0 [ 300.455784] ? shmem_encode_fh+0x340/0x340 [ 300.465411] device lo left promiscuous mode [ 300.468722] ? lock_downgrade+0x910/0x910 [ 300.468738] ? lock_release+0xc40/0xc40 [ 300.468753] ? __check_object_size+0xa3/0x790 [ 300.468781] __shmem_file_setup.part.0+0x7e/0x2b0 [ 300.468803] shmem_file_setup+0x66/0x90 [ 300.468820] __x64_sys_memfd_create+0x2a2/0x4b0 [ 300.468837] ? memfd_fcntl+0x1870/0x1870 [ 300.468856] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 300.468881] do_syscall_64+0x1a3/0x800 [ 300.468900] ? syscall_return_slowpath+0x5f0/0x5f0 [ 300.528373] ? prepare_exit_to_usermode+0x232/0x3b0 01:31:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) [ 300.533496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.538621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.543820] RIP: 0033:0x458099 [ 300.547020] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.565922] RSP: 002b:00007fada5fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 300.565938] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 01:31:22 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1f0, 0x1e00) 01:31:22 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc0189436, &(0x7f00000003c0)) [ 300.565947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 300.565956] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 [ 300.565973] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fada5ff06d4 [ 300.565983] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 01:31:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) [ 300.628292] device lo entered promiscuous mode [ 300.646868] device lo left promiscuous mode 01:31:23 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de", 0x1f0, 0x1e00) 01:31:23 executing program 0 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc020660b, &(0x7f00000003c0)) 01:31:23 executing program 5 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) 01:31:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) pread64(r0, &(0x7f00000000c0)=""/184, 0xb8, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x0, @broadcast}, 0xfffffffffffffffd) close(r0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xc4000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000180)={0x9, 0x80000001, 0x6, 0x100000000, 0x8a, 0x1, 0x2}, 0xc) 01:31:23 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1f8, 0x1e00) [ 300.947354] device lo entered promiscuous mode [ 300.965258] FAULT_INJECTION: forcing a failure. [ 300.965258] name failslab, interval 1, probability 0, space 0, times 0 [ 300.972703] device lo left promiscuous mode [ 300.993121] FAULT_INJECTION: forcing a failure. [ 300.993121] name failslab, interval 1, probability 0, space 0, times 0 [ 301.000491] CPU: 0 PID: 10218 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 301.011536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.020918] Call Trace: [ 301.023522] dump_stack+0x1db/0x2d0 [ 301.027165] ? dump_stack_print_info.cold+0x20/0x20 [ 301.032229] should_fail.cold+0xa/0x15 [ 301.036131] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 301.041248] ? ___might_sleep+0x1e7/0x310 [ 301.045432] ? arch_local_save_flags+0x50/0x50 [ 301.050036] __should_failslab+0x121/0x190 [ 301.054285] should_failslab+0x9/0x14 [ 301.058091] __kmalloc+0x2dc/0x740 [ 301.061644] ? strncpy_from_user+0x4e0/0x4e0 [ 301.066059] ? fput+0x128/0x1a0 [ 301.069344] ? do_syscall_64+0x8c/0x800 [ 301.073324] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 301.078180] __x64_sys_memfd_create+0x13c/0x4b0 [ 301.082871] ? memfd_fcntl+0x1870/0x1870 [ 301.086938] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 301.091710] do_syscall_64+0x1a3/0x800 [ 301.095610] ? syscall_return_slowpath+0x5f0/0x5f0 [ 301.100550] ? prepare_exit_to_usermode+0x232/0x3b0 [ 301.105579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.110441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.115637] RIP: 0033:0x458099 [ 301.118834] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.137824] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 301.145539] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 301.152812] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 301.160082] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 [ 301.167372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb86e3de6d4 [ 301.174641] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 [ 301.181941] CPU: 1 PID: 10219 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #39 [ 301.189143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 01:31:23 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1f8, 0x1e00) 01:31:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc9, &(0x7f00000003c0)) 01:31:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x1e00) [ 301.189150] Call Trace: [ 301.189170] dump_stack+0x1db/0x2d0 [ 301.189206] ? dump_stack_print_info.cold+0x20/0x20 [ 301.209757] ? lockdep_init_map+0x10c/0x5b0 [ 301.214093] should_fail.cold+0xa/0x15 [ 301.214115] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 301.214138] ? ___might_sleep+0x1e7/0x310 [ 301.214156] ? arch_local_save_flags+0x50/0x50 [ 301.223129] ? lockdep_init_map+0x10c/0x5b0 [ 301.223156] __should_failslab+0x121/0x190 [ 301.223175] should_failslab+0x9/0x14 [ 301.223204] kmem_cache_alloc+0x2be/0x710 [ 301.231920] ? kasan_check_read+0x11/0x20 [ 301.231946] __d_alloc+0xae/0xbe0 [ 301.231975] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 301.244417] ? _raw_spin_unlock+0x2d/0x50 [ 301.252696] ? inode_sb_list_add+0x223/0x310 [ 301.252716] ? current_time+0x104/0x1b0 [ 301.252732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.252749] ? lockdep_init_map+0x10c/0x5b0 [ 301.252774] d_alloc_pseudo+0x1e/0x30 [ 301.287364] alloc_file_pseudo+0x14f/0x3b0 [ 301.291703] ? alloc_file+0x4d0/0x4d0 [ 301.295520] ? __check_object_size+0xa3/0x790 [ 301.300031] ? kasan_check_write+0x14/0x20 [ 301.304302] __shmem_file_setup.part.0+0x108/0x2b0 [ 301.309254] shmem_file_setup+0x66/0x90 [ 301.313244] __x64_sys_memfd_create+0x2a2/0x4b0 [ 301.317929] ? memfd_fcntl+0x1870/0x1870 [ 301.318810] device lo entered promiscuous mode [ 301.322012] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 301.322038] do_syscall_64+0x1a3/0x800 [ 301.322058] ? syscall_return_slowpath+0x5f0/0x5f0 [ 301.322076] ? prepare_exit_to_usermode+0x232/0x3b0 [ 301.336679] device lo left promiscuous mode [ 301.340309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.340338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.340350] RIP: 0033:0x458099 [ 301.340366] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.340374] RSP: 002b:00007fada5fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 301.340389] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 01:31:23 executing program 2: ioctl(0xffffffffffffffff, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0x4, 0x80000000, 0x814}) 01:31:23 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1f8, 0x1e00) 01:31:23 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x80, 0x2, 0x7}}, 0x14) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 301.340398] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 301.340410] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 [ 301.411395] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fada5ff06d4 [ 301.411406] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 01:31:23 executing program 0 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:23 executing program 5 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(0xffffffffffffffff, &(0x7f0000000200)="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", 0x200, 0x1e00) 01:31:23 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000240)=0x1f, 0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r3, 0x800442d4, &(0x7f0000000080)=0xe8e5) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f00000001c0)={0x401, 0x0, 0x0, 0x20}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000180)={0x11d, r4, 0x11000, 0xffffffffffffe23e}) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) close(r0) clock_gettime(0x6, &(0x7f0000000040)) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000140)=0x40a0) 01:31:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 301.621174] FAULT_INJECTION: forcing a failure. [ 301.621174] name failslab, interval 1, probability 0, space 0, times 0 [ 301.648972] device lo entered promiscuous mode [ 301.658865] FAULT_INJECTION: forcing a failure. [ 301.658865] name failslab, interval 1, probability 0, space 0, times 0 01:31:24 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fc, 0x1e00) [ 301.660721] device lo left promiscuous mode [ 301.692452] CPU: 0 PID: 10251 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 301.699665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.709028] Call Trace: [ 301.711631] dump_stack+0x1db/0x2d0 [ 301.715290] ? dump_stack_print_info.cold+0x20/0x20 [ 301.720326] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 301.725624] ? print_usage_bug+0xd0/0xd0 [ 301.729702] should_fail.cold+0xa/0x15 [ 301.733605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 301.738726] ? ___might_sleep+0x1e7/0x310 [ 301.742886] ? arch_local_save_flags+0x50/0x50 [ 301.747493] __should_failslab+0x121/0x190 [ 301.751743] should_failslab+0x9/0x14 [ 301.755553] kmem_cache_alloc+0x2be/0x710 [ 301.759717] ? shmem_destroy_callback+0xc0/0xc0 [ 301.759734] shmem_alloc_inode+0x1c/0x50 [ 301.759753] alloc_inode+0x66/0x190 [ 301.772105] new_inode_pseudo+0x71/0x1b0 [ 301.776180] ? prune_icache_sb+0x1c0/0x1c0 [ 301.780444] ? _raw_spin_unlock+0x2d/0x50 [ 301.784612] new_inode+0x1f/0x40 [ 301.788011] shmem_get_inode+0xe1/0x8d0 [ 301.792005] ? shmem_encode_fh+0x340/0x340 [ 301.796256] ? lock_downgrade+0x910/0x910 [ 301.800414] ? lock_release+0xc40/0xc40 [ 301.804392] ? __check_object_size+0xa3/0x790 [ 301.808910] __shmem_file_setup.part.0+0x7e/0x2b0 [ 301.813772] shmem_file_setup+0x66/0x90 [ 301.817779] __x64_sys_memfd_create+0x2a2/0x4b0 [ 301.822455] ? memfd_fcntl+0x1870/0x1870 [ 301.826539] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 301.831309] do_syscall_64+0x1a3/0x800 [ 301.835216] ? syscall_return_slowpath+0x5f0/0x5f0 [ 301.840155] ? prepare_exit_to_usermode+0x232/0x3b0 [ 301.845222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.850095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.855283] RIP: 0033:0x458099 [ 301.858485] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.877388] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 301.885276] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 301.892548] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 301.899818] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 [ 301.907087] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb86e3de6d4 [ 301.914355] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 [ 301.921647] CPU: 1 PID: 10254 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #39 [ 301.928852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.938223] Call Trace: 01:31:24 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fc, 0x1e00) 01:31:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x2000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r2, 0xffffffffffffffc3, &(0x7f00000003c0)) syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x7, 0x82800) getsockname$netlink(r1, &(0x7f0000000140), &(0x7f0000000180)=0xc) 01:31:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(0xffffffffffffffff, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x1e00) [ 301.940821] dump_stack+0x1db/0x2d0 [ 301.944460] ? dump_stack_print_info.cold+0x20/0x20 [ 301.949487] ? lockdep_init_map+0x10c/0x5b0 [ 301.953833] should_fail.cold+0xa/0x15 [ 301.957745] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 301.962870] ? ___might_sleep+0x1e7/0x310 [ 301.967041] ? arch_local_save_flags+0x50/0x50 [ 301.971631] ? lockdep_init_map+0x10c/0x5b0 [ 301.975975] __should_failslab+0x121/0x190 [ 301.980227] should_failslab+0x9/0x14 [ 301.984041] kmem_cache_alloc+0x2be/0x710 [ 301.988219] ? kasan_check_read+0x11/0x20 01:31:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(0xffffffffffffffff, &(0x7f0000000200)="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", 0x200, 0x1e00) [ 301.992392] __d_alloc+0xae/0xbe0 [ 301.995860] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 302.000884] ? _raw_spin_unlock+0x2d/0x50 [ 302.000900] ? inode_sb_list_add+0x223/0x310 [ 302.000918] ? current_time+0x104/0x1b0 [ 302.000933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.000950] ? lockdep_init_map+0x10c/0x5b0 [ 302.000983] d_alloc_pseudo+0x1e/0x30 [ 302.001001] alloc_file_pseudo+0x14f/0x3b0 [ 302.031358] ? alloc_file+0x4d0/0x4d0 [ 302.035173] ? __check_object_size+0xa3/0x790 [ 302.039695] ? kasan_check_write+0x14/0x20 01:31:24 executing program 5 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 302.043946] __shmem_file_setup.part.0+0x108/0x2b0 [ 302.048896] shmem_file_setup+0x66/0x90 [ 302.052882] __x64_sys_memfd_create+0x2a2/0x4b0 [ 302.057560] ? memfd_fcntl+0x1870/0x1870 [ 302.061639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.066413] do_syscall_64+0x1a3/0x800 [ 302.070316] ? syscall_return_slowpath+0x5f0/0x5f0 [ 302.075262] ? prepare_exit_to_usermode+0x232/0x3b0 [ 302.080297] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.085158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.090366] RIP: 0033:0x458099 [ 302.093570] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.112479] RSP: 002b:00007fada5fefa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 302.120203] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 302.127485] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 302.134758] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 01:31:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x3, &(0x7f0000000040)) [ 302.142037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fada5ff06d4 [ 302.149398] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 [ 302.162073] device lo entered promiscuous mode [ 302.207726] device lo left promiscuous mode [ 302.234897] FAULT_INJECTION: forcing a failure. [ 302.234897] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 302.246719] CPU: 1 PID: 10277 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 302.253914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.263275] Call Trace: [ 302.265881] dump_stack+0x1db/0x2d0 [ 302.269530] ? dump_stack_print_info.cold+0x20/0x20 [ 302.274561] ? lock_downgrade+0x910/0x910 [ 302.278724] ? kasan_check_read+0x11/0x20 [ 302.282891] should_fail.cold+0xa/0x15 [ 302.286836] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 302.291982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.297538] ? rcu_read_unlock+0x16/0x60 [ 302.301609] ? find_held_lock+0x35/0x120 [ 302.305679] ? rcu_read_unlock+0x16/0x60 [ 302.309829] should_fail_alloc_page+0x50/0x60 [ 302.314336] __alloc_pages_nodemask+0x323/0xdc0 [ 302.319010] ? lock_downgrade+0x910/0x910 [ 302.323170] ? kasan_check_read+0x11/0x20 [ 302.327341] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 01:31:24 executing program 0 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, 0x0, 0x0, 0x1e00) 01:31:24 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c23671", 0x1fc, 0x1e00) [ 302.332636] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 302.337763] ? ___might_sleep+0x1e7/0x310 [ 302.337792] ? trace_hardirqs_off+0xb8/0x310 [ 302.346336] cache_grow_begin+0x9c/0x8c0 [ 302.350409] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 302.355973] ? check_preemption_disabled+0x48/0x290 [ 302.355996] kmem_cache_alloc+0x645/0x710 [ 302.356019] ? shmem_destroy_callback+0xc0/0xc0 [ 302.369849] shmem_alloc_inode+0x1c/0x50 [ 302.373925] alloc_inode+0x66/0x190 [ 302.377565] new_inode_pseudo+0x71/0x1b0 [ 302.381640] ? prune_icache_sb+0x1c0/0x1c0 [ 302.385893] ? _raw_spin_unlock+0x2d/0x50 [ 302.390317] new_inode+0x1f/0x40 [ 302.393696] shmem_get_inode+0xe1/0x8d0 [ 302.397688] ? shmem_encode_fh+0x340/0x340 [ 302.401941] ? lock_downgrade+0x910/0x910 [ 302.406102] ? lock_release+0xc40/0xc40 [ 302.410089] ? __check_object_size+0xa3/0x790 [ 302.414605] __shmem_file_setup.part.0+0x7e/0x2b0 [ 302.419474] shmem_file_setup+0x66/0x90 [ 302.423476] __x64_sys_memfd_create+0x2a2/0x4b0 [ 302.428152] ? memfd_fcntl+0x1870/0x1870 [ 302.428172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.428221] do_syscall_64+0x1a3/0x800 [ 302.428271] ? syscall_return_slowpath+0x5f0/0x5f0 [ 302.428289] ? prepare_exit_to_usermode+0x232/0x3b0 [ 302.428310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.428336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.428353] RIP: 0033:0x458099 [ 302.441295] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:31:24 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000280)={r1, 0x3, 0x6, @remote}, 0x2d3) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='syscall\x00') r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000140)="7318d452285b1b4a78a3c9d58de72bb38ccee8f9144ff28c04539bf9d865139cb88c4c7eddd57defd9cd27ea615836afcfcea43c37bd3035ba29cf5fea1e6c4b32ca1cc606dfb13ee24c57b51238a1b951735c97b686d30fd113c1946494cc5b52c6801a076356c886ff953e8abd8723f9e9c7c76154ae839fcc8278bdd08f79ab81a0d6f3d2", 0x86, r3}, 0x68) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r3}) close(r0) 01:31:24 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000100)={r1, &(0x7f00000000c0)=""/28}) 01:31:24 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fe, 0x1e00) [ 302.441305] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 302.441319] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 302.441328] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 302.441338] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 [ 302.441348] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb86e3de6d4 [ 302.441357] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 [ 302.531214] EXT4-fs: 3 callbacks suppressed [ 302.531226] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 302.575875] device lo entered promiscuous mode 01:31:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, 0x0, 0x0, 0x1e00) 01:31:24 executing program 5 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 302.616505] device lo left promiscuous mode [ 302.634721] device lo entered promiscuous mode [ 302.660829] device lo left promiscuous mode 01:31:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000040)='/dev/dri/card#\x00', 0xffffffffffffffff}, 0x30) sched_setparam(r1, &(0x7f00000000c0)=0xc228) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:25 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fe, 0x1e00) 01:31:25 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x8a000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xc}}, 0x20) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000240), &(0x7f0000000280)=0x8) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f00000000c0), 0x1, r2, 0x30, 0x1, @ib={0x1b, 0x2, 0x7, {"57cbea736e3d60e2e6c7482f1a785f08"}, 0xc5, 0xecb, 0x80}}}, 0xa0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r3, 0x3, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x10) close(r0) 01:31:25 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, 0x0, 0x0, 0x1e00) [ 302.744349] FAULT_INJECTION: forcing a failure. [ 302.744349] name failslab, interval 1, probability 0, space 0, times 0 [ 302.846816] CPU: 1 PID: 10305 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 302.854056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.863412] Call Trace: [ 302.866023] dump_stack+0x1db/0x2d0 [ 302.869671] ? dump_stack_print_info.cold+0x20/0x20 [ 302.874703] ? lockdep_init_map+0x10c/0x5b0 [ 302.879050] should_fail.cold+0xa/0x15 [ 302.882955] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 302.888087] ? ___might_sleep+0x1e7/0x310 [ 302.892244] ? arch_local_save_flags+0x50/0x50 [ 302.896835] ? lockdep_init_map+0x10c/0x5b0 [ 302.901182] __should_failslab+0x121/0x190 [ 302.905444] should_failslab+0x9/0x14 [ 302.909270] kmem_cache_alloc+0x2be/0x710 [ 302.910651] device lo entered promiscuous mode [ 302.913435] ? kasan_check_read+0x11/0x20 [ 302.913460] __d_alloc+0xae/0xbe0 [ 302.913483] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 302.919708] device lo left promiscuous mode [ 302.922216] ? _raw_spin_unlock+0x2d/0x50 [ 302.922233] ? inode_sb_list_add+0x223/0x310 [ 302.922251] ? current_time+0x104/0x1b0 [ 302.922269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.926619] FAULT_INJECTION: forcing a failure. [ 302.926619] name failslab, interval 1, probability 0, space 0, times 0 [ 302.930724] ? lockdep_init_map+0x10c/0x5b0 [ 302.930751] d_alloc_pseudo+0x1e/0x30 [ 302.930770] alloc_file_pseudo+0x14f/0x3b0 [ 302.930789] ? alloc_file+0x4d0/0x4d0 [ 302.930804] ? __check_object_size+0xa3/0x790 [ 302.930823] ? kasan_check_write+0x14/0x20 [ 302.930844] __shmem_file_setup.part.0+0x108/0x2b0 [ 302.994055] shmem_file_setup+0x66/0x90 [ 302.998037] __x64_sys_memfd_create+0x2a2/0x4b0 [ 303.002714] ? memfd_fcntl+0x1870/0x1870 [ 303.006790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.011563] do_syscall_64+0x1a3/0x800 [ 303.015459] ? syscall_return_slowpath+0x5f0/0x5f0 [ 303.020398] ? prepare_exit_to_usermode+0x232/0x3b0 [ 303.025429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.030293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.035486] RIP: 0033:0x458099 [ 303.038685] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.057616] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 303.065333] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 303.072607] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 303.079880] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 [ 303.087149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb86e3de6d4 [ 303.094426] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 [ 303.101724] CPU: 0 PID: 10319 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #39 [ 303.108926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.108933] Call Trace: [ 303.108954] dump_stack+0x1db/0x2d0 [ 303.108980] ? dump_stack_print_info.cold+0x20/0x20 [ 303.124532] ? inode_init_owner+0x340/0x340 [ 303.133849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.139400] should_fail.cold+0xa/0x15 [ 303.139421] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.139444] ? ___might_sleep+0x1e7/0x310 [ 303.152567] ? arch_local_save_flags+0x50/0x50 [ 303.157232] ? evm_inode_post_setattr+0x47/0x70 [ 303.161920] __should_failslab+0x121/0x190 [ 303.166177] should_failslab+0x9/0x14 [ 303.170001] kmem_cache_alloc+0x2be/0x710 [ 303.174158] ? find_held_lock+0x35/0x120 [ 303.178252] ? do_sys_ftruncate+0x41e/0x550 [ 303.182591] getname_flags+0xd6/0x5b0 [ 303.186408] getname+0x1a/0x20 [ 303.189615] do_sys_open+0x3a5/0x7c0 [ 303.193434] ? filp_open+0x80/0x80 [ 303.197000] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.202378] ? trace_hardirqs_off_caller+0x300/0x300 [ 303.207517] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.212294] __x64_sys_open+0x7e/0xc0 [ 303.216109] do_syscall_64+0x1a3/0x800 [ 303.220026] ? syscall_return_slowpath+0x5f0/0x5f0 [ 303.224945] ? prepare_exit_to_usermode+0x232/0x3b0 [ 303.229970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.234830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.240353] RIP: 0033:0x412041 [ 303.243536] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 303.262421] RSP: 002b:00007fada5fefa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 303.270134] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 303.277387] RDX: 00007fada5fefafa RSI: 0000000000000002 RDI: 00007fada5fefaf0 [ 303.284641] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 303.291897] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 303.299150] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 303.311103] device lo entered promiscuous mode [ 303.316126] device lo left promiscuous mode 01:31:25 executing program 0 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:25 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200), 0x0, 0x1e00) 01:31:25 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x420000, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000140)="ec7946568758216c3fd50e6f2540d795df1709f092525024d7287e0190ffd33cb519f6ca29dd561d1f3e80b404c78f86c7e1a8c3ce98e4877e531c", 0x3b}, {&(0x7f0000000180)="cb0d5f7727113d5382ce89c2d61a2eae3845ed9c524e064afca73dd3827b73fbaecc0267a4920ae9", 0x28}, {&(0x7f00000001c0)="59f6539ed1e9c70d5ec3c00f8ae3efce25b187b9d203f590bdc3939aa792ba573844801174c889ac1e8bf8d0a6e333e1fcf42663dc564734f128822a609e3047f0260c836b22773390905f70c6f08e8633057af4fdba1179", 0x58}, {&(0x7f0000000240)="df1aa3b9591f0af2b25878c75faa07d581237cbe1388d405032dc7ab9385d5f511cc376af8d9d93a2e97987ee81a0e53f7095096ead099e1f4", 0x39}], 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) close(r1) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f00000000c0)=0x2, 0x4) 01:31:25 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fe, 0x1e00) 01:31:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000140)) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f00000000c0)='lo^\x00', 0x4) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x8000) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) pipe2(&(0x7f0000000100), 0x80000) 01:31:25 executing program 5 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:25 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200), 0x0, 0x1e00) [ 303.425832] FAULT_INJECTION: forcing a failure. [ 303.425832] name failslab, interval 1, probability 0, space 0, times 0 [ 303.458441] device lo entered promiscuous mode [ 303.471706] FAULT_INJECTION: forcing a failure. [ 303.471706] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 303.480595] CPU: 1 PID: 10338 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 303.490697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.500045] Call Trace: [ 303.502640] dump_stack+0x1db/0x2d0 [ 303.506274] ? dump_stack_print_info.cold+0x20/0x20 [ 303.511289] ? find_held_lock+0x35/0x120 [ 303.515354] ? smack_d_instantiate+0x334/0xe10 [ 303.519946] should_fail.cold+0xa/0x15 [ 303.523844] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.528974] ? ___might_sleep+0x1e7/0x310 [ 303.533124] ? arch_local_save_flags+0x50/0x50 [ 303.537723] __should_failslab+0x121/0x190 [ 303.541972] should_failslab+0x9/0x14 [ 303.545778] kmem_cache_alloc+0x2be/0x710 [ 303.549937] ? d_instantiate+0x7b/0xa0 [ 303.553836] ? find_held_lock+0x35/0x120 [ 303.557910] __alloc_file+0x93/0x480 [ 303.561629] ? file_free_rcu+0xe0/0xe0 [ 303.565526] ? kasan_check_read+0x11/0x20 [ 303.569688] ? do_raw_spin_unlock+0xa0/0x330 [ 303.574102] ? do_raw_spin_trylock+0x270/0x270 [ 303.578697] alloc_empty_file+0x72/0x170 [ 303.582770] alloc_file+0x5e/0x4d0 [ 303.586320] alloc_file_pseudo+0x24a/0x3b0 [ 303.590565] ? alloc_file+0x4d0/0x4d0 [ 303.594373] ? __check_object_size+0xa3/0x790 [ 303.598875] ? kasan_check_write+0x14/0x20 [ 303.603123] __shmem_file_setup.part.0+0x108/0x2b0 [ 303.608060] shmem_file_setup+0x66/0x90 [ 303.612516] __x64_sys_memfd_create+0x2a2/0x4b0 [ 303.617199] ? memfd_fcntl+0x1870/0x1870 [ 303.621269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.626039] do_syscall_64+0x1a3/0x800 [ 303.629931] ? syscall_return_slowpath+0x5f0/0x5f0 [ 303.634873] ? prepare_exit_to_usermode+0x232/0x3b0 [ 303.640163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.645026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.650221] RIP: 0033:0x458099 [ 303.653420] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.672330] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 303.680043] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000458099 [ 303.687319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bd0a7 [ 303.694589] RBP: 000000000073bf00 R08: 0000000000100424 R09: 00000000fbad8001 [ 303.701861] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb86e3de6d4 [ 303.709132] R13: 00000000004c67f9 R14: 00000000004dbb00 R15: 0000000000000003 [ 303.716431] CPU: 0 PID: 10337 Comm: syz-executor0 Not tainted 5.0.0-rc3+ #39 [ 303.723637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.732988] Call Trace: [ 303.733013] dump_stack+0x1db/0x2d0 [ 303.733034] ? dump_stack_print_info.cold+0x20/0x20 [ 303.733051] ? add_lock_to_list.isra.0+0x450/0x450 [ 303.733066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.733084] ? smack_log+0x436/0x5b0 [ 303.744300] should_fail.cold+0xa/0x15 [ 303.744322] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.744336] ? find_held_lock+0x35/0x120 [ 303.744358] ? shmem_setattr+0x54b/0xd90 [ 303.744374] ? find_held_lock+0x35/0x120 [ 303.768386] Unknown ioctl 1074013193 [ 303.771548] ? shmem_setattr+0x54b/0xd90 [ 303.771567] ? lock_acquire+0x1db/0x570 [ 303.771589] should_fail_alloc_page+0x50/0x60 [ 303.771606] __alloc_pages_nodemask+0x323/0xdc0 [ 303.794792] Unknown ioctl 1074013193 [ 303.795963] ? inode_init_owner+0x340/0x340 [ 303.795986] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 303.796003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.796033] ? ___might_sleep+0x1e7/0x310 [ 303.823373] ? trace_hardirqs_off+0xb8/0x310 [ 303.827796] cache_grow_begin+0x9c/0x8c0 [ 303.831872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.837420] ? check_preemption_disabled+0x48/0x290 [ 303.842447] kmem_cache_alloc+0x645/0x710 [ 303.842469] ? find_held_lock+0x35/0x120 [ 303.842486] ? do_sys_ftruncate+0x41e/0x550 [ 303.842504] getname_flags+0xd6/0x5b0 [ 303.842522] getname+0x1a/0x20 [ 303.842537] do_sys_open+0x3a5/0x7c0 [ 303.842557] ? filp_open+0x80/0x80 [ 303.842579] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.842594] ? trace_hardirqs_off_caller+0x300/0x300 [ 303.842612] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.842631] __x64_sys_open+0x7e/0xc0 [ 303.842648] do_syscall_64+0x1a3/0x800 [ 303.842670] ? syscall_return_slowpath+0x5f0/0x5f0 [ 303.897179] ? prepare_exit_to_usermode+0x232/0x3b0 [ 303.902238] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 303.907105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.912304] RIP: 0033:0x412041 01:31:26 executing program 2: fstat(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc3, &(0x7f00000003c0)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r3, 0x28, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb4a3}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4804}, 0x20004004) 01:31:26 executing program 2: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0x0) [ 303.915502] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 303.919573] device lo left promiscuous mode [ 303.934406] RSP: 002b:00007fada5fefa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 303.934422] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 303.934432] RDX: 00007fada5fefafa RSI: 0000000000000002 RDI: 00007fada5fefaf0 [ 303.934440] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 303.934449] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 01:31:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200), 0x0, 0x1e00) 01:31:26 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") 01:31:26 executing program 5 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 303.934458] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 304.025400] device lo entered promiscuous mode [ 304.038230] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 304.050221] FAULT_INJECTION: forcing a failure. [ 304.050221] name failslab, interval 1, probability 0, space 0, times 0 [ 304.063895] device lo left promiscuous mode [ 304.116824] CPU: 0 PID: 10363 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 304.124035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.133387] Call Trace: [ 304.135968] dump_stack+0x1db/0x2d0 [ 304.139589] ? dump_stack_print_info.cold+0x20/0x20 [ 304.144601] ? inode_init_owner+0x340/0x340 [ 304.148924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.154489] should_fail.cold+0xa/0x15 [ 304.158377] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.163479] ? ___might_sleep+0x1e7/0x310 [ 304.167615] ? arch_local_save_flags+0x50/0x50 [ 304.172186] ? evm_inode_post_setattr+0x47/0x70 [ 304.176861] __should_failslab+0x121/0x190 [ 304.181084] should_failslab+0x9/0x14 [ 304.184874] kmem_cache_alloc+0x2be/0x710 [ 304.189010] ? find_held_lock+0x35/0x120 [ 304.193075] ? do_sys_ftruncate+0x41e/0x550 [ 304.197400] getname_flags+0xd6/0x5b0 [ 304.201199] getname+0x1a/0x20 [ 304.204404] do_sys_open+0x3a5/0x7c0 [ 304.208137] ? filp_open+0x80/0x80 [ 304.211679] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.217034] ? trace_hardirqs_off_caller+0x300/0x300 [ 304.222128] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.226870] __x64_sys_open+0x7e/0xc0 [ 304.230660] do_syscall_64+0x1a3/0x800 [ 304.234584] ? syscall_return_slowpath+0x5f0/0x5f0 [ 304.239537] ? prepare_exit_to_usermode+0x232/0x3b0 [ 304.244563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.249430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.254612] RIP: 0033:0x412041 [ 304.257804] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 304.276687] RSP: 002b:00007fb86e3dda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 304.284379] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 304.291633] RDX: 00007fb86e3ddafa RSI: 0000000000000002 RDI: 00007fb86e3ddaf0 [ 304.298886] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 304.306140] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 304.313397] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 01:31:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:26 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1ff, 0x1e00) 01:31:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x100, 0x1e00) 01:31:26 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) 01:31:26 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:26 executing program 5 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 304.499498] device lo entered promiscuous mode [ 304.510186] FAULT_INJECTION: forcing a failure. [ 304.510186] name failslab, interval 1, probability 0, space 0, times 0 [ 304.514657] device lo left promiscuous mode [ 304.555084] CPU: 0 PID: 10377 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 304.562306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.571780] Call Trace: [ 304.574384] dump_stack+0x1db/0x2d0 [ 304.578032] ? dump_stack_print_info.cold+0x20/0x20 [ 304.583063] ? inode_init_owner+0x340/0x340 [ 304.587399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.592951] should_fail.cold+0xa/0x15 [ 304.592972] ? fault_create_debugfs_attr+0x1e0/0x1e0 01:31:26 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad7", 0x1ff, 0x1e00) [ 304.593000] ? ___might_sleep+0x1e7/0x310 [ 304.593020] ? arch_local_save_flags+0x50/0x50 [ 304.602002] ? evm_inode_post_setattr+0x47/0x70 [ 304.602023] __should_failslab+0x121/0x190 [ 304.602041] should_failslab+0x9/0x14 [ 304.602066] kmem_cache_alloc+0x2be/0x710 [ 304.615604] ? find_held_lock+0x35/0x120 [ 304.627765] ? do_sys_ftruncate+0x41e/0x550 [ 304.627795] getname_flags+0xd6/0x5b0 [ 304.627818] getname+0x1a/0x20 [ 304.636107] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 304.636214] do_sys_open+0x3a5/0x7c0 01:31:27 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1ff, 0x1e00) [ 304.652795] ? filp_open+0x80/0x80 [ 304.656361] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.661750] ? trace_hardirqs_off_caller+0x300/0x300 [ 304.666870] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.671642] __x64_sys_open+0x7e/0xc0 [ 304.675472] do_syscall_64+0x1a3/0x800 [ 304.679388] ? syscall_return_slowpath+0x5f0/0x5f0 [ 304.684346] ? prepare_exit_to_usermode+0x232/0x3b0 [ 304.689382] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.694248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.699440] RIP: 0033:0x412041 [ 304.702623] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 304.721535] RSP: 002b:00007fb86e3dda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 304.729249] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 304.736517] RDX: 00007fb86e3ddafa RSI: 0000000000000002 RDI: 00007fb86e3ddaf0 [ 304.743796] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 01:31:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x7fffffff, 0x477f}) 01:31:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x100, 0x1e00) 01:31:27 executing program 5 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 304.751061] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 304.758321] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 304.782057] device lo entered promiscuous mode [ 304.794620] device lo left promiscuous mode 01:31:27 executing program 1: socketpair(0xe, 0xf, 0x5d, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000200)) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x81, 0x0) ioctl$KVM_SET_TSC_KHZ(r3, 0xaea2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x2}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x800454e1, 0x712000) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) close(r1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) 01:31:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 304.926037] FAULT_INJECTION: forcing a failure. [ 304.926037] name failslab, interval 1, probability 0, space 0, times 0 01:31:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000080)={0x1, r0}) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x100, 0x1e00) [ 304.996091] device lo entered promiscuous mode [ 305.035140] CPU: 1 PID: 10400 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 305.042727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.052092] Call Trace: [ 305.054700] dump_stack+0x1db/0x2d0 [ 305.058351] ? dump_stack_print_info.cold+0x20/0x20 [ 305.063400] should_fail.cold+0xa/0x15 [ 305.067310] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.072436] ? ___might_sleep+0x1e7/0x310 [ 305.076599] ? arch_local_save_flags+0x50/0x50 [ 305.081203] ? print_usage_bug+0xd0/0xd0 [ 305.085285] __should_failslab+0x121/0x190 [ 305.089533] should_failslab+0x9/0x14 [ 305.093351] kmem_cache_alloc+0x2be/0x710 [ 305.097688] ? __lock_acquire+0x572/0x4a30 [ 305.101929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.107484] __alloc_file+0x93/0x480 [ 305.111219] ? file_free_rcu+0xe0/0xe0 [ 305.115117] ? mark_held_locks+0x100/0x100 [ 305.119376] alloc_empty_file+0x72/0x170 [ 305.123456] path_openat+0x112/0x5650 [ 305.127271] ? add_lock_to_list.isra.0+0x450/0x450 01:31:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65", 0x180, 0x1e00) 01:31:27 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0xcd) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:27 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 305.132237] ? __alloc_fd+0x549/0x700 [ 305.136054] ? find_held_lock+0x35/0x120 [ 305.140400] ? path_lookupat.isra.0+0xba0/0xba0 [ 305.145079] ? do_dup2+0x580/0x580 [ 305.146095] device lo left promiscuous mode [ 305.148635] ? kasan_check_read+0x11/0x20 [ 305.148653] ? do_raw_spin_unlock+0xa0/0x330 [ 305.148671] ? do_raw_spin_trylock+0x270/0x270 [ 305.148775] ? __phys_addr_symbol+0x30/0x70 [ 305.148800] do_filp_open+0x26f/0x370 [ 305.174288] ? may_open_dev+0x100/0x100 [ 305.178265] ? exit_files+0xb0/0xb0 [ 305.181894] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.187430] ? digsig_verify.cold+0x32/0x32 [ 305.191758] ? get_unused_fd_flags+0x122/0x1a0 [ 305.196349] ? __alloc_fd+0x700/0x700 [ 305.196365] ? getname_flags+0x277/0x5b0 [ 305.196389] do_sys_open+0x59a/0x7c0 [ 305.196409] ? filp_open+0x80/0x80 [ 305.196430] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.204280] ? trace_hardirqs_off_caller+0x300/0x300 [ 305.204301] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 305.204320] __x64_sys_open+0x7e/0xc0 [ 305.204338] do_syscall_64+0x1a3/0x800 [ 305.230545] ? syscall_return_slowpath+0x5f0/0x5f0 [ 305.230564] ? prepare_exit_to_usermode+0x232/0x3b0 [ 305.230586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.230609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.254419] RIP: 0033:0x412041 [ 305.257625] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 305.276533] RSP: 002b:00007fb86e3dda80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 305.276549] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412041 [ 305.276559] RDX: 00007fb86e3ddafa RSI: 0000000000000002 RDI: 00007fb86e3ddaf0 [ 305.276568] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 305.276578] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 305.276587] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 01:31:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x180, 0x1e00) 01:31:27 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x8001, 0xfffffffffffffd66, 0x401, 0x8000, 0x0, 0x7fffffff, 0x1, 0xfff, 0x7e9d8000000000, 0x8a44}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x200000000) ioctl(r1, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 305.333916] device lo entered promiscuous mode [ 305.365254] device lo left promiscuous mode [ 305.377869] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:27 executing program 5 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:27 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x40400, 0x80) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x8000, 0x0) write$binfmt_misc(r4, &(0x7f00000003c0)={'syz1', "a3d3c63e361bd0a1f6ad16ecd48c9f05ea57e9644a1cdb2f8364f641609d3cb34dabd9b2fdd7258cd54738695b6d32b451440107204e85e54c8064104b0c88edb2316dfa66efa13a831cefef937fbc25c3d74fe5"}, 0x58) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000340)=0x800) fchownat(r0, &(0x7f0000000040)='./file0\x00', r2, r3, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x180, 0x1e00) 01:31:27 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") [ 305.584483] FAULT_INJECTION: forcing a failure. [ 305.584483] name failslab, interval 1, probability 0, space 0, times 0 [ 305.605689] CPU: 0 PID: 10439 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 305.612893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.622258] Call Trace: [ 305.624863] dump_stack+0x1db/0x2d0 [ 305.628517] ? dump_stack_print_info.cold+0x20/0x20 01:31:27 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") [ 305.633609] ? pick_next_entity+0x198/0x3f0 [ 305.637956] should_fail.cold+0xa/0x15 [ 305.641862] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.646981] ? ___might_sleep+0x1e7/0x310 [ 305.649379] device lo entered promiscuous mode [ 305.651168] ? arch_local_save_flags+0x50/0x50 [ 305.651186] ? __lock_acquire+0x572/0x4a30 [ 305.651221] __should_failslab+0x121/0x190 [ 305.657980] device lo left promiscuous mode [ 305.660379] should_failslab+0x9/0x14 [ 305.660396] kmem_cache_alloc+0x2be/0x710 [ 305.660411] ? mark_held_locks+0x100/0x100 [ 305.660425] ? __schedule+0x148d/0x1e60 [ 305.660442] ? trace_hardirqs_off_caller+0x300/0x300 [ 305.660460] ? do_raw_spin_trylock+0x270/0x270 [ 305.698994] __kernfs_new_node+0xfe/0x8a0 [ 305.703158] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 305.707933] ? __schedule+0x148d/0x1e60 [ 305.711910] ? add_lock_to_list.isra.0+0x450/0x450 [ 305.716844] ? add_lock_to_list.isra.0+0x450/0x450 [ 305.721766] ? pci_mmcfg_check_reserved+0x170/0x170 [ 305.726799] ? set_user_nice+0x378/0x750 [ 305.730894] ? bd_set_size+0x89/0xb0 [ 305.734599] ? find_held_lock+0x35/0x120 [ 305.738667] kernfs_new_node+0x99/0x130 [ 305.742646] kernfs_create_dir_ns+0x52/0x160 [ 305.747067] internal_create_group+0x8cd/0xd80 [ 305.751644] ? remove_files.isra.0+0x190/0x190 [ 305.756221] ? down_write_nested+0x130/0x130 [ 305.760616] ? resched_curr+0x1a0/0x1a0 [ 305.764576] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 305.770120] sysfs_create_group+0x20/0x30 [ 305.774293] lo_ioctl+0x1147/0x23e0 [ 305.777916] ? lo_rw_aio+0x1e50/0x1e50 [ 305.781797] ? __fget+0x472/0x710 [ 305.785240] ? lo_rw_aio+0x1e50/0x1e50 [ 305.789165] blkdev_ioctl+0x10e0/0x2120 [ 305.793142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.798670] ? blkpg_ioctl+0xc10/0xc10 [ 305.802543] ? lock_downgrade+0x910/0x910 [ 305.806679] ? kasan_check_read+0x11/0x20 [ 305.810812] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 305.816090] ? rcu_read_unlock_special+0x380/0x380 [ 305.821015] ? __fget+0x499/0x710 [ 305.824459] block_ioctl+0xee/0x130 [ 305.828079] ? blkdev_fallocate+0x410/0x410 [ 305.832404] do_vfs_ioctl+0x107b/0x17d0 [ 305.836365] ? memset+0x32/0x40 [ 305.839631] ? ioctl_preallocate+0x2f0/0x2f0 [ 305.844037] ? smack_inode_setattr+0x290/0x290 [ 305.848610] ? __fget_light+0x2db/0x420 [ 305.852590] ? do_sys_open+0x3f9/0x7c0 [ 305.856487] ? do_syscall_64+0x8c/0x800 [ 305.860453] ? do_syscall_64+0x8c/0x800 [ 305.864440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.869972] ? security_file_ioctl+0x93/0xc0 [ 305.874370] ksys_ioctl+0xab/0xd0 [ 305.877811] __x64_sys_ioctl+0x73/0xb0 [ 305.881688] do_syscall_64+0x1a3/0x800 [ 305.885565] ? syscall_return_slowpath+0x5f0/0x5f0 [ 305.890485] ? prepare_exit_to_usermode+0x232/0x3b0 [ 305.895525] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.900393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.905589] RIP: 0033:0x457f07 [ 305.908780] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.927668] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:31:28 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x15) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x1000000, 0x10, r2, 0x0) [ 305.935369] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 305.942625] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 305.949899] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 305.957155] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 305.964411] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 305.984440] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 305.992480] device lo entered promiscuous mode [ 306.001689] device lo left promiscuous mode 01:31:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000001c0)={r1, 0x1, 0xfffffffffffffff4}, 0x4e5) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x680000, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000180)=0x4) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x8040, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000000c0)={0x0, @broadcast, @empty}, &(0x7f0000000100)=0xc) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@known='trusted.overlay.redirect\x00', &(0x7f0000000300)='lo\x00\x00\x00\x00\x02\x00', 0x8, 0x1) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000200)=0x4) close(r3) 01:31:28 executing program 5 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:28 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") [ 306.202793] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:28 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf68", 0x1c0, 0x1e00) 01:31:28 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x60000, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000080)={0x89, @empty, 0x4e22, 0x0, 'ovf\x00', 0x9, 0x81, 0x3b}, 0x2c) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 306.248657] FAULT_INJECTION: forcing a failure. [ 306.248657] name failslab, interval 1, probability 0, space 0, times 0 [ 306.280070] CPU: 0 PID: 10469 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 306.282855] device lo entered promiscuous mode 01:31:28 executing program 4: ioctl(0xffffffffffffffff, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") [ 306.287290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.287298] Call Trace: [ 306.287324] dump_stack+0x1db/0x2d0 [ 306.287347] ? dump_stack_print_info.cold+0x20/0x20 [ 306.287369] ? pick_next_entity+0x198/0x3f0 [ 306.316755] should_fail.cold+0xa/0x15 [ 306.320632] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 306.325728] ? ___might_sleep+0x1e7/0x310 [ 306.329892] ? arch_local_save_flags+0x50/0x50 [ 306.334494] ? __lock_acquire+0x572/0x4a30 [ 306.338734] __should_failslab+0x121/0x190 [ 306.342978] should_failslab+0x9/0x14 [ 306.346767] kmem_cache_alloc+0x2be/0x710 [ 306.350899] ? mark_held_locks+0x100/0x100 [ 306.355122] ? __schedule+0x148d/0x1e60 [ 306.359085] ? trace_hardirqs_off_caller+0x300/0x300 [ 306.364184] ? do_raw_spin_trylock+0x270/0x270 [ 306.368774] __kernfs_new_node+0xfe/0x8a0 [ 306.372909] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 306.377650] ? __schedule+0x148d/0x1e60 [ 306.381610] ? add_lock_to_list.isra.0+0x450/0x450 [ 306.386524] ? add_lock_to_list.isra.0+0x450/0x450 [ 306.391454] ? pci_mmcfg_check_reserved+0x170/0x170 [ 306.396482] ? set_user_nice+0x378/0x750 [ 306.400545] ? bd_set_size+0x89/0xb0 [ 306.404257] ? find_held_lock+0x35/0x120 [ 306.408323] kernfs_new_node+0x99/0x130 [ 306.412303] kernfs_create_dir_ns+0x52/0x160 [ 306.416700] internal_create_group+0x8cd/0xd80 [ 306.421275] ? remove_files.isra.0+0x190/0x190 [ 306.425845] ? down_write_nested+0x130/0x130 [ 306.430243] ? resched_curr+0x1a0/0x1a0 [ 306.434214] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 306.439759] sysfs_create_group+0x20/0x30 [ 306.443898] lo_ioctl+0x1147/0x23e0 [ 306.447516] ? lo_rw_aio+0x1e50/0x1e50 [ 306.451395] ? __fget+0x472/0x710 [ 306.454840] ? lo_rw_aio+0x1e50/0x1e50 [ 306.458758] blkdev_ioctl+0x10e0/0x2120 [ 306.462718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.468254] ? blkpg_ioctl+0xc10/0xc10 [ 306.472151] ? lock_downgrade+0x910/0x910 [ 306.476289] ? kasan_check_read+0x11/0x20 [ 306.480436] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 306.485726] ? rcu_read_unlock_special+0x380/0x380 [ 306.490669] ? __fget+0x499/0x710 [ 306.494124] block_ioctl+0xee/0x130 [ 306.497741] ? blkdev_fallocate+0x410/0x410 [ 306.502053] do_vfs_ioctl+0x107b/0x17d0 [ 306.506033] ? memset+0x32/0x40 [ 306.509325] ? ioctl_preallocate+0x2f0/0x2f0 [ 306.513745] ? smack_inode_setattr+0x290/0x290 [ 306.518329] ? __fget_light+0x2db/0x420 [ 306.522300] ? do_sys_open+0x3f9/0x7c0 [ 306.526204] ? do_syscall_64+0x8c/0x800 [ 306.530173] ? do_syscall_64+0x8c/0x800 [ 306.534148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.539700] ? security_file_ioctl+0x93/0xc0 [ 306.544110] ksys_ioctl+0xab/0xd0 [ 306.547556] __x64_sys_ioctl+0x73/0xb0 [ 306.551437] do_syscall_64+0x1a3/0x800 [ 306.555329] ? syscall_return_slowpath+0x5f0/0x5f0 [ 306.560260] ? prepare_exit_to_usermode+0x232/0x3b0 [ 306.565275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.570117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.575513] RIP: 0033:0x457f07 [ 306.578707] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.597634] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.605380] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 306.612650] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 306.619941] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 306.627221] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 306.634506] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 306.644127] device lo left promiscuous mode 01:31:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', r1}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) close(r0) [ 306.655822] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 306.775918] device lo entered promiscuous mode 01:31:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:29 executing program 5 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 306.827058] device lo left promiscuous mode 01:31:29 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8001, 0x400200) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x3) 01:31:29 executing program 4: ioctl(0xffffffffffffffff, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") 01:31:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1c0, 0x1e00) [ 306.874582] device lo entered promiscuous mode [ 306.887473] device lo left promiscuous mode [ 306.972488] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 307.005217] FAULT_INJECTION: forcing a failure. [ 307.005217] name failslab, interval 1, probability 0, space 0, times 0 01:31:29 executing program 4: ioctl(0xffffffffffffffff, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") [ 307.017044] CPU: 0 PID: 10503 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 307.024245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.033608] Call Trace: [ 307.036247] dump_stack+0x1db/0x2d0 [ 307.039887] ? dump_stack_print_info.cold+0x20/0x20 [ 307.044926] should_fail.cold+0xa/0x15 [ 307.048834] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 307.053955] ? find_held_lock+0x35/0x120 [ 307.058086] ? is_bpf_text_address+0xac/0x170 [ 307.062596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.068154] __should_failslab+0x121/0x190 01:31:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1c0, 0x1e00) 01:31:29 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) [ 307.072428] should_failslab+0x9/0x14 [ 307.076252] kmem_cache_alloc+0x47/0x710 [ 307.080326] ? print_usage_bug+0xd0/0xd0 [ 307.084415] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 307.090058] idr_get_free+0x72c/0xee0 [ 307.093864] ? __save_stack_trace+0x8a/0xf0 [ 307.098226] ? radix_tree_iter_tag_clear+0x90/0x90 [ 307.103165] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 307.108265] ? kasan_slab_alloc+0xf/0x20 [ 307.112317] ? kmem_cache_alloc+0x12d/0x710 [ 307.116632] ? kernfs_new_node+0x99/0x130 [ 307.120768] ? kernfs_create_dir_ns+0x52/0x160 [ 307.125344] ? internal_create_group+0x8cd/0xd80 [ 307.130101] ? sysfs_create_group+0x20/0x30 [ 307.134422] ? lo_ioctl+0x1147/0x23e0 [ 307.138224] ? blkdev_ioctl+0x10e0/0x2120 [ 307.142355] ? block_ioctl+0xee/0x130 [ 307.146143] ? do_vfs_ioctl+0x107b/0x17d0 [ 307.150274] ? ksys_ioctl+0xab/0xd0 [ 307.153887] ? __x64_sys_ioctl+0x73/0xb0 [ 307.157942] ? do_syscall_64+0x1a3/0x800 [ 307.162008] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.167362] ? print_usage_bug+0xd0/0xd0 [ 307.171472] idr_alloc_u32+0x1d8/0x3a0 [ 307.175366] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 307.180208] ? lock_acquire+0x1db/0x570 [ 307.184168] ? __kernfs_new_node+0x125/0x8a0 [ 307.188573] idr_alloc_cyclic+0x153/0x330 [ 307.192717] ? idr_alloc+0x1b0/0x1b0 [ 307.196428] ? mark_held_locks+0x100/0x100 [ 307.200666] __kernfs_new_node+0x1c1/0x8a0 [ 307.204899] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 307.209653] ? __schedule+0x148d/0x1e60 [ 307.213624] ? add_lock_to_list.isra.0+0x450/0x450 [ 307.218553] ? add_lock_to_list.isra.0+0x450/0x450 [ 307.223508] ? pci_mmcfg_check_reserved+0x170/0x170 [ 307.228516] ? set_user_nice+0x378/0x750 [ 307.232565] ? find_held_lock+0x35/0x120 [ 307.236621] kernfs_new_node+0x99/0x130 [ 307.240586] kernfs_create_dir_ns+0x52/0x160 [ 307.244988] internal_create_group+0x8cd/0xd80 [ 307.249561] ? remove_files.isra.0+0x190/0x190 [ 307.254130] ? down_write_nested+0x130/0x130 [ 307.258540] ? resched_curr+0x1a0/0x1a0 [ 307.262508] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.268046] sysfs_create_group+0x20/0x30 [ 307.272198] lo_ioctl+0x1147/0x23e0 [ 307.275830] ? lo_rw_aio+0x1e50/0x1e50 [ 307.279719] ? __fget+0x472/0x710 [ 307.283159] ? lo_rw_aio+0x1e50/0x1e50 [ 307.287047] blkdev_ioctl+0x10e0/0x2120 [ 307.291021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.296564] ? blkpg_ioctl+0xc10/0xc10 [ 307.300442] ? lock_downgrade+0x910/0x910 [ 307.304588] ? kasan_check_read+0x11/0x20 [ 307.308725] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 307.313999] ? rcu_read_unlock_special+0x380/0x380 [ 307.318948] ? __fget+0x499/0x710 [ 307.322396] block_ioctl+0xee/0x130 [ 307.326011] ? blkdev_fallocate+0x410/0x410 [ 307.330320] do_vfs_ioctl+0x107b/0x17d0 [ 307.334291] ? memset+0x32/0x40 [ 307.337572] ? ioctl_preallocate+0x2f0/0x2f0 [ 307.342329] ? smack_inode_setattr+0x290/0x290 [ 307.346897] ? __fget_light+0x2db/0x420 [ 307.350859] ? do_sys_open+0x3f9/0x7c0 [ 307.354735] ? do_syscall_64+0x8c/0x800 [ 307.358695] ? do_syscall_64+0x8c/0x800 [ 307.362673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.368205] ? security_file_ioctl+0x93/0xc0 [ 307.372602] ksys_ioctl+0xab/0xd0 [ 307.376042] __x64_sys_ioctl+0x73/0xb0 [ 307.379919] do_syscall_64+0x1a3/0x800 [ 307.383796] ? syscall_return_slowpath+0x5f0/0x5f0 [ 307.388716] ? prepare_exit_to_usermode+0x232/0x3b0 [ 307.393726] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.398582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.403766] RIP: 0033:0x457f07 01:31:29 executing program 1: r0 = socket$packet(0x11, 0x4000000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) fchdir(r0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000000c0)=0x1, 0x4) [ 307.406955] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.425849] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 307.433543] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 307.440807] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 307.448071] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 307.455331] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 307.462604] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 01:31:29 executing program 4: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") [ 307.477023] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 307.621369] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 307.656620] device lo entered promiscuous mode 01:31:30 executing program 5 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 307.699504] device lo left promiscuous mode 01:31:30 executing program 4: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") 01:31:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x5, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1e0, 0x1e00) 01:31:30 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)=0x6000) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 307.759832] device lo entered promiscuous mode 01:31:30 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r1, 0x3, 0x6, @dev}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$SIOCX25GDTEFACILITIES(r2, 0x89ea, &(0x7f00000001c0)) r3 = accept4(r0, &(0x7f00000000c0)=@nfc, &(0x7f0000000040)=0x80, 0x800) connect$ax25(r3, &(0x7f0000000140)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null]}, 0x48) close(r0) [ 307.785819] device lo left promiscuous mode [ 307.884142] FAULT_INJECTION: forcing a failure. [ 307.884142] name failslab, interval 1, probability 0, space 0, times 0 01:31:30 executing program 4: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") 01:31:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c090", 0x1e0, 0x1e00) [ 307.930320] CPU: 1 PID: 10537 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 307.937553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.946923] Call Trace: [ 307.949527] dump_stack+0x1db/0x2d0 [ 307.953179] ? dump_stack_print_info.cold+0x20/0x20 [ 307.958268] ? ___might_sleep+0x1e7/0x310 [ 307.962435] should_fail.cold+0xa/0x15 [ 307.966328] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 307.971425] ? ___might_sleep+0x1e7/0x310 [ 307.975564] ? arch_local_save_flags+0x50/0x50 [ 307.980137] __should_failslab+0x121/0x190 [ 307.984361] should_failslab+0x9/0x14 [ 307.988158] kmem_cache_alloc+0x2be/0x710 [ 307.992312] ? find_held_lock+0x35/0x120 [ 307.996364] __kernfs_new_node+0xfe/0x8a0 [ 308.000553] ? ktime_get_real_ts64+0x192/0x4e0 [ 308.005147] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 308.009890] ? wait_for_completion+0x810/0x810 [ 308.014461] ? __lock_is_held+0xb6/0x140 [ 308.018519] ? mutex_unlock+0xd/0x10 [ 308.022223] ? kernfs_activate+0x21c/0x2c0 [ 308.026449] kernfs_new_node+0x99/0x130 [ 308.030415] __kernfs_create_file+0x51/0x340 [ 308.034813] sysfs_add_file_mode_ns+0x222/0x560 [ 308.039478] internal_create_group+0x3d2/0xd80 [ 308.044052] ? remove_files.isra.0+0x190/0x190 [ 308.048626] ? down_write_nested+0x130/0x130 [ 308.053021] ? resched_curr+0x1a0/0x1a0 [ 308.056983] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.062511] sysfs_create_group+0x20/0x30 [ 308.066651] lo_ioctl+0x1147/0x23e0 [ 308.070287] ? lo_rw_aio+0x1e50/0x1e50 [ 308.074197] ? __fget+0x472/0x710 [ 308.077656] ? lo_rw_aio+0x1e50/0x1e50 [ 308.081538] blkdev_ioctl+0x10e0/0x2120 [ 308.085512] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.091036] ? blkpg_ioctl+0xc10/0xc10 [ 308.094911] ? lock_downgrade+0x910/0x910 [ 308.099044] ? kasan_check_read+0x11/0x20 [ 308.103179] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 308.108451] ? rcu_read_unlock_special+0x380/0x380 [ 308.113374] ? __fget+0x499/0x710 [ 308.116816] block_ioctl+0xee/0x130 [ 308.120446] ? blkdev_fallocate+0x410/0x410 [ 308.124755] do_vfs_ioctl+0x107b/0x17d0 [ 308.128716] ? memset+0x32/0x40 [ 308.131986] ? ioctl_preallocate+0x2f0/0x2f0 [ 308.136388] ? smack_inode_setattr+0x290/0x290 [ 308.140958] ? __fget_light+0x2db/0x420 [ 308.144932] ? do_sys_open+0x3f9/0x7c0 [ 308.148809] ? do_syscall_64+0x8c/0x800 [ 308.152782] ? do_syscall_64+0x8c/0x800 [ 308.156758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.162285] ? security_file_ioctl+0x93/0xc0 [ 308.166682] ksys_ioctl+0xab/0xd0 [ 308.170123] __x64_sys_ioctl+0x73/0xb0 [ 308.174000] do_syscall_64+0x1a3/0x800 [ 308.177874] ? syscall_return_slowpath+0x5f0/0x5f0 [ 308.182791] ? prepare_exit_to_usermode+0x232/0x3b0 [ 308.187798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.192633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.197814] RIP: 0033:0x457f07 [ 308.201003] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.219894] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:31:30 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x4000) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 308.227586] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 308.234839] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 308.242094] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 308.249349] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 308.256609] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 308.282754] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 308.330629] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 308.341806] device lo entered promiscuous mode [ 308.363811] device lo left promiscuous mode 01:31:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1e0, 0x1e00) 01:31:30 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x82000, 0x0) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000080)={0x4, 0x5, 0x7, 0x1000, 0x13, 0x5, 0xfffffffffffff840, 0x49a, 0x800000000000, 0x1}) 01:31:30 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") [ 308.380674] device lo entered promiscuous mode [ 308.397328] device lo left promiscuous mode 01:31:30 executing program 5 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 308.464012] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001300)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup2(r2, r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @dev}, 0x10) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x1f, 0x400000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r4, 0xc0305710, &(0x7f00000000c0)={0x1, 0x3, 0x194000000000, 0x7}) r5 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x1, 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000140)=0x7, 0x4) close(r4) 01:31:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:30 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x205) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de", 0x1f0, 0x1e00) 01:31:30 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") 01:31:31 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffffc2, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") 01:31:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0xfffffffffffffc75) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x100, 0x0) accept4$netrom(r2, &(0x7f0000000100)={{}, [@default, @netrom, @default, @bcast, @rose, @bcast, @bcast, @bcast]}, &(0x7f0000000180)=0x48, 0x80800) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x1, 0x0) 01:31:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x246e, 0x2, 0x3}) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 308.698487] FAULT_INJECTION: forcing a failure. [ 308.698487] name failslab, interval 1, probability 0, space 0, times 0 [ 308.732378] CPU: 1 PID: 10589 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 308.739603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 01:31:31 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de", 0x1f0, 0x1e00) [ 308.748960] Call Trace: [ 308.751578] dump_stack+0x1db/0x2d0 [ 308.755221] ? dump_stack_print_info.cold+0x20/0x20 [ 308.760228] ? add_lock_to_list.isra.0+0x450/0x450 [ 308.765145] ? kernfs_activate+0x8f/0x2c0 [ 308.769300] should_fail.cold+0xa/0x15 [ 308.773188] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 308.778292] ? ___might_sleep+0x1e7/0x310 [ 308.782427] ? arch_local_save_flags+0x50/0x50 [ 308.787012] __should_failslab+0x121/0x190 [ 308.791237] should_failslab+0x9/0x14 [ 308.795023] kmem_cache_alloc+0x2be/0x710 [ 308.799166] ? __mutex_unlock_slowpath+0x195/0x870 [ 308.804101] __kernfs_new_node+0xfe/0x8a0 [ 308.808238] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 308.812985] ? mutex_unlock+0xd/0x10 [ 308.816686] ? kernfs_activate+0x21c/0x2c0 [ 308.820909] ? kernfs_walk_and_get_ns+0x340/0x340 [ 308.825748] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 308.831286] ? kernfs_link_sibling+0x210/0x420 [ 308.835868] kernfs_new_node+0x99/0x130 [ 308.839833] __kernfs_create_file+0x51/0x340 [ 308.844233] sysfs_add_file_mode_ns+0x222/0x560 [ 308.848895] internal_create_group+0x3d2/0xd80 [ 308.853476] ? remove_files.isra.0+0x190/0x190 [ 308.858061] ? down_write_nested+0x130/0x130 [ 308.862460] ? resched_curr+0x1a0/0x1a0 [ 308.866423] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.871952] sysfs_create_group+0x20/0x30 [ 308.876094] lo_ioctl+0x1147/0x23e0 [ 308.879713] ? lo_rw_aio+0x1e50/0x1e50 [ 308.883590] ? __fget+0x472/0x710 [ 308.887032] ? lo_rw_aio+0x1e50/0x1e50 [ 308.890911] blkdev_ioctl+0x10e0/0x2120 [ 308.894872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.900394] ? blkpg_ioctl+0xc10/0xc10 [ 308.904285] ? lock_downgrade+0x910/0x910 [ 308.908422] ? kasan_check_read+0x11/0x20 [ 308.912557] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 308.917829] ? rcu_read_unlock_special+0x380/0x380 [ 308.922780] ? __fget+0x499/0x710 [ 308.926226] block_ioctl+0xee/0x130 [ 308.929840] ? blkdev_fallocate+0x410/0x410 [ 308.934148] do_vfs_ioctl+0x107b/0x17d0 [ 308.938116] ? memset+0x32/0x40 [ 308.941397] ? ioctl_preallocate+0x2f0/0x2f0 [ 308.945791] ? smack_inode_setattr+0x290/0x290 [ 308.950361] ? __fget_light+0x2db/0x420 [ 308.954327] ? do_sys_open+0x3f9/0x7c0 [ 308.958215] ? do_syscall_64+0x8c/0x800 [ 308.962174] ? do_syscall_64+0x8c/0x800 [ 308.966144] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.971671] ? security_file_ioctl+0x93/0xc0 [ 308.976069] ksys_ioctl+0xab/0xd0 [ 308.979511] __x64_sys_ioctl+0x73/0xb0 [ 308.983400] do_syscall_64+0x1a3/0x800 [ 308.987287] ? syscall_return_slowpath+0x5f0/0x5f0 [ 308.992213] ? prepare_exit_to_usermode+0x232/0x3b0 [ 308.997227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.002063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.007238] RIP: 0033:0x457f07 [ 309.010417] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.029300] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 309.037007] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 309.044539] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 309.051792] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 309.059051] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 309.066318] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 309.087773] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 309.096133] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:31 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") [ 309.185495] device lo entered promiscuous mode 01:31:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2000) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) capget(&(0x7f00000000c0)={0x399f1336, r2}, &(0x7f0000000100)={0x800, 0x317, 0x80000000, 0x7f, 0x1, 0x5e}) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x1ff) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 309.232610] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 309.249234] device lo left promiscuous mode 01:31:31 executing program 5 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:31 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1f0, 0x1e00) [ 309.282394] device lo entered promiscuous mode [ 309.300977] device lo left promiscuous mode 01:31:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:31 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") 01:31:31 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x5, 0x400, 0x2, 0x6, 0x3, 0x3ff, 0x1, {0x0, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1, 0xfffffffffffffffd, 0x800, 0x1f, 0xfffffffffffffffa}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000001c0)={r3}, &(0x7f0000000200)=0x8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@empty, @in=@multicast1, 0x4e21, 0xff, 0x4e23, 0x400, 0x2, 0xa0, 0x806097ec84cdf928, 0xbe, r1, r4}, {0x8, 0x521, 0x9, 0x6, 0x3, 0x6, 0x6, 0x800}, {0x1ff, 0x100000001, 0x1ff, 0x2}, 0x6, 0x6e6bb6, 0x1, 0x1, 0x2, 0x2}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d5, 0x33}, 0xa, @in=@local, 0x3501, 0x3, 0x3, 0x8000, 0x4c, 0x3, 0x6}}, 0xe8) 01:31:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7b, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000000280)={0x78, 0x0, 0x4, {0xa09, 0x4, 0x0, {0x5, 0x3, 0x200, 0x5, 0x8, 0x6, 0x81, 0xfffffffffffffff7, 0x80000001, 0x1d, 0x0, r2, r3, 0xfffffffeffffffff}}}, 0x78) socket$vsock_stream(0x28, 0x1, 0x0) 01:31:31 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="226e2339f40390fd9499943b2f677b0cc2ff03c5fc23322fdf3add7b03166ace548ea0d326cbbea48a15007a00") [ 309.436456] FAULT_INJECTION: forcing a failure. [ 309.436456] name failslab, interval 1, probability 0, space 0, times 0 [ 309.457165] CPU: 0 PID: 10629 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 309.464379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.473726] Call Trace: [ 309.476312] dump_stack+0x1db/0x2d0 [ 309.479935] ? dump_stack_print_info.cold+0x20/0x20 [ 309.484937] ? add_lock_to_list.isra.0+0x450/0x450 [ 309.489876] ? kernfs_activate+0x8f/0x2c0 [ 309.494016] should_fail.cold+0xa/0x15 [ 309.497892] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 309.502986] ? ___might_sleep+0x1e7/0x310 [ 309.507124] ? arch_local_save_flags+0x50/0x50 [ 309.511698] __should_failslab+0x121/0x190 [ 309.515920] should_failslab+0x9/0x14 [ 309.519709] kmem_cache_alloc+0x2be/0x710 [ 309.523845] ? __mutex_unlock_slowpath+0x195/0x870 [ 309.528767] __kernfs_new_node+0xfe/0x8a0 [ 309.532905] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 309.537652] ? mutex_unlock+0xd/0x10 [ 309.541361] ? kernfs_activate+0x21c/0x2c0 [ 309.545603] ? kernfs_walk_and_get_ns+0x340/0x340 [ 309.550435] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 309.555962] ? kernfs_link_sibling+0x210/0x420 [ 309.560539] kernfs_new_node+0x99/0x130 [ 309.564501] __kernfs_create_file+0x51/0x340 [ 309.568897] sysfs_add_file_mode_ns+0x222/0x560 [ 309.573555] internal_create_group+0x3d2/0xd80 [ 309.578141] ? remove_files.isra.0+0x190/0x190 [ 309.582718] ? down_write_nested+0x130/0x130 [ 309.587113] ? resched_curr+0x1a0/0x1a0 [ 309.591076] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.596604] sysfs_create_group+0x20/0x30 [ 309.600757] lo_ioctl+0x1147/0x23e0 [ 309.604377] ? lo_rw_aio+0x1e50/0x1e50 [ 309.608257] ? __fget+0x472/0x710 [ 309.611699] ? lo_rw_aio+0x1e50/0x1e50 [ 309.615575] blkdev_ioctl+0x10e0/0x2120 [ 309.619536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.625058] ? blkpg_ioctl+0xc10/0xc10 [ 309.628942] ? lock_downgrade+0x910/0x910 [ 309.633085] ? kasan_check_read+0x11/0x20 [ 309.637237] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 309.642508] ? rcu_read_unlock_special+0x380/0x380 [ 309.647431] ? __fget+0x499/0x710 [ 309.650878] block_ioctl+0xee/0x130 [ 309.654492] ? blkdev_fallocate+0x410/0x410 [ 309.658801] do_vfs_ioctl+0x107b/0x17d0 [ 309.662763] ? memset+0x32/0x40 [ 309.666040] ? ioctl_preallocate+0x2f0/0x2f0 [ 309.670455] ? smack_inode_setattr+0x290/0x290 [ 309.675057] ? __fget_light+0x2db/0x420 [ 309.679023] ? do_sys_open+0x3f9/0x7c0 [ 309.682910] ? do_syscall_64+0x8c/0x800 [ 309.686876] ? do_syscall_64+0x8c/0x800 [ 309.690840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.696371] ? security_file_ioctl+0x93/0xc0 [ 309.700780] ksys_ioctl+0xab/0xd0 [ 309.704236] __x64_sys_ioctl+0x73/0xb0 [ 309.708116] do_syscall_64+0x1a3/0x800 [ 309.712015] ? syscall_return_slowpath+0x5f0/0x5f0 [ 309.716964] ? prepare_exit_to_usermode+0x232/0x3b0 [ 309.721975] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.726810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.731986] RIP: 0033:0x457f07 [ 309.735163] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.754047] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 309.761737] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 309.768988] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 309.776242] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 01:31:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8c", 0x1f8, 0x1e00) [ 309.783497] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 309.790752] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 309.834665] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 309.866697] device lo entered promiscuous mode [ 309.885499] device lo left promiscuous mode 01:31:32 executing program 5 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 309.908637] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 309.927591] device lo entered promiscuous mode [ 309.946400] device lo left promiscuous mode 01:31:32 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, 0x0) 01:31:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f00000000c0)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000700)={'broute\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000280)={0x2, &(0x7f00000001c0)=[{}, {}]}) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@initdev, @in6}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@loopback}}, 0x0) ioctl$HCIINQUIRY(r4, 0x800448f0, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc07}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r5 = semget(0xffffffffffffffff, 0x2, 0x0) semctl$IPC_INFO(r5, 0x0, 0x3, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, 0x0, 0x8000) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) [ 309.984778] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:32 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0xffffffffffffffff, 0x6100) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000100)={0x1, 0x54, &(0x7f0000000080)="04e5da863656f5e9248e4a68e64f81afeceb901fb65705cbce5baf0bc7c6a6198b615636d50a6ccf1a0a46ac8f42a46ffe0e3f824e33d8e11265612278ede083fea6cb1a447327e39725471bdf5c937b9e3143ca"}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000140)=ANY=[@ANYBLOB="010009003e67d10fbe59aa000000aaaaaaaaaa1aaaaaaaaaaaaaaaaaaaaaaaaa55401b2047a2aaaaaaaaaaaaaaaaaaaaaabb0000000000000000"]) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) 01:31:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1f8, 0x1e00) [ 310.058344] FAULT_INJECTION: forcing a failure. [ 310.058344] name failslab, interval 1, probability 0, space 0, times 0 [ 310.076312] CPU: 1 PID: 10658 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 310.083515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.092872] Call Trace: [ 310.095473] dump_stack+0x1db/0x2d0 [ 310.099122] ? dump_stack_print_info.cold+0x20/0x20 01:31:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:32 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, 0x0) [ 310.104153] ? add_lock_to_list.isra.0+0x450/0x450 [ 310.109093] ? kernfs_activate+0x8f/0x2c0 [ 310.113260] should_fail.cold+0xa/0x15 [ 310.117166] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 310.122294] ? ___might_sleep+0x1e7/0x310 [ 310.126458] ? arch_local_save_flags+0x50/0x50 [ 310.131068] __should_failslab+0x121/0x190 [ 310.132347] device lo entered promiscuous mode [ 310.135318] should_failslab+0x9/0x14 [ 310.135336] kmem_cache_alloc+0x2be/0x710 [ 310.135352] ? __mutex_unlock_slowpath+0x195/0x870 [ 310.135375] __kernfs_new_node+0xfe/0x8a0 [ 310.155446] Unknown ioctl 19302 [ 310.156958] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 310.156993] ? mutex_unlock+0xd/0x10 [ 310.168723] ? kernfs_activate+0x21c/0x2c0 [ 310.172976] ? kernfs_walk_and_get_ns+0x340/0x340 [ 310.177833] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 310.183379] ? kernfs_link_sibling+0x210/0x420 [ 310.184029] Unknown ioctl -2147202832 [ 310.187979] kernfs_new_node+0x99/0x130 [ 310.188003] __kernfs_create_file+0x51/0x340 [ 310.188024] sysfs_add_file_mode_ns+0x222/0x560 [ 310.188051] internal_create_group+0x3d2/0xd80 [ 310.188076] ? remove_files.isra.0+0x190/0x190 [ 310.208276] protocol 88fb is buggy, dev hsr_slave_0 [ 310.209469] ? down_write_nested+0x130/0x130 [ 310.209490] ? resched_curr+0x1a0/0x1a0 [ 310.209507] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 310.214141] protocol 88fb is buggy, dev hsr_slave_1 [ 310.219094] sysfs_create_group+0x20/0x30 [ 310.219114] lo_ioctl+0x1147/0x23e0 [ 310.219139] ? lo_rw_aio+0x1e50/0x1e50 [ 310.219156] ? __fget+0x472/0x710 [ 310.253152] ? lo_rw_aio+0x1e50/0x1e50 [ 310.257055] blkdev_ioctl+0x10e0/0x2120 [ 310.261038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.266592] ? blkpg_ioctl+0xc10/0xc10 [ 310.270496] ? lock_downgrade+0x910/0x910 [ 310.274654] ? kasan_check_read+0x11/0x20 [ 310.278814] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 310.284104] ? rcu_read_unlock_special+0x380/0x380 [ 310.289053] ? __fget+0x499/0x710 [ 310.292527] block_ioctl+0xee/0x130 [ 310.296168] ? blkdev_fallocate+0x410/0x410 [ 310.300509] do_vfs_ioctl+0x107b/0x17d0 [ 310.304496] ? memset+0x32/0x40 [ 310.305997] device lo left promiscuous mode [ 310.307788] ? ioctl_preallocate+0x2f0/0x2f0 [ 310.307806] ? smack_inode_setattr+0x290/0x290 [ 310.307821] ? __fget_light+0x2db/0x420 [ 310.307842] ? do_sys_open+0x3f9/0x7c0 [ 310.328928] ? do_syscall_64+0x8c/0x800 [ 310.332890] ? do_syscall_64+0x8c/0x800 [ 310.336855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.342395] ? security_file_ioctl+0x93/0xc0 [ 310.346789] ksys_ioctl+0xab/0xd0 [ 310.350231] __x64_sys_ioctl+0x73/0xb0 [ 310.354108] do_syscall_64+0x1a3/0x800 [ 310.357995] ? syscall_return_slowpath+0x5f0/0x5f0 [ 310.362927] ? prepare_exit_to_usermode+0x232/0x3b0 [ 310.367932] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.372766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.377939] RIP: 0033:0x457f07 [ 310.381119] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.400014] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 310.407720] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 310.414977] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 310.422228] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 310.429578] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 310.436842] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 01:31:32 executing program 5 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:32 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, 0x0) 01:31:32 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 01:31:32 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1f8, 0x1e00) 01:31:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xa, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 310.737244] FAULT_INJECTION: forcing a failure. [ 310.737244] name failslab, interval 1, probability 0, space 0, times 0 [ 310.784379] CPU: 1 PID: 10693 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 310.791586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.800951] Call Trace: [ 310.803562] dump_stack+0x1db/0x2d0 [ 310.807220] ? dump_stack_print_info.cold+0x20/0x20 [ 310.812256] ? add_lock_to_list.isra.0+0x450/0x450 [ 310.817210] ? kernfs_activate+0x8f/0x2c0 [ 310.821374] should_fail.cold+0xa/0x15 [ 310.825284] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 310.830406] ? ___might_sleep+0x1e7/0x310 [ 310.834568] ? arch_local_save_flags+0x50/0x50 [ 310.839174] __should_failslab+0x121/0x190 [ 310.843431] should_failslab+0x9/0x14 [ 310.847243] kmem_cache_alloc+0x2be/0x710 [ 310.851402] ? __mutex_unlock_slowpath+0x195/0x870 [ 310.856349] __kernfs_new_node+0xfe/0x8a0 [ 310.860513] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 310.865288] ? mutex_unlock+0xd/0x10 [ 310.869023] ? kernfs_activate+0x21c/0x2c0 [ 310.873272] ? kernfs_walk_and_get_ns+0x340/0x340 [ 310.878126] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 310.883676] ? kernfs_link_sibling+0x210/0x420 [ 310.888275] kernfs_new_node+0x99/0x130 [ 310.892270] __kernfs_create_file+0x51/0x340 [ 310.896692] sysfs_add_file_mode_ns+0x222/0x560 [ 310.901382] internal_create_group+0x3d2/0xd80 [ 310.905994] ? remove_files.isra.0+0x190/0x190 [ 310.910591] ? down_write_nested+0x130/0x130 [ 310.915022] ? resched_curr+0x1a0/0x1a0 [ 310.919012] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 310.924579] sysfs_create_group+0x20/0x30 [ 310.928744] lo_ioctl+0x1147/0x23e0 01:31:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fc, 0x1e00) [ 310.932392] ? lo_rw_aio+0x1e50/0x1e50 [ 310.935541] device lo entered promiscuous mode [ 310.936293] ? __fget+0x472/0x710 [ 310.936314] ? lo_rw_aio+0x1e50/0x1e50 [ 310.936335] blkdev_ioctl+0x10e0/0x2120 [ 310.936353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.957762] ? blkpg_ioctl+0xc10/0xc10 [ 310.961665] ? lock_downgrade+0x910/0x910 [ 310.965822] ? kasan_check_read+0x11/0x20 [ 310.969990] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 310.975283] ? rcu_read_unlock_special+0x380/0x380 [ 310.980257] ? __fget+0x499/0x710 01:31:33 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 310.983727] block_ioctl+0xee/0x130 [ 310.987366] ? blkdev_fallocate+0x410/0x410 [ 310.991922] do_vfs_ioctl+0x107b/0x17d0 [ 310.995920] ? memset+0x32/0x40 [ 310.996829] Unknown ioctl 19302 [ 310.999232] ? ioctl_preallocate+0x2f0/0x2f0 [ 310.999250] ? smack_inode_setattr+0x290/0x290 [ 310.999265] ? __fget_light+0x2db/0x420 [ 310.999287] ? do_sys_open+0x3f9/0x7c0 [ 310.999305] ? do_syscall_64+0x8c/0x800 [ 310.999322] ? do_syscall_64+0x8c/0x800 [ 311.005830] Unknown ioctl -2147202832 [ 311.007014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.007035] ? security_file_ioctl+0x93/0xc0 [ 311.007055] ksys_ioctl+0xab/0xd0 [ 311.007073] __x64_sys_ioctl+0x73/0xb0 [ 311.048540] do_syscall_64+0x1a3/0x800 [ 311.052455] ? syscall_return_slowpath+0x5f0/0x5f0 [ 311.057412] ? prepare_exit_to_usermode+0x232/0x3b0 [ 311.059408] device lo left promiscuous mode [ 311.062451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.062476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.062490] RIP: 0033:0x457f07 [ 311.062506] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.062524] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.106627] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 311.113890] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 311.121169] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 311.128438] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 01:31:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0xb4, "ee4572ae879be383f73fa62c0aaa57f9a6082366e318787c8fc85392efccf08757472d2eec1dcfa522eb01b183b298400e63d861a94cef7428dafeb7b2d5982912c20bcc6fe31e2d5c46e1e0f0183c209f7fd694b1d145f8dff9dc28af6107e59279c7192d46a97d2b7439c9b1dff196354ee421d63b15ea12d6b08eb8bf5db0134ccb76cf68b7f2e014381700e8262407fdb948595f5dfb9984cb187aec31fce95d0eaa55b49bda44a480276a47856578de3f7f"}, &(0x7f0000000240)=0xbc) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={r3, 0xe8, 0x0, 0x0, 0xfffffffffffffff7, 0x1}, &(0x7f00000002c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f00000000c0)=0x5, 0x4) 01:31:33 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) [ 311.135694] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 01:31:33 executing program 5 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fc, 0x1e00) [ 311.279560] device lo entered promiscuous mode [ 311.292897] device lo left promiscuous mode 01:31:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r2, &(0x7f00000006c0)={0x2, 0x200000000004e23, @multicast2}, 0x10) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, 0x0) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f00000000c0)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f0000000700)={'broute\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000300)=[{}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000280)={0x2, &(0x7f00000001c0)=[{}, {}]}) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@initdev, @in6}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@loopback}}, 0x0) ioctl$HCIINQUIRY(r4, 0x800448f0, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc07}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) r5 = semget(0xffffffffffffffff, 0x2, 0x0) semctl$IPC_INFO(r5, 0x0, 0x3, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, 0x0, 0x8000) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:33 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x400, &(0x7f0000000180)="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") [ 311.334248] device lo entered promiscuous mode [ 311.368850] FAULT_INJECTION: forcing a failure. [ 311.368850] name failslab, interval 1, probability 0, space 0, times 0 01:31:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c23671", 0x1fc, 0x1e00) [ 311.409144] device lo left promiscuous mode [ 311.422342] device lo entered promiscuous mode [ 311.441167] Unknown ioctl 19302 [ 311.444360] CPU: 1 PID: 10722 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 01:31:33 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) r2 = fcntl$dupfd(r0, 0x406, r0) sendmsg$nl_route_sched(r2, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2605008}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=@deltaction={0x104, 0x31, 0x903, 0x70bd2c, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x88, 0x1, [{0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0xdf33}}, {0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0x100000001}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x2b4}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x7fffffff}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x3}}]}, @TCA_ACT_TAB={0x3c, 0x1, [{0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x8000}, 0x20000044) io_setup(0xfaf6, &(0x7f0000000100)=0x0) io_pgetevents(r3, 0x501, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000340)={&(0x7f0000000300)={0x6}, 0x8}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) name_to_handle_at(r4, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)={0xb1, 0x2, "b387fe8e83dfd6c70086b6c422bf13ed729826503d536775a1872b8e1604fab946c5eeca3d23400a1c977ad8f08088cb0886c04a86662a038f5b5967b3356c0178a466680d1a605e86263c28fa15a230ff715caf7483a9c068ce5ca9dc4ba361728f2fb1c4c20b7b776d61e2dc8b4e7ec689827e514d805f29a391d15616623c6f442ebe0d64c19563216ef622bd5f62e26340c4518460696038ddffe7a84bd0cbcebe6ce3ceb080b3"}, &(0x7f00000001c0), 0x1400) [ 311.451659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.461018] Call Trace: [ 311.463624] dump_stack+0x1db/0x2d0 [ 311.467273] ? dump_stack_print_info.cold+0x20/0x20 [ 311.472307] ? add_lock_to_list.isra.0+0x450/0x450 [ 311.474387] Unknown ioctl -2147202832 [ 311.477263] ? kernfs_activate+0x8f/0x2c0 [ 311.477287] should_fail.cold+0xa/0x15 [ 311.477308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 311.477332] ? ___might_sleep+0x1e7/0x310 [ 311.477349] ? arch_local_save_flags+0x50/0x50 [ 311.477377] __should_failslab+0x121/0x190 [ 311.477397] should_failslab+0x9/0x14 [ 311.477412] kmem_cache_alloc+0x2be/0x710 [ 311.477427] ? __mutex_unlock_slowpath+0x195/0x870 [ 311.477451] __kernfs_new_node+0xfe/0x8a0 [ 311.477470] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 311.477495] ? mutex_unlock+0xd/0x10 [ 311.477509] ? kernfs_activate+0x21c/0x2c0 [ 311.477528] ? kernfs_walk_and_get_ns+0x340/0x340 [ 311.477546] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 311.477560] ? kernfs_link_sibling+0x210/0x420 [ 311.477585] kernfs_new_node+0x99/0x130 [ 311.555893] __kernfs_create_file+0x51/0x340 [ 311.560317] sysfs_add_file_mode_ns+0x222/0x560 [ 311.565021] internal_create_group+0x3d2/0xd80 [ 311.569626] ? remove_files.isra.0+0x190/0x190 [ 311.574738] ? down_write_nested+0x130/0x130 [ 311.579159] ? resched_curr+0x1a0/0x1a0 [ 311.583217] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 311.588772] sysfs_create_group+0x20/0x30 [ 311.592934] lo_ioctl+0x1147/0x23e0 [ 311.596586] ? lo_rw_aio+0x1e50/0x1e50 [ 311.600497] ? __fget+0x472/0x710 [ 311.603971] ? lo_rw_aio+0x1e50/0x1e50 [ 311.607873] blkdev_ioctl+0x10e0/0x2120 [ 311.611858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.617406] ? blkpg_ioctl+0xc10/0xc10 [ 311.621309] ? lock_downgrade+0x910/0x910 [ 311.625470] ? kasan_check_read+0x11/0x20 [ 311.629630] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 311.634920] ? rcu_read_unlock_special+0x380/0x380 [ 311.640229] ? __fget+0x499/0x710 [ 311.643703] block_ioctl+0xee/0x130 [ 311.647343] ? blkdev_fallocate+0x410/0x410 [ 311.651673] do_vfs_ioctl+0x107b/0x17d0 [ 311.655658] ? memset+0x32/0x40 [ 311.658953] ? ioctl_preallocate+0x2f0/0x2f0 [ 311.663379] ? smack_inode_setattr+0x290/0x290 [ 311.667978] ? __fget_light+0x2db/0x420 [ 311.671981] ? do_sys_open+0x3f9/0x7c0 [ 311.675883] ? do_syscall_64+0x8c/0x800 [ 311.679870] ? do_syscall_64+0x8c/0x800 [ 311.683862] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 311.689411] ? security_file_ioctl+0x93/0xc0 [ 311.693832] ksys_ioctl+0xab/0xd0 [ 311.697301] __x64_sys_ioctl+0x73/0xb0 [ 311.701209] do_syscall_64+0x1a3/0x800 [ 311.705110] ? syscall_return_slowpath+0x5f0/0x5f0 [ 311.710053] ? prepare_exit_to_usermode+0x232/0x3b0 [ 311.715084] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.719948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.725149] RIP: 0033:0x457f07 [ 311.728355] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.747260] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.754980] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 311.762255] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 311.769533] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 311.776811] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 311.784089] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 311.792027] device lo left promiscuous mode 01:31:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xb, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x34, &(0x7f00000003c0)) 01:31:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fe, 0x1e00) 01:31:34 executing program 5 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 312.023109] device lo entered promiscuous mode [ 312.078756] device lo left promiscuous mode 01:31:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) fallocate(r0, 0x4, 0xffff, 0x9) ioctl(r0, 0xa9b, &(0x7f0000000040)="a3") r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x7, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000000c0)=0x800, 0x4) [ 312.184000] FAULT_INJECTION: forcing a failure. [ 312.184000] name failslab, interval 1, probability 0, space 0, times 0 [ 312.204818] CPU: 0 PID: 10760 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 312.212019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.221373] Call Trace: [ 312.223975] dump_stack+0x1db/0x2d0 [ 312.227619] ? dump_stack_print_info.cold+0x20/0x20 01:31:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fe, 0x1e00) [ 312.232660] should_fail.cold+0xa/0x15 [ 312.236563] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 312.241680] ? ___might_sleep+0x1e7/0x310 [ 312.245837] ? arch_local_save_flags+0x50/0x50 [ 312.250435] ? vprintk_default+0x28/0x30 [ 312.254518] ? vprintk_func+0x86/0x189 [ 312.258411] __should_failslab+0x121/0x190 [ 312.262637] should_failslab+0x9/0x14 [ 312.266423] kmem_cache_alloc_trace+0x2d1/0x760 [ 312.271099] kobject_uevent_env+0x2fb/0x102b [ 312.275496] ? resched_curr+0x1a0/0x1a0 [ 312.279474] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 312.285027] kobject_uevent+0x20/0x26 [ 312.288828] lo_ioctl+0x11c6/0x23e0 [ 312.292444] ? lo_rw_aio+0x1e50/0x1e50 [ 312.296331] ? __fget+0x472/0x710 [ 312.299797] ? lo_rw_aio+0x1e50/0x1e50 [ 312.303721] blkdev_ioctl+0x10e0/0x2120 [ 312.307697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.313230] ? blkpg_ioctl+0xc10/0xc10 [ 312.317117] ? lock_downgrade+0x910/0x910 [ 312.321263] ? kasan_check_read+0x11/0x20 [ 312.325406] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 312.330668] ? rcu_read_unlock_special+0x380/0x380 [ 312.335595] ? __fget+0x499/0x710 [ 312.339038] block_ioctl+0xee/0x130 [ 312.342662] ? blkdev_fallocate+0x410/0x410 [ 312.346984] do_vfs_ioctl+0x107b/0x17d0 [ 312.350957] ? memset+0x32/0x40 [ 312.354227] ? ioctl_preallocate+0x2f0/0x2f0 [ 312.358623] ? smack_inode_setattr+0x290/0x290 [ 312.363191] ? __fget_light+0x2db/0x420 [ 312.367164] ? do_sys_open+0x3f9/0x7c0 [ 312.371042] ? do_syscall_64+0x8c/0x800 [ 312.375005] ? do_syscall_64+0x8c/0x800 [ 312.378969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.384496] ? security_file_ioctl+0x93/0xc0 [ 312.388981] ksys_ioctl+0xab/0xd0 [ 312.392423] __x64_sys_ioctl+0x73/0xb0 [ 312.396298] do_syscall_64+0x1a3/0x800 [ 312.400173] ? syscall_return_slowpath+0x5f0/0x5f0 [ 312.405098] ? prepare_exit_to_usermode+0x232/0x3b0 [ 312.410119] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.414959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.420133] RIP: 0033:0x457f07 [ 312.423311] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.442205] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.449898] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 312.457151] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 312.464403] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 312.471658] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 01:31:34 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) accept4$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'tunl0\x00', r1}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 312.478918] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 01:31:34 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:34 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000080)={0x10000, @remote}) [ 312.652269] FAULT_INJECTION: forcing a failure. [ 312.652269] name failslab, interval 1, probability 0, space 0, times 0 [ 312.691361] CPU: 0 PID: 10782 Comm: syz-executor4 Not tainted 5.0.0-rc3+ #39 01:31:35 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1fe, 0x1e00) 01:31:35 executing program 5 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 312.698597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.707950] Call Trace: [ 312.710556] dump_stack+0x1db/0x2d0 [ 312.714214] ? dump_stack_print_info.cold+0x20/0x20 [ 312.719248] ? __might_fault+0x12b/0x1e0 [ 312.723338] should_fail.cold+0xa/0x15 [ 312.727244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 312.732371] ? ___might_sleep+0x1e7/0x310 [ 312.736534] ? arch_local_save_flags+0x50/0x50 [ 312.738289] EXT4-fs: 10 callbacks suppressed [ 312.738301] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:35 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1ff, 0x1e00) [ 312.741128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.741151] __should_failslab+0x121/0x190 [ 312.741169] should_failslab+0x9/0x14 [ 312.765017] __kmalloc+0x2dc/0x740 [ 312.768583] ? find_held_lock+0x35/0x120 [ 312.772694] ? drm_ioctl+0x4a9/0xb50 [ 312.776427] drm_ioctl+0x4a9/0xb50 [ 312.779978] ? drm_syncobj_handle_to_fd_ioctl+0x4a0/0x4a0 [ 312.785522] ? lock_downgrade+0x910/0x910 [ 312.789675] ? drm_version+0x3d0/0x3d0 [ 312.789697] ? smk_tskacc+0x3d3/0x520 [ 312.789720] ? smack_privileged+0xd0/0xd0 [ 312.789736] ? iterate_fd+0x4b0/0x4b0 [ 312.805349] ? drm_version+0x3d0/0x3d0 [ 312.809249] do_vfs_ioctl+0x107b/0x17d0 [ 312.813242] ? smk_curacc+0x7f/0xa0 [ 312.816887] ? ioctl_preallocate+0x2f0/0x2f0 [ 312.821310] ? smack_inode_setattr+0x290/0x290 [ 312.825918] ? __fget_light+0x2db/0x420 [ 312.829906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 312.835455] ? fput+0x128/0x1a0 [ 312.838740] ? do_syscall_64+0x8c/0x800 [ 312.842703] ? do_syscall_64+0x8c/0x800 [ 312.846665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.852201] ? security_file_ioctl+0x93/0xc0 [ 312.856616] ksys_ioctl+0xab/0xd0 [ 312.860059] __x64_sys_ioctl+0x73/0xb0 [ 312.863934] do_syscall_64+0x1a3/0x800 [ 312.867811] ? syscall_return_slowpath+0x5f0/0x5f0 [ 312.872744] ? prepare_exit_to_usermode+0x232/0x3b0 [ 312.877765] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.882606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.887787] RIP: 0033:0x458099 [ 312.890978] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.909863] RSP: 002b:00007fb3af8cec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.917553] RAX: ffffffffffffffda RBX: 00007fb3af8cec90 RCX: 0000000000458099 [ 312.924816] RDX: 0000000020000100 RSI: ffffffffffffffc2 RDI: 0000000000000003 [ 312.932082] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 312.939340] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3af8cf6d4 [ 312.946615] R13: 00000000004bf2d5 R14: 00000000004d0a30 R15: 0000000000000004 01:31:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) 01:31:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x654000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1f, 0x1, 0x0, 0x100, 0x3, r2, 0x80000000}, 0x2c) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x3, 0x6, @broadcast}, 0x10) close(r0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000100)={0x6, {0x8, 0x3, 0x3e596880, 0x1000, 0x100000000, 0x1e}}) 01:31:35 executing program 4 (fault-call:1 fault-nth:1): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:35 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x3000, 0x1000, &(0x7f0000002000/0x3000)=nil) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000000c0)=0xc) prlimit64(0x0, 0x0, &(0x7f00000004c0)={0x0, 0x7ffffd}, &(0x7f00000002c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x06', &(0x7f0000000200)='./file0\x00', 0x0, 0x700, &(0x7f00000024c0), 0x100032, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0xf) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x10000001}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000440)={0x0, 0x80}, 0x0) setgroups(0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0]) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 313.044855] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:35 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1ff, 0x1e00) 01:31:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xe, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 313.115997] FAULT_INJECTION: forcing a failure. [ 313.115997] name failslab, interval 1, probability 0, space 0, times 0 [ 313.143866] device lo entered promiscuous mode [ 313.152138] device lo left promiscuous mode [ 313.156708] CPU: 0 PID: 10802 Comm: syz-executor5 Not tainted 5.0.0-rc3+ #39 [ 313.158906] FAULT_INJECTION: forcing a failure. [ 313.158906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 313.163908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.185030] Call Trace: [ 313.187625] dump_stack+0x1db/0x2d0 [ 313.191265] ? dump_stack_print_info.cold+0x20/0x20 [ 313.196283] ? mark_held_locks+0x100/0x100 [ 313.200529] should_fail.cold+0xa/0x15 [ 313.204423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 313.209539] ? ___might_sleep+0x1e7/0x310 [ 313.213691] ? arch_local_save_flags+0x50/0x50 [ 313.218275] ? enable_ptr_key_workfn+0x30/0x30 [ 313.222864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.228413] __should_failslab+0x121/0x190 [ 313.232654] should_failslab+0x9/0x14 [ 313.236455] kmem_cache_alloc_node+0x265/0x710 [ 313.241042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.246622] __alloc_skb+0xf4/0x730 [ 313.250261] ? skb_scrub_packet+0x440/0x440 [ 313.254607] ? netlink_has_listeners+0x2e7/0x4a0 [ 313.259371] ? netlink_tap_init_net+0x3e0/0x3e0 [ 313.264045] alloc_uevent_skb+0x83/0x1e2 [ 313.268113] kobject_uevent_env+0xa63/0x102b [ 313.272525] ? resched_curr+0x1a0/0x1a0 [ 313.276511] kobject_uevent+0x20/0x26 [ 313.280321] lo_ioctl+0x11c6/0x23e0 [ 313.283952] ? lo_rw_aio+0x1e50/0x1e50 [ 313.287836] ? __fget+0x472/0x710 [ 313.291327] ? lo_rw_aio+0x1e50/0x1e50 [ 313.295241] blkdev_ioctl+0x10e0/0x2120 [ 313.299243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.304788] ? blkpg_ioctl+0xc10/0xc10 [ 313.308679] ? lock_downgrade+0x910/0x910 [ 313.312840] ? kasan_check_read+0x11/0x20 [ 313.316991] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 313.322276] ? rcu_read_unlock_special+0x380/0x380 [ 313.327222] ? __fget+0x499/0x710 [ 313.330686] block_ioctl+0xee/0x130 [ 313.334322] ? blkdev_fallocate+0x410/0x410 [ 313.338644] do_vfs_ioctl+0x107b/0x17d0 [ 313.342622] ? memset+0x32/0x40 [ 313.345910] ? ioctl_preallocate+0x2f0/0x2f0 [ 313.350322] ? smack_inode_setattr+0x290/0x290 [ 313.354916] ? __fget_light+0x2db/0x420 [ 313.358901] ? do_sys_open+0x3f9/0x7c0 [ 313.362795] ? do_syscall_64+0x8c/0x800 [ 313.366775] ? do_syscall_64+0x8c/0x800 [ 313.370756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.376298] ? security_file_ioctl+0x93/0xc0 [ 313.380709] ksys_ioctl+0xab/0xd0 [ 313.384167] __x64_sys_ioctl+0x73/0xb0 [ 313.388066] do_syscall_64+0x1a3/0x800 [ 313.391958] ? syscall_return_slowpath+0x5f0/0x5f0 [ 313.396895] ? prepare_exit_to_usermode+0x232/0x3b0 [ 313.401925] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.406783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.411968] RIP: 0033:0x457f07 [ 313.415164] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.434071] RSP: 002b:00007fb86e3dda88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.441989] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457f07 [ 313.449257] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 313.456526] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 313.463792] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 313.471057] R13: 0000000000000000 R14: 00000000004dbb00 R15: 0000000000000003 [ 313.478348] CPU: 1 PID: 10812 Comm: syz-executor4 Not tainted 5.0.0-rc3+ #39 [ 313.485543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.494900] Call Trace: [ 313.497492] dump_stack+0x1db/0x2d0 [ 313.501122] ? dump_stack_print_info.cold+0x20/0x20 [ 313.506137] ? print_usage_bug+0xd0/0xd0 [ 313.510189] should_fail.cold+0xa/0x15 [ 313.514075] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 313.519186] ? mark_held_locks+0x100/0x100 [ 313.523445] ? __lock_acquire+0x572/0x4a30 [ 313.527681] should_fail_alloc_page+0x50/0x60 [ 313.532164] __alloc_pages_nodemask+0x323/0xdc0 [ 313.536820] ? __might_fault+0x12b/0x1e0 [ 313.540910] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 313.545927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.551462] ? ___might_sleep+0x1e7/0x310 [ 313.555602] ? trace_hardirqs_off+0xb8/0x310 [ 313.560022] cache_grow_begin+0x9c/0x8c0 [ 313.564092] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 313.569636] ? check_preemption_disabled+0x48/0x290 [ 313.574651] __kmalloc+0x67f/0x740 [ 313.578191] ? find_held_lock+0x35/0x120 [ 313.582400] ? drm_ioctl+0x4a9/0xb50 [ 313.586109] drm_ioctl+0x4a9/0xb50 [ 313.589637] ? drm_syncobj_handle_to_fd_ioctl+0x4a0/0x4a0 [ 313.595159] ? lock_downgrade+0x910/0x910 [ 313.599311] ? drm_version+0x3d0/0x3d0 [ 313.603253] ? smk_tskacc+0x3d3/0x520 [ 313.607102] ? smack_privileged+0xd0/0xd0 [ 313.611239] ? iterate_fd+0x4b0/0x4b0 [ 313.615028] ? drm_version+0x3d0/0x3d0 [ 313.618914] do_vfs_ioctl+0x107b/0x17d0 [ 313.622899] ? smk_curacc+0x7f/0xa0 [ 313.626531] ? ioctl_preallocate+0x2f0/0x2f0 [ 313.630939] ? smack_inode_setattr+0x290/0x290 [ 313.635515] ? __fget_light+0x2db/0x420 [ 313.639491] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 313.645034] ? fput+0x128/0x1a0 [ 313.648326] ? do_syscall_64+0x8c/0x800 [ 313.652302] ? do_syscall_64+0x8c/0x800 [ 313.656267] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.661813] ? security_file_ioctl+0x93/0xc0 [ 313.666227] ksys_ioctl+0xab/0xd0 [ 313.669669] __x64_sys_ioctl+0x73/0xb0 [ 313.673550] do_syscall_64+0x1a3/0x800 [ 313.677430] ? syscall_return_slowpath+0x5f0/0x5f0 [ 313.682364] ? prepare_exit_to_usermode+0x232/0x3b0 [ 313.687393] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.692242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.697421] RIP: 0033:0x458099 [ 313.700622] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.719528] RSP: 002b:00007fb3af8cec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.727235] RAX: ffffffffffffffda RBX: 00007fb3af8cec90 RCX: 0000000000458099 [ 313.734496] RDX: 0000000020000100 RSI: ffffffffffffffc2 RDI: 0000000000000003 [ 313.741769] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 313.749035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3af8cf6d4 [ 313.756293] R13: 00000000004bf2d5 R14: 00000000004d0a30 R15: 0000000000000004 [ 313.765564] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:36 executing program 4 (fault-call:1 fault-nth:2): r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 313.789862] device lo entered promiscuous mode [ 313.804102] device lo left promiscuous mode 01:31:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) close(r0) 01:31:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x1ff, 0x1e00) 01:31:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 313.962712] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:36 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 314.013950] device lo entered promiscuous mode [ 314.024623] device lo left promiscuous mode [ 314.054071] device lo entered promiscuous mode [ 314.072699] device lo left promiscuous mode 01:31:36 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00000002, &(0x7f0000000100)) [ 314.126316] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000080)) fcntl$getown(r0, 0x9) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x100) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000180)={{0x3f, 0x400, 0x4, 0x7, 0x0, 0x9}, 0x7f, 0x9c, 0x1}) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000100)={0xda86ff95c4025708, 0x1, 0x2, [], &(0x7f00000000c0)={0x0, 0x5, [], @string=&(0x7f0000000080)=0x7ff}}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000140)={0x800, 0x217, 0x4}) 01:31:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x10, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 314.202787] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:36 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) r2 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x100000000001, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="d4000000", @ANYRES16=r3, @ANYBLOB="120329bd7000fedbdf2507000000080004000700000008000500200000002800030008000500000007ff14000600fe8000000000000000000000000000bb080008001f000000200001001400030000000000000000000000000000000000080009007e00000068000300140042007465716c30000000000000000000000008000300000000001400020069703667726530000000000000000000140002007465616d5f736c6176655f3000000000080007004e210000080008000400000008000100000000000800080006000000675d07ad63d978159e3319c9251cf2df5613e4ae0047762131a690"], 0xd4}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000000) close(r0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x40000, 0x0) ioctl$LOOP_SET_CAPACITY(r4, 0x4c07) 01:31:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:36 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005421, &(0x7f0000000100)) 01:31:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 314.365703] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 314.394733] device lo entered promiscuous mode 01:31:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x20200) [ 314.447388] device lo left promiscuous mode [ 314.475736] device lo entered promiscuous mode [ 314.484112] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:36 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005450, &(0x7f0000000100)) [ 314.520104] device lo left promiscuous mode 01:31:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2d, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:36 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x2000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100)={0x3}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/icmp6\x00') getdents64(r1, &(0x7f0000000180)=""/18, 0xe9c6c40f7d029834) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) close(r1) 01:31:36 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x40000000002c, 0x3ffffe) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80000, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r1, 0xc0305615, &(0x7f00000000c0)={0x0, {0x546c, 0x19}}) sendto$packet(r1, &(0x7f0000000080)="9ce170e6687bd4a05af5ea814a9dec68", 0x10, 0x4000, 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:36 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005451, &(0x7f0000000100)) [ 314.690590] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 314.767356] device lo entered promiscuous mode [ 314.781389] device lo left promiscuous mode [ 314.800237] device lo entered promiscuous mode [ 314.805047] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:37 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005452, &(0x7f0000000100)) [ 314.820145] device lo left promiscuous mode 01:31:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffdfc3, &(0x7f0000000040)="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") syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x6464, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_proto_private(r1, 0x89e2, &(0x7f0000000540)="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") writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000240)}, {&(0x7f0000000280)="7e87bcd372c63f55343ce3ba22d1ab16cba12a9e15ad8840af2a4bc354644d08e097a2e00854959d93345a10d39f4a0ee933fdfd93e8df429f8453e4ffb3e42d584b7bf4d7ffc663d026a1f2bc7966a3383ebf9397bbb699f83b2170df3c4d2b8d2e995338f7983e90a55f4bc22de30e065ce0f4ea139013e7cda4278935e5de992758ba33322e6c067d8d130633a04bc0aa75bf99da44467f65c0ab97deab0eedcdbeb0d9c6733edb4351911d57032dc4b4aef45637d7f101c1aac7202abffe6a909262", 0xc4}, {&(0x7f0000000380)="2cf27e5845d1a3e5d7c70eb9cf538c58cf288e785eca99", 0x17}], 0x3) 01:31:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f00000000c0)={{0x3, 0x3, 0x6, 0x1, 0x1}, 0x0, 0x8eb, 'id1\x00', 'timer0\x00', 0x0, 0x4, 0x9, 0x1, 0x9a8}) close(r0) 01:31:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc6, &(0x7f0000000040)) 01:31:37 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff00005460, &(0x7f0000000100)) 01:31:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x41, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 315.150674] device lo entered promiscuous mode [ 315.188939] device lo left promiscuous mode [ 315.203302] device lo entered promiscuous mode [ 315.208881] device lo left promiscuous mode 01:31:37 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff40049409, &(0x7f0000000100)) 01:31:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0xfffffffffffffffc, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000280)={0x18, 0x1, 0x0, {0x5}}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/keycreate\x00') r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x3ff, 0x1fc) keyctl$set_reqkey_keyring(0xe, 0x7) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r4, 0x200, 0x70bd2a, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}}, 0x24000001) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000000c0)={0x1, r3}) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000080)={0x3, 0x3, 0x4, {0x8000, 0x0, 0x1000, 0x9}}) 01:31:37 executing program 3 (fault-call:2 fault-nth:0): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:37 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @local}}, 0x2fc4, 0x1f, 0x4af, 0x4, 0x40}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000001c0)={r2, 0x7}, &(0x7f0000000200)=0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @dev}, 0x10) close(r0) bind$bt_hci(r1, &(0x7f0000000240)={0x1f, r3, 0x3}, 0xc) 01:31:37 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffff4020940d, &(0x7f0000000100)) 01:31:37 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f00000000c0)={0x11, 0x10, r2, 0x1, 0x7, 0x6, @remote}, 0x14) [ 315.431602] device lo entered promiscuous mode [ 315.437233] device lo left promiscuous mode [ 315.472047] device lo entered promiscuous mode [ 315.477377] FAULT_INJECTION: forcing a failure. [ 315.477377] name failslab, interval 1, probability 0, space 0, times 0 01:31:37 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xc0045878, &(0x7f0000000100)) [ 315.513721] CPU: 1 PID: 10966 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 315.520957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.530327] Call Trace: [ 315.532935] dump_stack+0x1db/0x2d0 [ 315.536587] ? dump_stack_print_info.cold+0x20/0x20 [ 315.541617] ? mark_held_locks+0x100/0x100 [ 315.545858] should_fail.cold+0xa/0x15 [ 315.549750] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 315.554877] ? ___might_sleep+0x1e7/0x310 [ 315.559035] ? arch_local_save_flags+0x50/0x50 [ 315.563628] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.569245] ? iov_iter_alignment+0x234/0xcf0 [ 315.573763] __should_failslab+0x121/0x190 [ 315.578001] should_failslab+0x9/0x14 [ 315.581799] kmem_cache_alloc+0x2be/0x710 [ 315.585961] ? mark_held_locks+0x100/0x100 [ 315.588687] device lo left promiscuous mode [ 315.590216] ? print_usage_bug+0xd0/0xd0 [ 315.598643] do_blockdev_direct_IO+0x5a5/0xdc10 [ 315.603325] ? print_usage_bug+0xd0/0xd0 [ 315.607391] ? print_usage_bug+0xd0/0xd0 [ 315.611451] ? rcu_read_unlock_special+0x380/0x380 [ 315.616381] ? add_lock_to_list.isra.0+0x450/0x450 [ 315.621297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.626824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.632351] ? check_preemption_disabled+0x48/0x290 [ 315.637356] ? add_lock_to_list.isra.0+0x450/0x450 [ 315.642288] ? __lock_is_held+0xb6/0x140 [ 315.646417] ? write_end_fn+0xf0/0xf0 [ 315.650212] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 315.655841] ? sb_init_dio_done_wq+0x90/0x90 [ 315.660242] ? ___might_sleep+0x1e7/0x310 [ 315.664384] ? __might_sleep+0x95/0x190 [ 315.668392] ? __find_get_block+0xf20/0xf20 [ 315.672703] ? mark_held_locks+0x100/0x100 [ 315.676927] ? __lock_acquire+0x572/0x4a30 [ 315.681152] ? print_usage_bug+0xd0/0xd0 [ 315.685210] ? rcu_read_unlock_special+0x380/0x380 [ 315.690127] ? print_usage_bug+0xd0/0xd0 [ 315.694190] ? mark_held_locks+0x100/0x100 [ 315.698446] ? __lock_acquire+0x572/0x4a30 [ 315.702684] ? add_lock_to_list.isra.0+0x450/0x450 [ 315.707601] ? mark_held_locks+0x100/0x100 [ 315.711824] ? __brelse+0x105/0x180 [ 315.715439] ? add_lock_to_list.isra.0+0x450/0x450 [ 315.720353] ? __lock_is_held+0xb6/0x140 [ 315.724404] ? ext4_direct_IO+0xfee/0x2090 [ 315.728634] ? find_held_lock+0x35/0x120 [ 315.732692] ? ext4_direct_IO+0xfee/0x2090 [ 315.736930] ? lock_acquire+0x1db/0x570 [ 315.740900] ? lock_downgrade+0x910/0x910 [ 315.745044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.750565] ? ext4_journal_check_start+0x188/0x230 [ 315.755584] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 315.761217] __blockdev_direct_IO+0xa1/0xca [ 315.765526] ? write_end_fn+0xf0/0xf0 [ 315.769323] ext4_direct_IO+0x10a3/0x2090 [ 315.773473] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 315.779091] ? ext4_iomap_end+0x7e0/0x7e0 [ 315.783229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.788751] ? file_remove_privs+0x213/0x500 [ 315.793159] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 315.798774] ? filemap_check_errors+0xd8/0x110 [ 315.803373] generic_file_direct_write+0x214/0x4b0 [ 315.808296] __generic_file_write_iter+0x2ee/0x630 [ 315.813220] ext4_file_write_iter+0x37a/0x1410 [ 315.817789] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.823315] ? ext4_file_mmap+0x410/0x410 [ 315.827450] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 315.832717] ? rcu_read_unlock_special+0x380/0x380 [ 315.837638] ? __fget+0x499/0x710 [ 315.841083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.846609] ? iov_iter_init+0xea/0x220 [ 315.850584] __vfs_write+0x764/0xb40 [ 315.854297] ? check_preemption_disabled+0x48/0x290 [ 315.859317] ? kernel_read+0x120/0x120 [ 315.863223] ? rcu_read_lock_sched_held+0x110/0x130 [ 315.868237] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 315.872981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.878503] ? __sb_start_write+0x1ac/0x360 [ 315.882812] vfs_write+0x20c/0x580 [ 315.886345] ksys_pwrite64+0x183/0x1c0 [ 315.890227] ? __ia32_sys_pread64+0xf0/0xf0 [ 315.894536] ? __ia32_sys_read+0xb0/0xb0 [ 315.898597] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.903954] ? trace_hardirqs_off_caller+0x300/0x300 [ 315.909063] __x64_sys_pwrite64+0x97/0xf0 [ 315.913220] do_syscall_64+0x1a3/0x800 [ 315.917111] ? syscall_return_slowpath+0x5f0/0x5f0 [ 315.922053] ? prepare_exit_to_usermode+0x232/0x3b0 [ 315.927059] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.931910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.937096] RIP: 0033:0x458099 [ 315.940276] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:31:38 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xe4, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) memfd_create(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1) [ 315.959177] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 315.966884] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 315.974149] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 315.981403] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 315.988655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 315.995907] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:31:38 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x226) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x48, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:38 executing program 3 (fault-call:2 fault-nth:1): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:31:38 executing program 2: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$RTC_AIE_OFF(r0, 0x7002) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xfffffffffffffec2, &(0x7f0000000040)="db7cf6bf36d040cc06c82711f0b1e654580e84ba257b8f571be29a3dea5a7a31e5ae495fc7d792801633debc640ed99a9a8c36b9717f585edc1ff25063354b44c72d080cd8d22de1c1d4a47346e582aff3676c4acb906324afed8dd74586f08a14bd13c36bc14b089cd58e253fb5537ed65be08f3080327cc26192a5f58a1f6d2012fd5e320aa858ba66cdf483fa6243a16ac582967eed9084ea83af8b00c5f32340b8cd1239c9922194f32ae8ad8576c8481b4514833095477bde7c887cb55e45a10d4030d65c") 01:31:38 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc0045878, &(0x7f0000000100)) [ 316.240364] FAULT_INJECTION: forcing a failure. [ 316.240364] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 316.252219] CPU: 1 PID: 10984 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 316.259410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.268768] Call Trace: [ 316.269090] device lo entered promiscuous mode [ 316.271465] dump_stack+0x1db/0x2d0 [ 316.271494] ? dump_stack_print_info.cold+0x20/0x20 [ 316.280873] device lo left promiscuous mode [ 316.284690] ? __lock_acquire+0x572/0x4a30 [ 316.284716] should_fail.cold+0xa/0x15 [ 316.284737] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.302248] ? print_usage_bug+0xd0/0xd0 [ 316.306336] ? print_usage_bug+0xd0/0xd0 [ 316.310419] should_fail_alloc_page+0x50/0x60 [ 316.314921] __alloc_pages_nodemask+0x323/0xdc0 [ 316.319599] ? mark_held_locks+0x100/0x100 [ 316.323852] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 316.328979] ? ___might_sleep+0x1e7/0x310 [ 316.333143] ? trace_hardirqs_off+0xb8/0x310 [ 316.337563] cache_grow_begin+0x9c/0x8c0 [ 316.341632] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.347179] ? check_preemption_disabled+0x48/0x290 [ 316.352213] kmem_cache_alloc+0x645/0x710 [ 316.356347] ? print_usage_bug+0xd0/0xd0 [ 316.360417] do_blockdev_direct_IO+0x5a5/0xdc10 [ 316.365094] ? __lock_acquire+0x572/0x4a30 [ 316.369332] ? add_lock_to_list.isra.0+0x450/0x450 [ 316.374261] ? mark_held_locks+0x100/0x100 [ 316.378491] ? __lock_is_held+0xb6/0x140 [ 316.382564] ? add_lock_to_list.isra.0+0x450/0x450 [ 316.387492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.393012] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.398656] ? check_preemption_disabled+0x48/0x290 [ 316.403685] ? write_end_fn+0xf0/0xf0 [ 316.407498] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 316.413136] ? sb_init_dio_done_wq+0x90/0x90 [ 316.417532] ? __lock_is_held+0xb6/0x140 [ 316.421612] ? arch_local_save_flags+0x50/0x50 [ 316.426209] ? __ext4_handle_dirty_metadata+0x1e3/0x570 [ 316.431564] ? __lock_acquire+0x572/0x4a30 [ 316.435792] ? mark_held_locks+0x100/0x100 [ 316.440024] ? __might_sleep+0x95/0x190 [ 316.444009] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.449549] ? __ext4_journal_get_write_access+0x70/0xa0 [ 316.455000] ? add_lock_to_list.isra.0+0x450/0x450 [ 316.459926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.465477] ? ext4_mark_inode_dirty+0x257/0xb80 [ 316.470249] ? add_lock_to_list.isra.0+0x450/0x450 [ 316.475174] ? __lock_is_held+0xb6/0x140 [ 316.479253] ? ext4_direct_IO+0xfee/0x2090 [ 316.483523] ? find_held_lock+0x35/0x120 [ 316.487592] ? ext4_direct_IO+0xfee/0x2090 [ 316.491825] ? lock_acquire+0x1db/0x570 [ 316.495798] ? lock_downgrade+0x910/0x910 [ 316.499957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.505504] ? ext4_journal_check_start+0x188/0x230 [ 316.510569] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 316.516232] __blockdev_direct_IO+0xa1/0xca [ 316.520565] ? write_end_fn+0xf0/0xf0 [ 316.524376] ext4_direct_IO+0x10a3/0x2090 [ 316.528537] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 316.534161] ? ext4_iomap_end+0x7e0/0x7e0 [ 316.538306] ? generic_update_time+0x268/0x440 [ 316.542991] ? file_remove_privs+0x500/0x500 [ 316.547398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.552921] ? preempt_count_add+0xbc/0x1b0 [ 316.557317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.562856] ? __mnt_drop_write+0x5d/0x80 [ 316.567005] ? __mnt_drop_write_file+0x31/0x40 [ 316.571592] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 316.577117] ? filemap_check_errors+0xd8/0x110 [ 316.581709] generic_file_direct_write+0x214/0x4b0 [ 316.587192] __generic_file_write_iter+0x2ee/0x630 [ 316.592123] ext4_file_write_iter+0x37a/0x1410 [ 316.596695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.602255] ? ext4_file_mmap+0x410/0x410 [ 316.606412] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 316.611687] ? rcu_read_unlock_special+0x380/0x380 [ 316.616626] ? __fget+0x499/0x710 [ 316.620094] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.625640] ? iov_iter_init+0xea/0x220 [ 316.629617] __vfs_write+0x764/0xb40 [ 316.633320] ? check_preemption_disabled+0x48/0x290 [ 316.638337] ? kernel_read+0x120/0x120 [ 316.642258] ? rcu_read_lock_sched_held+0x110/0x130 [ 316.647283] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 316.652051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.657569] ? __sb_start_write+0x1ac/0x360 [ 316.661896] vfs_write+0x20c/0x580 [ 316.665455] ksys_pwrite64+0x183/0x1c0 [ 316.669361] ? __ia32_sys_pread64+0xf0/0xf0 [ 316.673669] ? __ia32_sys_read+0xb0/0xb0 [ 316.677730] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.683102] ? trace_hardirqs_off_caller+0x300/0x300 [ 316.688232] __x64_sys_pwrite64+0x97/0xf0 [ 316.692400] do_syscall_64+0x1a3/0x800 [ 316.696283] ? syscall_return_slowpath+0x5f0/0x5f0 [ 316.701221] ? prepare_exit_to_usermode+0x232/0x3b0 [ 316.706255] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.711100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.716284] RIP: 0033:0x458099 [ 316.719475] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:31:39 executing program 2: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000000c0)=0x4) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x80040, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000)=0x3a, 0x4) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000280)="fc3f0fbaaca0c39e6e5a1ee2aca175c1b5ba6caeec2d19a66af4d19a5a3a9ec2041c827c7be870645f216e7e7b311ecc070b61f56ceaf9d8c62c32068926ee490eded8f9b6e57e168f344bb7a52e62ce22aaa644950cf9cc94dc87abd98744b60eba635a1f12553c2d122cd2ee69b827a46b9a9c58c0631f3845a882782b094927ec9af6b8033c7e9d840bd0c1ccd51145fdebc516a7e007f4d0450c", 0x9c}, {&(0x7f0000000340)="df21274f63613838460be076f70a3670c95f9b781b34705dfd108be91e4f648d9aed3ecdeb039408e138e3479234d93d03b34783cdcdfbc36a47549d169b931456463706a3a939ec5a6b3cc9909a6e930ca4ae24abab4431a8fd36dd0b8832667185504022e15b9309894a612eab609a3a7e967cfa1527d2a84cb8b9e5ba3f228bf59476d1bcc5c8b432a1ad431ab3987be2f66de6b2c72c3792682e4751a913dfa0ab7ea7dbee9aed403277fd96ed4b9d379cb61d80a66f93d3a3", 0xbb}, {&(0x7f0000000400)="f137fea4b1d0e5fae88bd027756bb72c0b040617a15f58e53e7f764f2a705edc96c2738e715f1e97ba04058afdc83f0065bb8e34ab9b25f77ef760bf55521d098b5ef6a53827d4739c1da8501016598f21c5025b00a4d8df17967ee71920a7ce666cc5154f2a1c4c76b5e21db410a35d8bec974613a50f82", 0x78}], 0x3) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000140)) r2 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x40) ioctl(r2, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000200)={0x5, 0x811, 0x0, 0x5, 0x1, 0x1}) 01:31:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc0189436, &(0x7f0000000100)) [ 316.738383] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 316.746096] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 316.753361] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 316.760628] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 316.767913] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 316.775174] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:31:39 executing program 3 (fault-call:2 fault-nth:2): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 316.790940] device lo entered promiscuous mode [ 316.796078] device lo left promiscuous mode 01:31:39 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r0, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r0, 0x3, 0x350, @dev}, 0x10) accept$netrom(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sco\x00') setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000240)=0x1, 0x4) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) close(r2) prctl$PR_CAPBSET_READ(0x17, 0x8) 01:31:39 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:39 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffc020660b, &(0x7f0000000100)) 01:31:39 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80000) restart_syscall() accept$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) [ 316.957955] FAULT_INJECTION: forcing a failure. [ 316.957955] name failslab, interval 1, probability 0, space 0, times 0 [ 316.969712] CPU: 1 PID: 11020 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 316.976908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.986263] Call Trace: [ 316.988869] dump_stack+0x1db/0x2d0 [ 316.992513] ? dump_stack_print_info.cold+0x20/0x20 [ 316.997540] ? __lock_acquire+0x572/0x4a30 [ 317.001801] should_fail.cold+0xa/0x15 [ 317.005703] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.010813] ? mark_held_locks+0x100/0x100 [ 317.015057] ? rcu_softirq_qs+0x20/0x20 [ 317.019074] ? kernel_text_address+0x73/0xf0 [ 317.023559] ? __kernel_text_address+0xd/0x40 [ 317.028071] __should_failslab+0x121/0x190 [ 317.032315] should_failslab+0x9/0x14 [ 317.036129] kmem_cache_alloc+0x47/0x710 [ 317.040204] ? __es_remove_extent+0x871/0xb30 [ 317.044723] __es_insert_extent+0x366/0x1190 [ 317.049189] ? ext4_es_free_extent+0x770/0x770 [ 317.053800] ? do_raw_read_unlock+0x70/0x70 [ 317.058125] ? __lock_is_held+0xb6/0x140 [ 317.062222] ext4_es_insert_extent+0x369/0xc80 [ 317.066825] ? ext4_es_scan_clu+0x50/0x50 [ 317.071106] ? ext4_es_init_tree+0x70/0x70 [ 317.075370] ext4_ext_put_gap_in_cache+0x176/0x200 [ 317.080309] ? ext4_rereserve_cluster+0x240/0x240 [ 317.085157] ? ext4_find_extent+0x76e/0x9d0 [ 317.089505] ? ext4_find_extent+0x6a6/0x9d0 [ 317.093848] ext4_ext_map_blocks+0x2ab8/0x60a0 [ 317.098459] ? ext4_ext_release+0x10/0x10 [ 317.102618] ? check_preemption_disabled+0x48/0x290 [ 317.107647] ? __lock_is_held+0xb6/0x140 [ 317.111712] ? lock_acquire+0x1db/0x570 [ 317.115671] ? ext4_map_blocks+0x496/0x1bb0 [ 317.119995] ? ___might_sleep+0x1e7/0x310 [ 317.124142] ? lock_release+0xc40/0xc40 [ 317.128102] ? ext4_es_lookup_extent+0x478/0xdd0 [ 317.132861] ? down_read+0x8d/0x120 [ 317.136520] ? ext4_map_blocks+0x496/0x1bb0 [ 317.140837] ? __down_interruptible+0x740/0x740 [ 317.145501] ? ext4_direct_IO+0x10a3/0x2090 [ 317.149811] ? generic_file_direct_write+0x214/0x4b0 [ 317.154909] ? __generic_file_write_iter+0x2ee/0x630 [ 317.160024] ext4_map_blocks+0xf90/0x1bb0 [ 317.164175] ? ext4_issue_zeroout+0x170/0x170 [ 317.168687] ? iov_iter_get_pages+0x34c/0x1290 [ 317.173269] ? check_preemption_disabled+0x48/0x290 [ 317.178286] ? do_blockdev_direct_IO+0x5a5/0xdc10 [ 317.183142] _ext4_get_block+0x245/0x7a0 [ 317.187222] ? iov_iter_npages+0x289/0xf20 [ 317.191479] ? ext4_map_blocks+0x1bb0/0x1bb0 [ 317.195882] ? blk_start_plug+0xb5/0x340 [ 317.199945] ? iov_iter_npages+0xf20/0xf20 [ 317.204186] ext4_dio_get_block+0xa3/0xc0 [ 317.208349] do_blockdev_direct_IO+0x3822/0xdc10 [ 317.213116] ? print_usage_bug+0xd0/0xd0 [ 317.217184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.222755] ? sb_init_dio_done_wq+0x90/0x90 [ 317.227181] ? ___might_sleep+0x1e7/0x310 [ 317.231331] ? __might_sleep+0x95/0x190 [ 317.235295] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 317.240931] ? __find_get_block+0xf20/0xf20 [ 317.245252] ? mark_held_locks+0x100/0x100 [ 317.249490] ? __lock_acquire+0x572/0x4a30 [ 317.253722] ? print_usage_bug+0xd0/0xd0 [ 317.257785] ? rcu_read_unlock_special+0x380/0x380 [ 317.262712] ? print_usage_bug+0xd0/0xd0 [ 317.266776] ? mark_held_locks+0x100/0x100 [ 317.270997] ? __lock_acquire+0x572/0x4a30 [ 317.275242] ? add_lock_to_list.isra.0+0x450/0x450 [ 317.280171] ? mark_held_locks+0x100/0x100 [ 317.284413] ? __brelse+0x105/0x180 [ 317.288026] ? add_lock_to_list.isra.0+0x450/0x450 [ 317.292958] ? __lock_is_held+0xb6/0x140 [ 317.297021] ? ext4_direct_IO+0xfee/0x2090 [ 317.301256] ? find_held_lock+0x35/0x120 [ 317.305316] ? ext4_direct_IO+0xfee/0x2090 [ 317.309538] ? lock_acquire+0x1db/0x570 [ 317.313512] ? lock_downgrade+0x910/0x910 [ 317.317661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.323205] ? ext4_journal_check_start+0x188/0x230 [ 317.328245] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 317.333887] __blockdev_direct_IO+0xa1/0xca [ 317.338232] ? write_end_fn+0xf0/0xf0 [ 317.342046] ext4_direct_IO+0x10a3/0x2090 [ 317.346190] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 317.351833] ? ext4_iomap_end+0x7e0/0x7e0 [ 317.355981] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.361514] ? file_remove_privs+0x213/0x500 [ 317.365919] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 317.371449] ? filemap_check_errors+0xd8/0x110 [ 317.376030] generic_file_direct_write+0x214/0x4b0 [ 317.380979] __generic_file_write_iter+0x2ee/0x630 [ 317.385911] ext4_file_write_iter+0x37a/0x1410 [ 317.390482] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.396013] ? ext4_file_mmap+0x410/0x410 [ 317.400165] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 317.405449] ? rcu_read_unlock_special+0x380/0x380 [ 317.410372] ? __fget+0x499/0x710 [ 317.413812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 317.419349] ? iov_iter_init+0xea/0x220 [ 317.423337] __vfs_write+0x764/0xb40 [ 317.427046] ? check_preemption_disabled+0x48/0x290 [ 317.432047] ? kernel_read+0x120/0x120 [ 317.435939] ? rcu_read_lock_sched_held+0x110/0x130 [ 317.441098] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 317.445850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.451376] ? __sb_start_write+0x1ac/0x360 [ 317.455688] vfs_write+0x20c/0x580 [ 317.459244] ksys_pwrite64+0x183/0x1c0 [ 317.463140] ? __ia32_sys_pread64+0xf0/0xf0 [ 317.467460] ? __ia32_sys_read+0xb0/0xb0 [ 317.471516] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.476868] ? trace_hardirqs_off_caller+0x300/0x300 [ 317.481984] __x64_sys_pwrite64+0x97/0xf0 [ 317.486132] do_syscall_64+0x1a3/0x800 [ 317.490009] ? syscall_return_slowpath+0x5f0/0x5f0 [ 317.494941] ? prepare_exit_to_usermode+0x232/0x3b0 [ 317.499959] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.504849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.510124] RIP: 0033:0x458099 [ 317.513304] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.532212] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 317.539946] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 317.547254] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 317.554508] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 317.561768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 317.569039] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:31:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x5, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:39 executing program 3 (fault-call:2 fault-nth:3): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc9, &(0x7f0000000100)) [ 317.835004] EXT4-fs: 11 callbacks suppressed [ 317.835014] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 317.847970] device lo entered promiscuous mode [ 317.862808] device lo left promiscuous mode 01:31:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) [ 317.886645] FAULT_INJECTION: forcing a failure. [ 317.886645] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 317.905792] device lo entered promiscuous mode [ 317.912726] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:40 executing program 2: ioctl(0xffffffffffffffff, 0xffffffffffffffc3, &(0x7f00000003c0)) socket$unix(0x1, 0x7, 0x0) 01:31:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 317.936360] device lo left promiscuous mode [ 317.943806] CPU: 0 PID: 11033 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 317.951009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.960368] Call Trace: [ 317.962976] dump_stack+0x1db/0x2d0 [ 317.966622] ? dump_stack_print_info.cold+0x20/0x20 [ 317.971648] ? __lock_is_held+0xb6/0x140 [ 317.975701] should_fail.cold+0xa/0x15 [ 317.979577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.984671] ? arch_local_save_flags+0x50/0x50 [ 317.989238] ? lock_release+0xc40/0xc40 [ 317.993202] ? lock_downgrade+0x910/0x910 [ 317.997339] should_fail_alloc_page+0x50/0x60 [ 318.001817] __alloc_pages_nodemask+0x323/0xdc0 [ 318.006478] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 318.011495] ? __ext4_handle_dirty_metadata+0x1e3/0x570 [ 318.016855] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 318.022438] alloc_pages_current+0x107/0x210 [ 318.026837] __page_cache_alloc+0x3cd/0x620 [ 318.031144] ? __filemap_set_wb_err+0x3f0/0x3f0 [ 318.035798] ? mark_held_locks+0x100/0x100 [ 318.040037] pagecache_get_page+0x36e/0x1020 [ 318.044437] ? __ext4_journal_get_write_access+0x70/0xa0 [ 318.049872] ? add_to_page_cache_lru+0xd20/0xd20 [ 318.054612] ? ext4_mark_inode_dirty+0x257/0xb80 [ 318.059356] ? add_lock_to_list.isra.0+0x450/0x450 [ 318.064288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.069807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.075333] ? check_preemption_disabled+0x48/0x290 [ 318.080337] ? __lock_is_held+0xb6/0x140 [ 318.084388] grab_cache_page_write_begin+0x75/0xb0 [ 318.089307] ext4_da_write_begin+0x360/0x12d0 [ 318.093792] ? ext4_write_begin+0x1810/0x1810 [ 318.098270] ? __lock_is_held+0xb6/0x140 [ 318.102320] ? rcu_read_lock_sched_held+0x110/0x130 [ 318.107319] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 318.112839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 318.118366] ? iov_iter_fault_in_readable+0x22c/0x450 [ 318.123543] ? copy_page_from_iter+0x900/0x900 [ 318.128128] generic_perform_write+0x2a0/0x6b0 [ 318.132720] ? add_page_wait_queue+0x480/0x480 [ 318.137294] ? generic_file_direct_write+0x37c/0x4b0 [ 318.142387] __generic_file_write_iter+0x4b3/0x630 [ 318.147308] ext4_file_write_iter+0x37a/0x1410 [ 318.151878] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.157411] ? ext4_file_mmap+0x410/0x410 [ 318.161560] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 318.166838] ? rcu_read_unlock_special+0x380/0x380 [ 318.171810] ? __fget+0x499/0x710 [ 318.175259] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 318.180780] ? iov_iter_init+0xea/0x220 [ 318.184740] __vfs_write+0x764/0xb40 [ 318.188443] ? check_preemption_disabled+0x48/0x290 [ 318.193443] ? kernel_read+0x120/0x120 [ 318.197321] ? rcu_read_lock_sched_held+0x110/0x130 [ 318.202322] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 318.207076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.212596] ? __sb_start_write+0x1ac/0x360 [ 318.216901] vfs_write+0x20c/0x580 [ 318.220429] ksys_pwrite64+0x183/0x1c0 [ 318.224302] ? __ia32_sys_pread64+0xf0/0xf0 [ 318.228619] ? __ia32_sys_read+0xb0/0xb0 [ 318.232675] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.238022] ? trace_hardirqs_off_caller+0x300/0x300 [ 318.243112] __x64_sys_pwrite64+0x97/0xf0 [ 318.247256] do_syscall_64+0x1a3/0x800 [ 318.251129] ? syscall_return_slowpath+0x5f0/0x5f0 [ 318.256043] ? prepare_exit_to_usermode+0x232/0x3b0 [ 318.261046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.265886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.271077] RIP: 0033:0x458099 [ 318.274253] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.293154] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 318.300844] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 318.308112] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 318.315376] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 318.322627] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 318.329879] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:31:40 executing program 3 (fault-call:2 fault-nth:4): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:40 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xaff, 0x40) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'netdevsim0\x00', 0x0}) sendmsg$kcm(r1, &(0x7f0000001340)={&(0x7f0000000100)=@hci={0x1f, r2, 0x2}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000180)="1ec7b905134e782f077408eaf35260d750427cf241ab15bdeab90322622a8a92146720234ac3993d896acd4a7260da9e435612b14df047676ab9b7cbf3d427803117ca0a42bfb5032b00086e83703a60ba86f020542b486195519e238f1d2c051144a780eef0ac48b4426a01af2ff894f6b95b8a6980c0721b05ce12a51cad3ccf9cd7e35a43935f62c73325563620", 0x8f}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000240)="d0ca3a51a3d41dfd58c5c0f420eabee12638356170387451dbf4403a5dd6ebb07014ae49962f0b64ad473808b3d323ef09ff0f51de023e7cdea4a02737b2927f9321b9118278a84d7cb4e05cfdf6e183c4fcf277fda55ca823362e528d082205d7", 0x61}], 0x3}, 0x8004) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @dev}, 0x10) close(r0) [ 318.422503] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 318.505283] FAULT_INJECTION: forcing a failure. [ 318.505283] name failslab, interval 1, probability 0, space 0, times 0 [ 318.516604] CPU: 1 PID: 11070 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 318.523820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.533173] Call Trace: [ 318.535807] dump_stack+0x1db/0x2d0 [ 318.539455] ? dump_stack_print_info.cold+0x20/0x20 [ 318.544493] should_fail.cold+0xa/0x15 [ 318.548393] ? fault_create_debugfs_attr+0x1e0/0x1e0 01:31:40 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x10000000000000) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) 01:31:40 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x2, [{}, {}]}, 0x48) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0x19, 0x4) 01:31:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x60, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 318.553512] ? mark_held_locks+0x100/0x100 [ 318.557762] ? find_held_lock+0x35/0x120 [ 318.561889] ? __dquot_alloc_space+0x54a/0x8b0 [ 318.566517] __should_failslab+0x121/0x190 [ 318.570787] should_failslab+0x9/0x14 [ 318.575106] kmem_cache_alloc+0x47/0x710 [ 318.579211] ? __es_remove_extent+0x871/0xb30 [ 318.583745] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 318.588768] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 318.593549] __es_insert_extent+0x366/0x1190 [ 318.597987] ? ext4_es_free_extent+0x770/0x770 [ 318.602590] ? do_raw_read_unlock+0x70/0x70 [ 318.606921] ? __lock_is_held+0xb6/0x140 [ 318.611499] ext4_es_insert_delayed_block+0x28e/0x710 [ 318.616704] ? ext4_is_pending+0x220/0x220 [ 318.618615] device lo entered promiscuous mode [ 318.620947] ? _raw_spin_unlock+0x2d/0x50 [ 318.629297] device lo left promiscuous mode [ 318.629704] ? ext4_da_reserve_space+0x166/0x6c0 [ 318.638757] ? ext4_update_bh_state+0x210/0x210 [ 318.643433] ? down_read+0x8d/0x120 [ 318.647057] ? ext4_da_get_block_prep+0xe12/0x1570 [ 318.651988] ? __down_interruptible+0x740/0x740 [ 318.656676] ext4_da_get_block_prep+0x9ce/0x1570 [ 318.661453] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 318.667072] ? create_page_buffers+0x2a3/0x610 [ 318.671641] ? create_empty_buffers+0xd80/0xd80 [ 318.676300] ? alloc_pages_current+0x10f/0x210 [ 318.680888] ? __page_cache_alloc+0x19c/0x620 [ 318.685852] ? print_usage_bug+0xd0/0xd0 [ 318.689920] __block_write_begin_int+0x605/0x2010 [ 318.694764] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 318.700406] ? __breadahead+0x160/0x160 [ 318.704402] ? ___might_sleep+0x1e7/0x310 [ 318.708555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.714107] ? wait_for_stable_page+0x192/0x570 [ 318.718785] ? arch_local_save_flags+0x50/0x50 [ 318.723378] ? set_page_dirty_lock+0x1a0/0x1a0 [ 318.727955] ? __lock_is_held+0xb6/0x140 [ 318.732017] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 318.737632] __block_write_begin+0x31/0x40 [ 318.741886] ext4_da_write_begin+0x622/0x12d0 [ 318.746432] ? ext4_write_begin+0x1810/0x1810 [ 318.750932] ? __lock_is_held+0xb6/0x140 [ 318.755046] ? rcu_read_lock_sched_held+0x110/0x130 [ 318.760086] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 318.765617] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 318.771144] ? iov_iter_fault_in_readable+0x22c/0x450 [ 318.776333] ? copy_page_from_iter+0x900/0x900 [ 318.780939] generic_perform_write+0x2a0/0x6b0 [ 318.785541] ? add_page_wait_queue+0x480/0x480 [ 318.790140] ? generic_file_direct_write+0x37c/0x4b0 [ 318.795278] __generic_file_write_iter+0x4b3/0x630 [ 318.800235] ext4_file_write_iter+0x37a/0x1410 [ 318.804830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.810384] ? ext4_file_mmap+0x410/0x410 [ 318.814518] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 318.819794] ? rcu_read_unlock_special+0x380/0x380 [ 318.824739] ? __fget+0x499/0x710 [ 318.828220] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 318.833767] ? iov_iter_init+0xea/0x220 [ 318.837741] __vfs_write+0x764/0xb40 [ 318.841452] ? check_preemption_disabled+0x48/0x290 [ 318.846471] ? kernel_read+0x120/0x120 [ 318.850370] ? rcu_read_lock_sched_held+0x110/0x130 [ 318.855399] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 318.860157] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.865743] ? __sb_start_write+0x1ac/0x360 [ 318.870100] vfs_write+0x20c/0x580 [ 318.873649] ksys_pwrite64+0x183/0x1c0 [ 318.877523] ? __ia32_sys_pread64+0xf0/0xf0 [ 318.881841] ? __ia32_sys_read+0xb0/0xb0 [ 318.885930] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.891299] ? trace_hardirqs_off_caller+0x300/0x300 [ 318.896415] __x64_sys_pwrite64+0x97/0xf0 [ 318.900561] do_syscall_64+0x1a3/0x800 [ 318.904461] ? syscall_return_slowpath+0x5f0/0x5f0 [ 318.909410] ? prepare_exit_to_usermode+0x232/0x3b0 [ 318.914425] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.919277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.924480] RIP: 0033:0x458099 [ 318.927670] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.946556] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 318.954250] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 318.961511] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 318.968783] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 318.976049] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 318.983318] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:31:41 executing program 3 (fault-call:2 fault-nth:5): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 319.038410] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 319.047076] device lo entered promiscuous mode [ 319.068776] device lo left promiscuous mode 01:31:41 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x2) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:41 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000000c0)={0x4, "e33c7b8b5bce1316e6895165784a7a1c6bf851ec61b87d774517c1fcc01544ef", 0x3, 0x80, 0x3, 0x7, 0x1e, 0x3, 0x7, 0x1c}) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @multicast1}, &(0x7f0000000180)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', r3}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r4, 0x3, 0x6, @dev}, 0x10) close(r2) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0xfff, 0x9, 0x6, 0x81, 0x7, 0x5, 0x7fff, {0x0, @in6={{0xa, 0x4e20, 0x59d1a52a, @dev={0xfe, 0x80, [], 0x22}, 0x3}}, 0x1ff, 0x2, 0x54, 0x9, 0x1}}, &(0x7f0000000280)=0xb0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000300)={r5, 0x55, "e9505d4a32afebdfeaba42aee6935c7574772cbb0e7701bb02753b2a8f98a096e8e33f64fb153c656562d02f70efa57500aa437e98f28b959efdaf6774395d1b8e69953d1019b4be89513afcc8f25428573d3b50b0"}, &(0x7f0000000380)=0x5d) 01:31:41 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) gettid() openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20c000, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000080)={0x5, 0xe57}) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 319.183192] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 319.210880] FAULT_INJECTION: forcing a failure. [ 319.210880] name failslab, interval 1, probability 0, space 0, times 0 [ 319.225847] CPU: 1 PID: 11095 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 319.233026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.242374] Call Trace: [ 319.244963] dump_stack+0x1db/0x2d0 [ 319.248593] ? dump_stack_print_info.cold+0x20/0x20 [ 319.253606] ? print_usage_bug+0xd0/0xd0 [ 319.257660] should_fail.cold+0xa/0x15 [ 319.261558] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 319.266663] ? ___might_sleep+0x1e7/0x310 [ 319.270800] ? arch_local_save_flags+0x50/0x50 [ 319.275370] ? trace_hardirqs_off_caller+0x300/0x300 [ 319.280477] ? do_raw_spin_trylock+0x270/0x270 [ 319.285059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.290595] __should_failslab+0x121/0x190 [ 319.294820] should_failslab+0x9/0x14 [ 319.298618] kmem_cache_alloc+0x2be/0x710 [ 319.302827] ext4_init_io_end+0x8e/0x220 [ 319.306900] ? ext4_end_io_rsv_work+0x990/0x990 [ 319.311561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.317082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.322636] ? ext4_meta_trans_blocks+0x25c/0x310 [ 319.327480] ext4_writepages+0x134a/0x41a0 [ 319.331709] ? mark_held_locks+0x100/0x100 [ 319.335930] ? balance_dirty_pages_ratelimited+0x6d2/0x2370 [ 319.341656] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 319.346408] ? add_lock_to_list.isra.0+0x450/0x450 [ 319.351324] ? add_lock_to_list.isra.0+0x450/0x450 [ 319.356242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.361782] ? find_held_lock+0x35/0x120 [ 319.365847] ? kasan_check_read+0x11/0x20 [ 319.370000] ? do_raw_spin_unlock+0xa0/0x330 [ 319.374417] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 319.379705] ? do_raw_spin_trylock+0x270/0x270 [ 319.384290] ? _raw_spin_unlock+0x2d/0x50 [ 319.388439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 319.393996] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 319.399272] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 319.404049] do_writepages+0x99/0x1a0 [ 319.407863] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 319.412604] ? do_writepages+0x99/0x1a0 [ 319.416570] __filemap_fdatawrite_range+0x352/0x470 [ 319.421620] ? delete_from_page_cache_batch+0x1690/0x1690 [ 319.427170] filemap_write_and_wait_range+0x4b/0xd0 [ 319.432228] __generic_file_write_iter+0x4ea/0x630 [ 319.437166] ext4_file_write_iter+0x37a/0x1410 [ 319.441979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.447520] ? ext4_file_mmap+0x410/0x410 [ 319.451668] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 319.456945] ? rcu_read_unlock_special+0x380/0x380 [ 319.461904] ? __fget+0x499/0x710 [ 319.465357] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 319.470893] ? iov_iter_init+0xea/0x220 [ 319.474862] __vfs_write+0x764/0xb40 [ 319.478667] ? check_preemption_disabled+0x48/0x290 [ 319.483684] ? kernel_read+0x120/0x120 [ 319.487567] ? rcu_read_lock_sched_held+0x110/0x130 [ 319.492570] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 319.497327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.502862] ? __sb_start_write+0x1ac/0x360 [ 319.507180] vfs_write+0x20c/0x580 [ 319.510737] ksys_pwrite64+0x183/0x1c0 [ 319.514624] ? __ia32_sys_pread64+0xf0/0xf0 [ 319.518956] ? __ia32_sys_read+0xb0/0xb0 [ 319.523025] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.528383] ? trace_hardirqs_off_caller+0x300/0x300 [ 319.533522] __x64_sys_pwrite64+0x97/0xf0 [ 319.537661] do_syscall_64+0x1a3/0x800 [ 319.541562] ? syscall_return_slowpath+0x5f0/0x5f0 [ 319.546498] ? prepare_exit_to_usermode+0x232/0x3b0 [ 319.551521] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 319.556357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.561543] RIP: 0033:0x458099 [ 319.564739] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:31:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 319.583746] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 319.591438] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 319.598706] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 319.605973] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 319.613235] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 319.620510] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 319.683722] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 319.744603] device lo entered promiscuous mode 01:31:42 executing program 3 (fault-call:2 fault-nth:6): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:42 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80000, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000080)="6acd145c2e48e0bb0b7c4cdd2abc5d30cd518758f1e35456b6cdd1d9e2b653fd25317384ecaae376483850ff2724c908eec9d8f98e01fe32bcfc8ba75ecdea50d20355116befe6b5c95cbc8c4a0c7e2fcdf96cd96b73738c2e7094d1c19acfd5de16f5828c6610056b6a7ca0b7b8de42eb07f424c14318d1d448ea37a81599c2d5d0f57a6d18f9502e5a402972d1a1b0bd18ee9b6a72e4dc2c1acefe7b030529029b9c7cfe9f77750a0b0e50aa0b303e3ce2ef7dc452a9db0fcd67d55c37a4f6b105af6eebd23f4e120088a257cf04bc2942140717600e55e425dc51fcc547f9f01dd37f2998aed9cf6b8825ad80a06c75", 0xf1) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000180)={0x4, 0x7, 0x3ff, 0x10001, 0x100000001, 0x20}) [ 319.783506] device lo left promiscuous mode 01:31:42 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl(r0, 0xffffffffffffffc3, &(0x7f0000000080)="63c97fef67cb099093ca32") [ 319.809276] device lo entered promiscuous mode [ 319.849020] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 319.888450] device lo left promiscuous mode 01:31:42 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000080)) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x220300) close(r0) [ 319.896373] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 319.902165] FAULT_INJECTION: forcing a failure. [ 319.902165] name failslab, interval 1, probability 0, space 0, times 0 01:31:42 executing program 2: ioctl(0xffffffffffffffff, 0xffffffffffffffc3, &(0x7f00000003c0)) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000280)={0xdca, 0x0, 0x3ff, 0x7ff, [], [], [], 0x80, 0x7ff, 0xa65, 0x555500000, "7616e9868ca37208000000000000001d"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000080)={0x10000000}) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0xd, &(0x7f00000003c0)="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", 0x1000) bind$alg(r2, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) sendfile(r0, r0, &(0x7f0000000040)=0x7, 0x9) [ 319.944654] CPU: 0 PID: 11121 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 319.951859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.961224] Call Trace: [ 319.963828] dump_stack+0x1db/0x2d0 [ 319.967480] ? dump_stack_print_info.cold+0x20/0x20 [ 319.972518] ? lru_add_drain_cpu+0x1c4/0x520 [ 319.976936] should_fail.cold+0xa/0x15 [ 319.980815] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 319.985911] ? ___might_sleep+0x1e7/0x310 [ 319.990042] ? arch_local_save_flags+0x50/0x50 [ 319.994649] __should_failslab+0x121/0x190 [ 319.998901] should_failslab+0x9/0x14 [ 320.002687] kmem_cache_alloc+0x2be/0x710 [ 320.006829] ext4_init_io_end+0x8e/0x220 [ 320.010882] ? ext4_end_io_rsv_work+0x990/0x990 [ 320.015573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.021125] ext4_writepages+0x147e/0x41a0 [ 320.025369] ? mark_held_locks+0x100/0x100 [ 320.029598] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 320.034355] ? add_lock_to_list.isra.0+0x450/0x450 [ 320.039292] ? add_lock_to_list.isra.0+0x450/0x450 [ 320.044234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.049769] ? kasan_check_read+0x11/0x20 [ 320.053902] ? do_raw_spin_unlock+0xa0/0x330 [ 320.058296] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 320.063556] ? do_raw_spin_trylock+0x270/0x270 [ 320.068144] ? _raw_spin_unlock+0x2d/0x50 [ 320.072286] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 320.077809] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 320.083087] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 320.087850] do_writepages+0x99/0x1a0 [ 320.091662] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 320.096404] ? do_writepages+0x99/0x1a0 [ 320.100369] __filemap_fdatawrite_range+0x352/0x470 [ 320.105371] ? delete_from_page_cache_batch+0x1690/0x1690 [ 320.110905] filemap_write_and_wait_range+0x4b/0xd0 [ 320.115909] __generic_file_write_iter+0x4ea/0x630 [ 320.120829] ext4_file_write_iter+0x37a/0x1410 [ 320.125396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.130923] ? ext4_file_mmap+0x410/0x410 [ 320.135062] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 320.140356] ? rcu_read_unlock_special+0x380/0x380 01:31:42 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(0xffffffffffffffff) [ 320.145290] ? __fget+0x499/0x710 [ 320.148732] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 320.154271] ? iov_iter_init+0xea/0x220 [ 320.158246] __vfs_write+0x764/0xb40 [ 320.161961] ? check_preemption_disabled+0x48/0x290 [ 320.166979] ? kernel_read+0x120/0x120 [ 320.170858] ? rcu_read_lock_sched_held+0x110/0x130 [ 320.175860] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 320.180613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.186150] ? __sb_start_write+0x1ac/0x360 [ 320.190457] vfs_write+0x20c/0x580 [ 320.193994] ksys_pwrite64+0x183/0x1c0 [ 320.197874] ? __ia32_sys_pread64+0xf0/0xf0 [ 320.202180] ? __ia32_sys_read+0xb0/0xb0 [ 320.206237] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.211586] ? trace_hardirqs_off_caller+0x300/0x300 [ 320.216678] __x64_sys_pwrite64+0x97/0xf0 [ 320.220847] do_syscall_64+0x1a3/0x800 [ 320.224721] ? syscall_return_slowpath+0x5f0/0x5f0 [ 320.229650] ? prepare_exit_to_usermode+0x232/0x3b0 [ 320.234654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.239492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.244667] RIP: 0033:0x458099 [ 320.247844] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.266731] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 320.274422] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 320.281687] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 320.288955] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 01:31:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x68, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 320.296220] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 320.303497] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 320.387888] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:42 executing program 3 (fault-call:2 fault-nth:7): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:42 executing program 1: r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0xa0840, 0x0) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f0000000100)) close(r1) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, &(0x7f0000000040)) 01:31:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 320.515833] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:42 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x4000) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000080)=ANY=[@ANYBLOB="e90000008f9cb2e238801288adc36494db4339fa91c47eaa359ceb1cac0489f4675d09e285a4ae79da37ccea7ed37498aab80e32a086a121e4cb31ea110ab04cbe61110b51e38f52e941c00a08b0f6b8251fcb08ae6f63fcfdcc4e8cd910dfd0bc742bc2f74bbb5836b5c4b58bb0c5d2650b6c6e19cecb03bdb88654bf9bea905f9d14bf2585d7862a81c9e64abc9fcf8226d21ca011f43bf3b3378c2689015cad73af6b13e7f1bfa56bf5d80510f43f78e44267a75f03f17b979efc3d353a599ef0e2b99dd07bc7500f7ff8cc2c3ab9a2bbfed1cd780cd15c1e19ccf61ad690273f0ad9981ca0b48b91edbae4"]) [ 320.566373] FAULT_INJECTION: forcing a failure. [ 320.566373] name failslab, interval 1, probability 0, space 0, times 0 [ 320.588555] CPU: 0 PID: 11152 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 320.595768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.605123] Call Trace: [ 320.607732] dump_stack+0x1db/0x2d0 [ 320.611383] ? dump_stack_print_info.cold+0x20/0x20 [ 320.613333] device lo entered promiscuous mode [ 320.616438] ? put_pages_list+0x520/0x520 [ 320.626032] ? find_held_lock+0x35/0x120 [ 320.626056] should_fail.cold+0xa/0x15 [ 320.626075] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.626096] ? ___might_sleep+0x1e7/0x310 [ 320.626112] ? arch_local_save_flags+0x50/0x50 [ 320.626151] __should_failslab+0x121/0x190 [ 320.626170] should_failslab+0x9/0x14 [ 320.626226] __kmalloc+0x2dc/0x740 [ 320.626263] ? ext4_find_extent+0x76e/0x9d0 01:31:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x80, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f0000000080)="4188d5fc0147911bdabfcf98d27d710c000000") [ 320.626281] ext4_find_extent+0x76e/0x9d0 [ 320.632437] device lo left promiscuous mode [ 320.634249] ext4_ext_map_blocks+0x261/0x60a0 [ 320.634284] ? ext4_ext_release+0x10/0x10 [ 320.634301] ? check_preemption_disabled+0x48/0x290 [ 320.634321] ? __lock_is_held+0xb6/0x140 [ 320.690098] ? lock_acquire+0x1db/0x570 [ 320.694063] ? ext4_map_blocks+0x949/0x1bb0 [ 320.698374] ? ___might_sleep+0x1e7/0x310 [ 320.702514] ? lock_release+0xc40/0xc40 [ 320.706496] ? ext4_es_lookup_extent+0x478/0xdd0 [ 320.711268] ? down_write+0x8a/0x130 [ 320.714987] ? ext4_map_blocks+0x949/0x1bb0 [ 320.719323] ? down_read+0x120/0x120 [ 320.723031] ext4_map_blocks+0x9b1/0x1bb0 [ 320.727172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.732698] ? ext4_issue_zeroout+0x170/0x170 [ 320.737180] ? __lock_is_held+0xb6/0x140 [ 320.741255] ext4_writepages+0x2383/0x41a0 [ 320.745504] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 320.750249] ? add_lock_to_list.isra.0+0x450/0x450 [ 320.755167] ? add_lock_to_list.isra.0+0x450/0x450 [ 320.760084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.765622] ? kasan_check_read+0x11/0x20 [ 320.769763] ? do_raw_spin_unlock+0xa0/0x330 [ 320.774175] ? do_raw_spin_trylock+0x270/0x270 [ 320.778784] ? _raw_spin_unlock+0x2d/0x50 [ 320.782943] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 320.788497] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 320.793776] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 320.798521] do_writepages+0x99/0x1a0 [ 320.802324] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 320.807083] ? do_writepages+0x99/0x1a0 [ 320.811053] __filemap_fdatawrite_range+0x352/0x470 [ 320.816068] ? delete_from_page_cache_batch+0x1690/0x1690 [ 320.821630] filemap_write_and_wait_range+0x4b/0xd0 [ 320.826648] __generic_file_write_iter+0x4ea/0x630 [ 320.831571] ext4_file_write_iter+0x37a/0x1410 [ 320.836140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.841669] ? ext4_file_mmap+0x410/0x410 [ 320.845805] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 320.851072] ? rcu_read_unlock_special+0x380/0x380 [ 320.855995] ? __fget+0x499/0x710 [ 320.859438] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 320.864960] ? iov_iter_init+0xea/0x220 [ 320.868941] __vfs_write+0x764/0xb40 [ 320.872685] ? check_preemption_disabled+0x48/0x290 [ 320.877688] ? kernel_read+0x120/0x120 [ 320.881587] ? rcu_read_lock_sched_held+0x110/0x130 [ 320.886589] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 320.891334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.896854] ? __sb_start_write+0x1ac/0x360 [ 320.901166] vfs_write+0x20c/0x580 [ 320.904697] ksys_pwrite64+0x183/0x1c0 [ 320.908590] ? __ia32_sys_pread64+0xf0/0xf0 [ 320.912909] ? __ia32_sys_read+0xb0/0xb0 [ 320.916978] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.922361] ? trace_hardirqs_off_caller+0x300/0x300 [ 320.927480] __x64_sys_pwrite64+0x97/0xf0 [ 320.931641] do_syscall_64+0x1a3/0x800 [ 320.935517] ? syscall_return_slowpath+0x5f0/0x5f0 [ 320.940434] ? prepare_exit_to_usermode+0x232/0x3b0 [ 320.945478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.950315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.955495] RIP: 0033:0x458099 [ 320.958681] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.977577] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 320.985267] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 320.992530] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 320.999795] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 321.007059] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 01:31:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 321.014322] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 321.031841] device lo entered promiscuous mode [ 321.037482] device lo left promiscuous mode 01:31:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000000c0)={@remote, 0x71, r1}) accept4$unix(r2, 0x0, &(0x7f0000000100), 0x80000) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:43 executing program 3 (fault-call:2 fault-nth:8): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x6, &(0x7f0000000180)="890488086cdaf18528b98f5a71ef02853a066c691e23f1809793bfcd04590b979b6ecfdcaa3dd0e8944308cb9e680467902e58ab4ca05cd3a337469c43c7fbb416c7f0b89501ee7a06c65c2b3a795123c740b87b7619c96b7f0e0d7b212d134b5397ac0b6827b2f419cc62d806383520dc53376cf8116a466690d9bfe5ccfe12b15f063688") 01:31:43 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 321.269269] device lo entered promiscuous mode [ 321.287042] device lo left promiscuous mode [ 321.293387] device lo entered promiscuous mode [ 321.298681] device lo left promiscuous mode 01:31:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xa, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x3f, 0xfffffffffffffff9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_mr_vif\x00') mkdirat$cgroup(r1, &(0x7f0000000080)='syz1\x00', 0x1ff) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 321.386192] FAULT_INJECTION: forcing a failure. [ 321.386192] name failslab, interval 1, probability 0, space 0, times 0 01:31:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x74, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:43 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @random="e1e1b3dba30f"}, 0xfffffe3a) close(r0) 01:31:43 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x10800, 0x0) recvfrom$unix(r0, &(0x7f0000000200)=""/4096, 0x1000, 0x2000, &(0x7f0000001200)=@file={0x0, './file0\x00'}, 0x6e) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc5, &(0x7f00000000c0)="ebb26531ff3742966ec1fb248f9b6cc0664ea5e705c0724e1c28b0a4055e636a0ca54e2e06ab3e23a4aa1601bf4b95e1ea707bc0d5a621bf317fc7bc796b133a298a0088c51d45e4ea3314d98e3422c7ab413378d5a3b4507933dd6c7bda84c84a6b9e7985116cd437f1922486102c3b909dc7ba4fcd92b606c17af199f68ec8af5f92c7308618bd0d2a698bb15ec1c8dbce870d61184d57d102718c312fa364b71dc9d4ff8cafc117339e484c7f97e112a5108be3f83387075e346e1ec3a26b54350b0fc92aec8557abbb05890a240f7efad641a8f5d6a548c3d41c3b412c4468a7ce105c5e0649f321") fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "1f1885807fcdebe64388e406fb029c3f"}, 0x11, 0x2) [ 321.535140] CPU: 1 PID: 11197 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 321.542422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.551783] Call Trace: [ 321.554401] dump_stack+0x1db/0x2d0 [ 321.558050] ? dump_stack_print_info.cold+0x20/0x20 [ 321.563100] ? is_bpf_text_address+0xac/0x170 [ 321.567614] should_fail.cold+0xa/0x15 [ 321.571540] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 321.576661] ? ___might_sleep+0x1e7/0x310 [ 321.580823] ? arch_local_save_flags+0x50/0x50 [ 321.585409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.590951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.596496] ? check_preemption_disabled+0x48/0x290 [ 321.601562] __should_failslab+0x121/0x190 [ 321.605884] should_failslab+0x9/0x14 [ 321.609684] kmem_cache_alloc+0x2be/0x710 [ 321.613826] ext4_mb_new_blocks+0x6e8/0x4850 [ 321.618266] ? save_stack+0xa9/0xd0 [ 321.621894] ? ext4_map_blocks+0x9b1/0x1bb0 [ 321.626215] ? do_writepages+0x99/0x1a0 [ 321.630191] ? __generic_file_write_iter+0x4ea/0x630 [ 321.635308] ? ext4_file_write_iter+0x37a/0x1410 [ 321.640053] ? ext4_discard_preallocations+0x1400/0x1400 [ 321.645503] ? __x64_sys_pwrite64+0x97/0xf0 [ 321.649810] ? do_syscall_64+0x1a3/0x800 [ 321.653871] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.659250] ? print_usage_bug+0xd0/0xd0 [ 321.663312] ? __lock_is_held+0xb6/0x140 [ 321.667360] ? add_lock_to_list.isra.0+0x450/0x450 [ 321.672277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.677810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.683334] ? check_preemption_disabled+0x48/0x290 [ 321.688342] ? __lock_is_held+0xb6/0x140 [ 321.692395] ? rcu_read_lock_sched_held+0x110/0x130 [ 321.697399] ? __kmalloc+0x5d5/0x740 [ 321.701104] ? ext4_find_extent+0x76e/0x9d0 [ 321.705418] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.710955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.716528] ? ext4_inode_to_goal_block+0x2e9/0x400 [ 321.721571] ext4_ext_map_blocks+0x36d0/0x60a0 [ 321.726150] ? ext4_ext_release+0x10/0x10 [ 321.730288] ? check_preemption_disabled+0x48/0x290 [ 321.735298] ? ___might_sleep+0x1e7/0x310 [ 321.739450] ? lock_release+0xc40/0xc40 [ 321.743424] ? ext4_es_lookup_extent+0x478/0xdd0 [ 321.748217] ? down_write+0x8a/0x130 [ 321.751980] ? ext4_map_blocks+0x949/0x1bb0 [ 321.756385] ? down_read+0x120/0x120 [ 321.760089] ext4_map_blocks+0x9b1/0x1bb0 [ 321.764233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.769759] ? ext4_issue_zeroout+0x170/0x170 [ 321.774239] ? __lock_is_held+0xb6/0x140 [ 321.778311] ext4_writepages+0x2383/0x41a0 [ 321.782572] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 321.787314] ? add_lock_to_list.isra.0+0x450/0x450 [ 321.792262] ? add_lock_to_list.isra.0+0x450/0x450 [ 321.797216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.802763] ? kasan_check_read+0x11/0x20 [ 321.806901] ? do_raw_spin_unlock+0xa0/0x330 [ 321.811299] ? do_raw_spin_trylock+0x270/0x270 [ 321.815877] ? _raw_spin_unlock+0x2d/0x50 [ 321.820011] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 321.825537] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 321.830802] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 321.835549] do_writepages+0x99/0x1a0 [ 321.839348] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 321.844102] ? do_writepages+0x99/0x1a0 [ 321.848069] __filemap_fdatawrite_range+0x352/0x470 [ 321.853074] ? delete_from_page_cache_batch+0x1690/0x1690 [ 321.858634] filemap_write_and_wait_range+0x4b/0xd0 [ 321.863654] __generic_file_write_iter+0x4ea/0x630 [ 321.868579] ext4_file_write_iter+0x37a/0x1410 [ 321.873150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.878712] ? ext4_file_mmap+0x410/0x410 [ 321.882880] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 321.888166] ? rcu_read_unlock_special+0x380/0x380 [ 321.893151] ? __fget+0x499/0x710 [ 321.896608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 321.902150] ? iov_iter_init+0xea/0x220 [ 321.906133] __vfs_write+0x764/0xb40 [ 321.909849] ? check_preemption_disabled+0x48/0x290 [ 321.914859] ? kernel_read+0x120/0x120 [ 321.918783] ? rcu_read_lock_sched_held+0x110/0x130 [ 321.923802] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 321.928558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.934093] ? __sb_start_write+0x1ac/0x360 [ 321.938416] vfs_write+0x20c/0x580 [ 321.941993] ksys_pwrite64+0x183/0x1c0 [ 321.945867] ? __ia32_sys_pread64+0xf0/0xf0 [ 321.950174] ? __ia32_sys_read+0xb0/0xb0 [ 321.954249] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.959618] ? trace_hardirqs_off_caller+0x300/0x300 [ 321.964727] __x64_sys_pwrite64+0x97/0xf0 [ 321.968909] do_syscall_64+0x1a3/0x800 [ 321.972803] ? syscall_return_slowpath+0x5f0/0x5f0 [ 321.977736] ? prepare_exit_to_usermode+0x232/0x3b0 [ 321.982787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 321.987660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.992858] RIP: 0033:0x458099 [ 321.996040] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.014932] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 322.022631] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 322.029893] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 01:31:43 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x100000000, 0x400) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r1}) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) [ 322.037176] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 322.044447] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 322.051714] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 322.138429] device lo entered promiscuous mode 01:31:44 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffffe, 0xfffffffffffffffd) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:44 executing program 4: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) fremovexattr(r0, &(0x7f0000000040)=@random={'user.', '$:em0\x00'}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) [ 322.170385] device lo left promiscuous mode 01:31:44 executing program 3 (fault-call:2 fault-nth:9): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 322.196673] device lo entered promiscuous mode [ 322.222376] device lo left promiscuous mode 01:31:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xb, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:44 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000000c0)=r2) close(r0) 01:31:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:44 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x100000001, 0xffffffffffffffff) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x3, 0x6}) [ 322.408952] FAULT_INJECTION: forcing a failure. [ 322.408952] name failslab, interval 1, probability 0, space 0, times 0 [ 322.417116] device lo entered promiscuous mode [ 322.420665] CPU: 0 PID: 11243 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 322.432444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.432453] Call Trace: [ 322.443816] device lo left promiscuous mode [ 322.444407] dump_stack+0x1db/0x2d0 [ 322.444426] ? dump_stack_print_info.cold+0x20/0x20 [ 322.444445] ? __lock_is_held+0xb6/0x140 [ 322.452382] should_fail.cold+0xa/0x15 [ 322.452400] ? ext4_es_free_extent+0x2b8/0x770 [ 322.452419] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 322.475017] ? ext4_es_free_extent+0x2b8/0x770 [ 322.479617] ? __lock_is_held+0xb6/0x140 [ 322.479641] __should_failslab+0x121/0x190 [ 322.479660] should_failslab+0x9/0x14 [ 322.479678] kmem_cache_alloc+0x47/0x710 [ 322.487980] ? __es_remove_extent+0x871/0xb30 [ 322.487996] ? __sanitizer_cov_trace_cmp4+0x16/0x20 01:31:44 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = accept4$rose(0xffffffffffffffff, &(0x7f0000000040)=@full={0xb, @dev, @null, 0x0, [@default, @default, @null, @remote, @netrom, @bcast]}, &(0x7f00000000c0)=0x40, 0x800) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl(r0, 0x2, &(0x7f0000000080)="d232fe3bc5fae333527440541faa6c828ac5579d7a6c55f17353df8e56cf167ac29edddba334") [ 322.488027] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 322.488049] __es_insert_extent+0x366/0x1190 [ 322.488070] ? ext4_es_free_extent+0x770/0x770 [ 322.519129] ? do_raw_read_unlock+0x70/0x70 [ 322.523483] ? __lock_is_held+0xb6/0x140 [ 322.527574] ext4_es_insert_extent+0x369/0xc80 [ 322.532192] ? ext4_es_scan_clu+0x50/0x50 [ 322.536394] ? ext4_es_cache_extent+0x6f0/0x6f0 [ 322.541081] ? down_write+0x8a/0x130 [ 322.544795] ? ext4_map_blocks+0x949/0x1bb0 [ 322.549102] ? down_read+0x120/0x120 [ 322.552804] ext4_map_blocks+0xc67/0x1bb0 [ 322.556940] ? ext4_issue_zeroout+0x170/0x170 [ 322.561433] ? __lock_is_held+0xb6/0x140 [ 322.565499] ext4_writepages+0x2383/0x41a0 [ 322.569738] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 322.574590] ? add_lock_to_list.isra.0+0x450/0x450 [ 322.579518] ? add_lock_to_list.isra.0+0x450/0x450 [ 322.584450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.589989] ? kasan_check_read+0x11/0x20 [ 322.594128] ? do_raw_spin_unlock+0xa0/0x330 [ 322.598551] ? do_raw_spin_trylock+0x270/0x270 [ 322.603140] ? _raw_spin_unlock+0x2d/0x50 [ 322.607288] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 322.612862] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 322.618136] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 322.622900] do_writepages+0x99/0x1a0 [ 322.626727] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 322.631484] ? do_writepages+0x99/0x1a0 [ 322.635461] __filemap_fdatawrite_range+0x352/0x470 [ 322.640512] ? delete_from_page_cache_batch+0x1690/0x1690 [ 322.646073] filemap_write_and_wait_range+0x4b/0xd0 [ 322.651089] __generic_file_write_iter+0x4ea/0x630 [ 322.656011] ext4_file_write_iter+0x37a/0x1410 [ 322.660593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.666133] ? ext4_file_mmap+0x410/0x410 [ 322.670274] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 322.675572] ? rcu_read_unlock_special+0x380/0x380 [ 322.680501] ? __fget+0x499/0x710 [ 322.683945] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 322.689475] ? iov_iter_init+0xea/0x220 [ 322.693450] __vfs_write+0x764/0xb40 [ 322.697184] ? check_preemption_disabled+0x48/0x290 [ 322.702230] ? kernel_read+0x120/0x120 [ 322.706123] ? rcu_read_lock_sched_held+0x110/0x130 [ 322.711121] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 322.715888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.721442] ? __sb_start_write+0x1ac/0x360 [ 322.725771] vfs_write+0x20c/0x580 [ 322.729316] ksys_pwrite64+0x183/0x1c0 [ 322.733213] ? __ia32_sys_pread64+0xf0/0xf0 [ 322.737532] ? __ia32_sys_read+0xb0/0xb0 [ 322.741584] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.746931] ? trace_hardirqs_off_caller+0x300/0x300 [ 322.752024] __x64_sys_pwrite64+0x97/0xf0 [ 322.756170] do_syscall_64+0x1a3/0x800 [ 322.760045] ? syscall_return_slowpath+0x5f0/0x5f0 [ 322.764970] ? prepare_exit_to_usermode+0x232/0x3b0 [ 322.770003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 322.774846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.780034] RIP: 0033:0x458099 [ 322.783228] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.802125] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 322.809820] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 322.817082] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 322.824341] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 322.831601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 322.838863] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 322.853486] device lo entered promiscuous mode 01:31:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) close(r0) 01:31:45 executing program 3 (fault-call:2 fault-nth:10): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 322.859435] device lo left promiscuous mode 01:31:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 323.009881] EXT4-fs: 9 callbacks suppressed [ 323.009891] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 323.025393] device lo entered promiscuous mode [ 323.037919] FAULT_INJECTION: forcing a failure. [ 323.037919] name failslab, interval 1, probability 0, space 0, times 0 [ 323.055840] device lo left promiscuous mode 01:31:45 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffbff, 0x800) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x6) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f00000001c0)={0xc2fb, 0x5}) syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000200)={&(0x7f0000000100)=[0x2, 0x6, 0x8, 0x1, 0x8], 0x5, 0x9, 0x853a, 0xd5, 0x9, 0x400, {0x618, 0x7, 0x0, 0xcb, 0x5, 0x0, 0x0, 0x3, 0x2, 0x7fffffff, 0x4, 0x0, 0x40, 0x200, "e71884a331d1769516f0fc5d92629653162571fd43975b651264672eb188ab7c"}}) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000180)) ioctl(r0, 0x2000000000000002, &(0x7f0000000040)="73a9a8cbae90b4e3d76cf9f1545e6bfece46bcaa25588d68c32fe538288e8f49fb38bea63718e5ac5b9953b3f3069de4cb6f2fd554dadbfe3cadd7dfafd497abe3bec6aa84b7b8cd1b7a93c2f2f65f29369617d29d42d84798ccc29ff1f8a46f982054fb327efc163ca9adf86c1eb15294b7d7c7e8d0125849e0d09045c039b199ece0eef5b0fba8dfb401d2c849730000000000000000") [ 323.067828] CPU: 1 PID: 11269 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 323.075168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.084542] Call Trace: [ 323.087152] dump_stack+0x1db/0x2d0 [ 323.090798] ? dump_stack_print_info.cold+0x20/0x20 [ 323.095825] ? add_lock_to_list.isra.0+0x450/0x450 [ 323.100782] ? add_lock_to_list.isra.0+0x450/0x450 [ 323.105725] ? do_raw_spin_unlock+0xa0/0x330 [ 323.110140] should_fail.cold+0xa/0x15 [ 323.114011] ? add_lock_to_list.isra.0+0x450/0x450 [ 323.118944] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 323.124048] ? __unlock_page_memcg+0x53/0x100 [ 323.128542] __should_failslab+0x121/0x190 [ 323.132775] should_failslab+0x9/0x14 [ 323.136575] kmem_cache_alloc+0x47/0x710 [ 323.140621] ? __unlock_page_memcg+0x70/0x100 [ 323.145113] mempool_alloc_slab+0x47/0x60 [ 323.149251] mempool_alloc+0x19f/0x500 [ 323.153134] ? find_get_pages_range+0x1009/0x1560 [ 323.157979] ? mempool_destroy+0x40/0x40 [ 323.162024] ? find_held_lock+0x35/0x120 [ 323.166071] ? clear_page_dirty_for_io+0x9d6/0x18d0 [ 323.171084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.176693] bio_alloc_bioset+0x3c1/0x720 [ 323.180847] ? __this_cpu_preempt_check+0x1d/0x30 [ 323.185681] ? bvec_alloc+0x2f0/0x2f0 [ 323.189479] ext4_bio_write_page+0xf1b/0x1936 [ 323.193985] ? ext4_io_submit_init+0x90/0x90 [ 323.198380] ? ext4_map_blocks+0xc8d/0x1bb0 [ 323.202694] ? lock_downgrade+0x910/0x910 [ 323.206846] mpage_submit_page+0x15a/0x270 [ 323.211071] mpage_map_and_submit_buffers+0x545/0x9a0 [ 323.216281] ? mpage_process_page_bufs+0x610/0x610 [ 323.221221] ? ext4_issue_zeroout+0x170/0x170 [ 323.225703] ? __lock_is_held+0xb6/0x140 [ 323.229761] ext4_writepages+0x252b/0x41a0 [ 323.234015] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 323.238756] ? add_lock_to_list.isra.0+0x450/0x450 [ 323.243697] ? add_lock_to_list.isra.0+0x450/0x450 [ 323.248614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.254182] ? kasan_check_read+0x11/0x20 [ 323.258331] ? do_raw_spin_unlock+0xa0/0x330 [ 323.262728] ? do_raw_spin_trylock+0x270/0x270 [ 323.267301] ? _raw_spin_unlock+0x2d/0x50 [ 323.271435] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 323.276967] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 323.282247] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 323.287011] do_writepages+0x99/0x1a0 [ 323.290811] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 323.295553] ? do_writepages+0x99/0x1a0 [ 323.299534] __filemap_fdatawrite_range+0x352/0x470 [ 323.304558] ? delete_from_page_cache_batch+0x1690/0x1690 [ 323.310101] filemap_write_and_wait_range+0x4b/0xd0 [ 323.315118] __generic_file_write_iter+0x4ea/0x630 [ 323.320060] ext4_file_write_iter+0x37a/0x1410 [ 323.324639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.330179] ? ext4_file_mmap+0x410/0x410 [ 323.334331] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 323.339629] ? rcu_read_unlock_special+0x380/0x380 [ 323.344565] ? __fget+0x499/0x710 [ 323.348007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 323.353529] ? iov_iter_init+0xea/0x220 [ 323.357494] __vfs_write+0x764/0xb40 [ 323.361196] ? check_preemption_disabled+0x48/0x290 [ 323.366247] ? kernel_read+0x120/0x120 [ 323.370143] ? rcu_read_lock_sched_held+0x110/0x130 [ 323.375153] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 323.379904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.385437] ? __sb_start_write+0x1ac/0x360 [ 323.389773] vfs_write+0x20c/0x580 [ 323.393323] ksys_pwrite64+0x183/0x1c0 [ 323.397218] ? __ia32_sys_pread64+0xf0/0xf0 [ 323.401525] ? __ia32_sys_read+0xb0/0xb0 [ 323.405586] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.410936] ? trace_hardirqs_off_caller+0x300/0x300 [ 323.416027] __x64_sys_pwrite64+0x97/0xf0 [ 323.420162] do_syscall_64+0x1a3/0x800 [ 323.424034] ? syscall_return_slowpath+0x5f0/0x5f0 [ 323.428950] ? prepare_exit_to_usermode+0x232/0x3b0 [ 323.433982] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.438837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.444051] RIP: 0033:0x458099 [ 323.447241] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:31:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 323.466122] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 323.473810] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 323.481063] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 323.488321] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 323.495578] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 323.502834] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 323.522928] device lo entered promiscuous mode [ 323.527694] device lo left promiscuous mode 01:31:45 executing program 3 (fault-call:2 fault-nth:11): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:45 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0)={0x42, 0x2, 0x3}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x6, @dev}, 0x10) close(r1) [ 323.579553] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:46 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400000, 0x0) write$P9_RSYMLINK(r0, &(0x7f0000000080)={0x14, 0x11, 0x1, {0x3, 0x0, 0x4}}, 0x14) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:46 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2200) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x5, 0x401, 0x2, 0x1, 0x9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000140)={r2, 0xfffffffffffffff9}, &(0x7f0000000180)=0x8) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000080)) [ 323.699334] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 323.758025] FAULT_INJECTION: forcing a failure. [ 323.758025] name failslab, interval 1, probability 0, space 0, times 0 [ 323.772413] CPU: 0 PID: 11294 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 323.779614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.788962] Call Trace: [ 323.791551] dump_stack+0x1db/0x2d0 [ 323.795164] ? dump_stack_print_info.cold+0x20/0x20 [ 323.800180] ? ext4_bio_write_page+0xf1b/0x1936 [ 323.804856] ? mpage_submit_page+0x15a/0x270 [ 323.809251] ? mpage_map_and_submit_buffers+0x545/0x9a0 [ 323.814599] ? ext4_writepages+0x252b/0x41a0 [ 323.818991] ? do_writepages+0x99/0x1a0 [ 323.822952] ? filemap_write_and_wait_range+0x4b/0xd0 [ 323.828143] should_fail.cold+0xa/0x15 [ 323.832026] ? add_lock_to_list.isra.0+0x450/0x450 [ 323.836941] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 323.842026] ? should_fail+0x1e6/0xd22 [ 323.845897] ? add_lock_to_list.isra.0+0x450/0x450 [ 323.850821] __should_failslab+0x121/0x190 [ 323.855054] should_failslab+0x9/0x14 [ 323.858857] kmem_cache_alloc+0x47/0x710 [ 323.862904] ? mempool_alloc_slab+0x47/0x60 [ 323.867221] mempool_alloc_slab+0x47/0x60 [ 323.871360] mempool_alloc+0x19f/0x500 [ 323.875238] ? mempool_destroy+0x40/0x40 [ 323.879287] ? kasan_check_write+0x14/0x20 [ 323.883507] ? bio_init+0x12f/0x260 [ 323.887147] ? bio_add_page+0x120/0x120 [ 323.891112] bvec_alloc+0xe0/0x2f0 [ 323.894657] bio_alloc_bioset+0x492/0x720 [ 323.898815] ? __this_cpu_preempt_check+0x1d/0x30 [ 323.903642] ? bvec_alloc+0x2f0/0x2f0 [ 323.907433] ext4_bio_write_page+0xf1b/0x1936 [ 323.911917] ? ext4_io_submit_init+0x90/0x90 [ 323.916309] ? ext4_map_blocks+0xc8d/0x1bb0 [ 323.920618] ? lock_downgrade+0x910/0x910 [ 323.924755] mpage_submit_page+0x15a/0x270 [ 323.928977] mpage_map_and_submit_buffers+0x545/0x9a0 [ 323.934159] ? mpage_process_page_bufs+0x610/0x610 [ 323.939074] ? ext4_issue_zeroout+0x170/0x170 [ 323.943553] ? __lock_is_held+0xb6/0x140 [ 323.947621] ext4_writepages+0x252b/0x41a0 [ 323.951857] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 323.956594] ? add_lock_to_list.isra.0+0x450/0x450 [ 323.961530] ? add_lock_to_list.isra.0+0x450/0x450 [ 323.966446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.971977] ? kasan_check_read+0x11/0x20 [ 323.976108] ? do_raw_spin_unlock+0xa0/0x330 [ 323.980517] ? do_raw_spin_trylock+0x270/0x270 [ 323.985085] ? _raw_spin_unlock+0x2d/0x50 [ 323.989226] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 323.994761] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 324.000034] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 324.004779] do_writepages+0x99/0x1a0 [ 324.008571] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 324.013308] ? do_writepages+0x99/0x1a0 [ 324.017289] __filemap_fdatawrite_range+0x352/0x470 [ 324.022292] ? delete_from_page_cache_batch+0x1690/0x1690 [ 324.027841] filemap_write_and_wait_range+0x4b/0xd0 [ 324.032857] __generic_file_write_iter+0x4ea/0x630 [ 324.037776] ext4_file_write_iter+0x37a/0x1410 [ 324.042342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.047884] ? ext4_file_mmap+0x410/0x410 [ 324.052016] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 324.057295] ? rcu_read_unlock_special+0x380/0x380 [ 324.062236] ? __fget+0x499/0x710 [ 324.065679] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 324.071206] ? iov_iter_init+0xea/0x220 [ 324.075197] __vfs_write+0x764/0xb40 [ 324.078921] ? check_preemption_disabled+0x48/0x290 [ 324.083922] ? kernel_read+0x120/0x120 [ 324.087802] ? rcu_read_lock_sched_held+0x110/0x130 [ 324.092803] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 324.097545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.103077] ? __sb_start_write+0x1ac/0x360 [ 324.107413] vfs_write+0x20c/0x580 [ 324.110948] ksys_pwrite64+0x183/0x1c0 [ 324.114840] ? __ia32_sys_pread64+0xf0/0xf0 [ 324.119144] ? __ia32_sys_read+0xb0/0xb0 [ 324.123212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.128594] ? trace_hardirqs_off_caller+0x300/0x300 [ 324.133685] __x64_sys_pwrite64+0x97/0xf0 [ 324.137837] do_syscall_64+0x1a3/0x800 [ 324.141712] ? syscall_return_slowpath+0x5f0/0x5f0 [ 324.146626] ? prepare_exit_to_usermode+0x232/0x3b0 [ 324.151647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 324.156484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.161656] RIP: 0033:0x458099 [ 324.164832] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.183732] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 324.191429] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 324.198685] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 01:31:46 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) close(r0) [ 324.205961] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 324.213222] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 324.220488] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 324.290428] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:46 executing program 3 (fault-call:2 fault-nth:12): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:46 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000001380)=[{{&(0x7f0000000080)=@rc, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/43, 0x2b}, {&(0x7f0000000100)=""/196, 0xc4}, {&(0x7f0000000200)=""/79, 0x4f}, {&(0x7f0000000280)=""/74, 0x4a}, {&(0x7f0000000300)=""/247, 0xf7}, {&(0x7f0000000400)=""/63, 0x3f}, {&(0x7f0000000440)=""/86, 0x56}], 0x7, &(0x7f0000000540)=""/212, 0xd4}}, {{&(0x7f0000000640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f00000006c0)=""/130, 0x82}, {&(0x7f0000000780)=""/94, 0x5e}], 0x2}, 0x4}, {{&(0x7f0000000840)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f00000008c0)=""/165, 0xa5}, {&(0x7f0000000980)=""/99, 0x63}, {&(0x7f0000000a00)=""/39, 0x27}, {&(0x7f0000000a40)}, {&(0x7f0000000a80)}, {&(0x7f0000000ac0)=""/123, 0x7b}, {&(0x7f0000000b40)=""/67, 0x43}, {&(0x7f0000000bc0)=""/92, 0x5c}, {&(0x7f0000000c40)=""/22, 0x16}, {&(0x7f0000000c80)=""/35, 0x23}], 0xa, &(0x7f0000000d80)=""/188, 0xbc}, 0x1}, {{&(0x7f0000000e40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000ec0)=""/145, 0x91}, {&(0x7f0000000f80)=""/242, 0xf2}, {&(0x7f0000001080)=""/125, 0x7d}, {&(0x7f0000001100)=""/61, 0x3d}], 0x4, &(0x7f0000001180)=""/125, 0x7d}, 0x8e6f}, {{&(0x7f0000001200)=@nfc, 0x80, &(0x7f0000001340)=[{&(0x7f0000001280)=""/123, 0x7b}, {&(0x7f0000001300)=""/20, 0x14}], 0x2}, 0xe358}], 0x5, 0x10001, &(0x7f00000014c0)={0x77359400}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000001500)=@assoc_value, &(0x7f0000001540)=0x8) 01:31:46 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x3) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000080)=0x3f) 01:31:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x300, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 324.349621] device lo entered promiscuous mode [ 324.367001] device lo left promiscuous mode 01:31:46 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) [ 324.391967] device lo entered promiscuous mode [ 324.396902] device lo left promiscuous mode [ 324.413790] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 324.508530] FAULT_INJECTION: forcing a failure. [ 324.508530] name failslab, interval 1, probability 0, space 0, times 0 [ 324.534356] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:46 executing program 2: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x6, 0xff, 0x4db}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 324.582424] device lo entered promiscuous mode [ 324.589344] CPU: 0 PID: 11329 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 324.596547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.605900] Call Trace: [ 324.608521] dump_stack+0x1db/0x2d0 [ 324.612169] ? dump_stack_print_info.cold+0x20/0x20 [ 324.617222] should_fail.cold+0xa/0x15 [ 324.621120] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 324.626241] ? print_usage_bug+0xd0/0xd0 01:31:46 executing program 4: io_setup(0x3f, &(0x7f0000000040)=0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x240804, 0x0) io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xf, 0x7, r1, &(0x7f0000000080)="95dc097042815982c9a4aab5927160b1720644248548f4828f916bf0362954b51a3384ca67f252379afc022104eb2aaf919e118a1f6e9e2706b974fad673024c1d1f2b313e93b16fedb5686ea1014beaf1ccfa993f3a7603ebbc1de1025d05e9ca1d34492b1c", 0x66, 0x5, 0x0, 0x2, r2}, &(0x7f0000000180)) r3 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000340)={0x15, 0x110, 0xfa00, {r4, 0x9285, 0x0, 0x0, 0x0, @in6={0xa, 0x200, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, @ib={0x1b, 0x121, 0x80000001, {"c4d1103f75dc21d9f7ce9947c57da7d3"}, 0x30000, 0x7fff, 0x2}}}, 0x118) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000200)={0x0, @reserved}) openat$cgroup_ro(r2, &(0x7f00000001c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl(r3, 0xffffffffffffffc2, &(0x7f0000000100)) [ 324.630313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.635856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.641407] ? check_preemption_disabled+0x48/0x290 [ 324.646444] ? add_lock_to_list.isra.0+0x450/0x450 [ 324.650357] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 324.651385] ? __lock_acquire+0x572/0x4a30 [ 324.651403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.651424] __should_failslab+0x121/0x190 [ 324.651444] should_failslab+0x9/0x14 [ 324.651462] kmem_cache_alloc_node+0x56/0x710 [ 324.679545] ? find_held_lock+0x35/0x120 [ 324.683596] ? generic_make_request_checks+0x1008/0x21d0 [ 324.689034] create_task_io_context+0xa5/0x5d0 [ 324.693604] ? ioc_clear_queue+0x680/0x680 [ 324.697827] ? kasan_check_read+0x11/0x20 [ 324.701972] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 324.707495] ? rcu_read_unlock_special+0x380/0x380 [ 324.712436] generic_make_request_checks+0x1c15/0x21d0 [ 324.717709] ? trace_event_raw_event_block_rq_requeue+0x6e0/0x6e0 [ 324.723946] ? blk_cleanup_queue+0x200/0x200 [ 324.728349] ? kasan_check_write+0x14/0x20 [ 324.732570] ? __brelse+0x105/0x180 [ 324.736185] ? __might_sleep+0x95/0x190 [ 324.740152] ? block_commit_write+0x30/0x30 [ 324.744460] ? __ext4_handle_dirty_metadata+0x1e3/0x570 [ 324.749820] ? kasan_check_write+0x14/0x20 [ 324.754038] ? ext4_mark_iloc_dirty+0x1947/0x2f00 [ 324.758878] generic_make_request+0x2ab/0x17f0 [ 324.763449] ? ext4_chunk_trans_blocks+0x30/0x30 [ 324.768209] ? blk_queue_enter+0x1200/0x1200 [ 324.772608] ? __might_sleep+0x95/0x190 [ 324.776570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 324.782095] ? __ext4_journal_get_write_access+0x70/0xa0 [ 324.787554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.793095] ? ext4_mark_inode_dirty+0x257/0xb80 [ 324.797859] submit_bio+0xba/0x480 [ 324.801396] ? submit_bio+0xba/0x480 [ 324.805107] ? generic_make_request+0x17f0/0x17f0 [ 324.809938] ? up_write+0x7b/0x230 [ 324.813469] ? down_write_nested+0x130/0x130 [ 324.817872] ? down_read+0x120/0x120 [ 324.821575] ext4_io_submit+0x197/0x230 [ 324.825540] ext4_writepages+0x1c99/0x41a0 [ 324.829801] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 324.834553] ? add_lock_to_list.isra.0+0x450/0x450 [ 324.839467] ? add_lock_to_list.isra.0+0x450/0x450 [ 324.844401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.849949] ? kasan_check_read+0x11/0x20 [ 324.854103] ? do_raw_spin_unlock+0xa0/0x330 [ 324.858505] ? do_raw_spin_trylock+0x270/0x270 [ 324.863077] ? _raw_spin_unlock+0x2d/0x50 [ 324.867241] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 324.872776] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 324.878069] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 324.882818] do_writepages+0x99/0x1a0 [ 324.886606] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 324.891346] ? do_writepages+0x99/0x1a0 [ 324.895310] __filemap_fdatawrite_range+0x352/0x470 [ 324.900314] ? delete_from_page_cache_batch+0x1690/0x1690 [ 324.905849] filemap_write_and_wait_range+0x4b/0xd0 [ 324.910854] __generic_file_write_iter+0x4ea/0x630 [ 324.915804] ext4_file_write_iter+0x37a/0x1410 [ 324.920423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.926027] ? ext4_file_mmap+0x410/0x410 [ 324.930167] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 324.935431] ? rcu_read_unlock_special+0x380/0x380 [ 324.940353] ? __fget+0x499/0x710 [ 324.943806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 324.949329] ? iov_iter_init+0xea/0x220 [ 324.953301] __vfs_write+0x764/0xb40 [ 324.957008] ? check_preemption_disabled+0x48/0x290 [ 324.962011] ? kernel_read+0x120/0x120 [ 324.965891] ? rcu_read_lock_sched_held+0x110/0x130 [ 324.970893] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 324.975634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.981170] ? __sb_start_write+0x1ac/0x360 [ 324.985482] vfs_write+0x20c/0x580 [ 324.989013] ksys_pwrite64+0x183/0x1c0 [ 324.992886] ? __ia32_sys_pread64+0xf0/0xf0 [ 324.997241] ? __ia32_sys_read+0xb0/0xb0 [ 325.001305] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.006657] ? trace_hardirqs_off_caller+0x300/0x300 [ 325.011748] __x64_sys_pwrite64+0x97/0xf0 [ 325.015888] do_syscall_64+0x1a3/0x800 [ 325.019768] ? syscall_return_slowpath+0x5f0/0x5f0 [ 325.024687] ? prepare_exit_to_usermode+0x232/0x3b0 [ 325.029692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.034526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.039698] RIP: 0033:0x458099 [ 325.042884] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.061771] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 325.069464] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 325.076722] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 325.083993] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 325.091246] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 325.098500] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 325.107328] protocol 88fb is buggy, dev hsr_slave_0 [ 325.108685] protocol 88fb is buggy, dev hsr_slave_0 [ 325.112450] protocol 88fb is buggy, dev hsr_slave_1 [ 325.117411] protocol 88fb is buggy, dev hsr_slave_1 [ 325.127555] protocol 88fb is buggy, dev hsr_slave_0 01:31:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xe, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:47 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x3, 0x6, @dev}, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x4fe6, 0x20606b4, 0x2}) close(r0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 01:31:47 executing program 3 (fault-call:2 fault-nth:13): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 325.132651] protocol 88fb is buggy, dev hsr_slave_1 [ 325.134114] device lo left promiscuous mode [ 325.153395] device lo entered promiscuous mode [ 325.158712] device lo left promiscuous mode [ 325.307756] FAULT_INJECTION: forcing a failure. [ 325.307756] name failslab, interval 1, probability 0, space 0, times 0 [ 325.331942] device lo entered promiscuous mode 01:31:47 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000100)={0x1, 0x10001}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x40000000000000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x101001, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl(r1, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x500, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 325.354431] device lo left promiscuous mode [ 325.368490] CPU: 0 PID: 11353 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 325.375696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.385051] Call Trace: [ 325.387715] dump_stack+0x1db/0x2d0 [ 325.391359] ? dump_stack_print_info.cold+0x20/0x20 [ 325.391376] ? __this_cpu_preempt_check+0x1d/0x30 [ 325.391403] should_fail.cold+0xa/0x15 [ 325.391419] ? add_lock_to_list.isra.0+0x450/0x450 [ 325.391438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 325.391460] ? add_lock_to_list.isra.0+0x450/0x450 [ 325.399638] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 325.401325] __should_failslab+0x121/0x190 [ 325.401347] should_failslab+0x9/0x14 [ 325.401364] kmem_cache_alloc+0x47/0x710 [ 325.401394] mempool_alloc_slab+0x47/0x60 [ 325.442367] mempool_alloc+0x19f/0x500 [ 325.446242] ? __might_sleep+0x95/0x190 [ 325.450217] ? mempool_destroy+0x40/0x40 [ 325.454268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.459834] ? __find_get_block+0xf20/0xf20 [ 325.464159] ? __lock_is_held+0xb6/0x140 [ 325.468239] bio_alloc_bioset+0x3c1/0x720 [ 325.472387] ? bvec_alloc+0x2f0/0x2f0 [ 325.476188] ? arch_local_save_flags+0x50/0x50 [ 325.480777] submit_bh_wbc+0x133/0x7f0 [ 325.484664] __sync_dirty_buffer+0x1ab/0x3d0 [ 325.489061] ? sync_mapping_buffers+0xe60/0xe60 [ 325.493722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.499256] ? file_check_and_advance_wb_err+0x13e/0x530 [ 325.504692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.510241] sync_dirty_buffer+0x1b/0x20 [ 325.514308] ext4_write_inode+0x514/0x600 [ 325.518444] ? __ext4_iget+0x4320/0x4320 [ 325.522518] ? __lock_is_held+0xb6/0x140 [ 325.526584] ext4_sync_file+0xa71/0x14d0 [ 325.530643] ? ext4_getfsmap+0xda0/0xda0 [ 325.534719] ? up_write+0x7b/0x230 [ 325.538282] ? ext4_getfsmap+0xda0/0xda0 [ 325.542339] vfs_fsync_range+0x144/0x230 [ 325.546412] ext4_file_write_iter+0x67f/0x1410 [ 325.550985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.556534] ? ext4_file_mmap+0x410/0x410 [ 325.560686] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 325.565954] ? rcu_read_unlock_special+0x380/0x380 [ 325.570876] ? __fget+0x499/0x710 [ 325.574319] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 325.579852] ? iov_iter_init+0xea/0x220 [ 325.583857] __vfs_write+0x764/0xb40 [ 325.587573] ? check_preemption_disabled+0x48/0x290 [ 325.592580] ? kernel_read+0x120/0x120 [ 325.596485] ? rcu_read_lock_sched_held+0x110/0x130 [ 325.601503] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 325.606248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.611773] ? __sb_start_write+0x1ac/0x360 [ 325.616084] vfs_write+0x20c/0x580 [ 325.619616] ksys_pwrite64+0x183/0x1c0 [ 325.623505] ? __ia32_sys_pread64+0xf0/0xf0 [ 325.627823] ? __ia32_sys_read+0xb0/0xb0 [ 325.631876] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.637249] ? trace_hardirqs_off_caller+0x300/0x300 [ 325.642462] __x64_sys_pwrite64+0x97/0xf0 [ 325.646613] do_syscall_64+0x1a3/0x800 [ 325.650495] ? syscall_return_slowpath+0x5f0/0x5f0 [ 325.655430] ? prepare_exit_to_usermode+0x232/0x3b0 [ 325.660462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.665326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.670511] RIP: 0033:0x458099 [ 325.673703] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.692588] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 325.700294] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 325.707557] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 325.714850] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 325.722118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 325.729392] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:31:48 executing program 3 (fault-call:2 fault-nth:14): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:48 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000040)) 01:31:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)={0x1, 0x7085, 0x2, 0x0, 0x7, [{0x42e3, 0x0, 0xd1, 0x0, 0x0, 0x8}, {0xfffffffffffff806, 0x0, 0x74043494, 0x0, 0x0, 0x3}, {0xfffffffffffffffa, 0x0, 0x100000001}, {0x18, 0x1d10, 0x2, 0x0, 0x0, 0x100}, {0x100000000, 0xc0000, 0x800, 0x0, 0x0, 0x2100}, {0xc16, 0xf48, 0xfffffffffffeffff, 0x0, 0x0, 0x1000}, {0x8, 0x7fff, 0xfffffffffffffd29, 0x0, 0x0, 0x2000}]}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x3, 0x6}, 0x10) close(r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) bind$rds(r2, &(0x7f00000000c0)={0x2, 0x4e21, @empty}, 0x10) [ 325.767197] device lo entered promiscuous mode [ 325.772466] device lo left promiscuous mode [ 325.825296] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 325.917791] FAULT_INJECTION: forcing a failure. [ 325.917791] name failslab, interval 1, probability 0, space 0, times 0 [ 325.935348] device lo entered promiscuous mode [ 325.966063] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 325.983649] device lo left promiscuous mode [ 326.011115] CPU: 1 PID: 11377 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 326.018390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.027758] Call Trace: [ 326.030361] dump_stack+0x1db/0x2d0 [ 326.034013] ? dump_stack_print_info.cold+0x20/0x20 [ 326.039042] ? __switch_to_asm+0x34/0x70 [ 326.043100] ? __switch_to_asm+0x40/0x70 [ 326.047223] ? __switch_to_asm+0x34/0x70 [ 326.051300] should_fail.cold+0xa/0x15 [ 326.055189] ? add_lock_to_list.isra.0+0x450/0x450 [ 326.060147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.065248] ? print_usage_bug+0xd0/0xd0 [ 326.069322] ? __schedule+0x89f/0x1e60 [ 326.073247] __should_failslab+0x121/0x190 [ 326.077488] should_failslab+0x9/0x14 [ 326.081290] kmem_cache_alloc+0x47/0x710 [ 326.085369] mempool_alloc_slab+0x47/0x60 [ 326.089540] mempool_alloc+0x19f/0x500 [ 326.093438] ? mempool_destroy+0x40/0x40 [ 326.097498] ? __lock_acquire+0x572/0x4a30 [ 326.101738] ? add_lock_to_list.isra.0+0x450/0x450 [ 326.106675] ? __lock_is_held+0xb6/0x140 [ 326.110748] bio_alloc_bioset+0x3c1/0x720 [ 326.114903] ? bvec_alloc+0x2f0/0x2f0 [ 326.118706] ? arch_local_save_flags+0x50/0x50 [ 326.123291] ? kasan_check_read+0x11/0x20 [ 326.127456] submit_bh_wbc+0x133/0x7f0 [ 326.131378] write_dirty_buffer+0xb6/0x140 [ 326.135639] sync_mapping_buffers+0x53e/0xe60 [ 326.140165] ? dput+0x250/0x790 [ 326.143458] ? write_dirty_buffer+0x140/0x140 [ 326.147987] ? iput+0x683/0xae0 [ 326.151273] ? inode_add_lru+0x2a0/0x2a0 [ 326.155333] ? dput+0x27c/0x790 [ 326.158620] ? shrink_dcache_sb+0x340/0x340 [ 326.162954] ext4_sync_file+0x118e/0x14d0 [ 326.167113] ? ext4_getfsmap+0xda0/0xda0 [ 326.171222] ? up_write+0x7b/0x230 [ 326.174768] ? ext4_getfsmap+0xda0/0xda0 [ 326.178831] vfs_fsync_range+0x144/0x230 [ 326.182901] ext4_file_write_iter+0x67f/0x1410 [ 326.187521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.193066] ? ext4_file_mmap+0x410/0x410 [ 326.197222] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 326.202521] ? rcu_read_unlock_special+0x380/0x380 [ 326.207465] ? __fget+0x499/0x710 [ 326.211016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 326.216556] ? iov_iter_init+0xea/0x220 [ 326.220539] __vfs_write+0x764/0xb40 [ 326.224261] ? check_preemption_disabled+0x48/0x290 [ 326.229284] ? kernel_read+0x120/0x120 [ 326.233188] ? rcu_read_lock_sched_held+0x110/0x130 [ 326.238228] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 326.242995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.248636] ? __sb_start_write+0x1ac/0x360 [ 326.252964] vfs_write+0x20c/0x580 [ 326.256520] ksys_pwrite64+0x183/0x1c0 [ 326.260415] ? __ia32_sys_pread64+0xf0/0xf0 [ 326.264739] ? __ia32_sys_read+0xb0/0xb0 [ 326.268810] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.274217] ? trace_hardirqs_off_caller+0x300/0x300 [ 326.279333] __x64_sys_pwrite64+0x97/0xf0 [ 326.283500] do_syscall_64+0x1a3/0x800 [ 326.287393] ? syscall_return_slowpath+0x5f0/0x5f0 [ 326.292325] ? prepare_exit_to_usermode+0x232/0x3b0 [ 326.297362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.302222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.307414] RIP: 0033:0x458099 [ 326.310609] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.329510] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 326.337234] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 326.344504] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 326.351768] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 01:31:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x10, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:48 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x100) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000080)) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 326.359031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 326.366324] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 326.373982] protocol 88fb is buggy, dev hsr_slave_0 [ 326.379169] protocol 88fb is buggy, dev hsr_slave_1 01:31:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x600, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 326.408806] device lo entered promiscuous mode [ 326.428244] device lo left promiscuous mode 01:31:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000011c0)={0xffffffffffffff80, 0x0, 0x3a2}) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = fcntl$getown(r0, 0x9) r2 = gettid() kcmp(r1, r2, 0x4, r0, r0) ioctl$DRM_IOCTL_VERSION(0xffffffffffffff9c, 0xc0406400, &(0x7f0000001180)={0x9e, 0x7fffffff, 0x7f, 0x78, &(0x7f0000000040)=""/120, 0xab, &(0x7f00000000c0)=""/171, 0x1000, &(0x7f0000000180)=""/4096}) 01:31:48 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000040)=']nodev^wlan0&#\x00', 0xffffffffffffffff}, 0x30) fcntl$setown(r0, 0x8, r2) 01:31:48 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffefffffc2, &(0x7f0000000100)) 01:31:48 executing program 3 (fault-call:2 fault-nth:15): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x103200, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0xf5ca1ee1646cb26b, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x100c0, 0x0) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r4) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60, 0xfffffffffffffffe, 0x1, {{0x0, 0x7, 0x7, 0xf80000000, 0x5, 0x6, 0x8000, 0x7}}}, 0x60) [ 326.702976] device lo entered promiscuous mode [ 326.713660] device lo left promiscuous mode [ 326.744644] FAULT_INJECTION: forcing a failure. [ 326.744644] name failslab, interval 1, probability 0, space 0, times 0 [ 326.756102] device lo entered promiscuous mode [ 326.768830] device lo left promiscuous mode [ 326.773534] CPU: 1 PID: 11417 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 326.780732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.790088] Call Trace: [ 326.792697] dump_stack+0x1db/0x2d0 [ 326.796343] ? dump_stack_print_info.cold+0x20/0x20 [ 326.801377] ? find_get_pages_range_tag+0x1036/0x1540 [ 326.806580] should_fail.cold+0xa/0x15 [ 326.810480] ? add_lock_to_list.isra.0+0x450/0x450 [ 326.815423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.820536] ? add_lock_to_list.isra.0+0x450/0x450 [ 326.825498] __should_failslab+0x121/0x190 [ 326.829751] should_failslab+0x9/0x14 [ 326.829769] kmem_cache_alloc+0x47/0x710 [ 326.829796] mempool_alloc_slab+0x47/0x60 [ 326.829813] mempool_alloc+0x19f/0x500 [ 326.829829] ? __might_sleep+0x95/0x190 [ 326.829855] ? mempool_destroy+0x40/0x40 [ 326.829873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.841859] ? __find_get_block+0xf20/0xf20 [ 326.841880] ? __lock_is_held+0xb6/0x140 [ 326.841906] bio_alloc_bioset+0x3c1/0x720 [ 326.871915] ? bvec_alloc+0x2f0/0x2f0 [ 326.875775] ? arch_local_save_flags+0x50/0x50 [ 326.880372] submit_bh_wbc+0x133/0x7f0 [ 326.884275] __sync_dirty_buffer+0x1ab/0x3d0 [ 326.888696] ? sync_mapping_buffers+0xe60/0xe60 [ 326.893379] ? add_lock_to_list.isra.0+0x450/0x450 [ 326.898324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.903870] sync_dirty_buffer+0x1b/0x20 [ 326.907941] ext4_write_inode+0x514/0x600 [ 326.912111] ? __ext4_iget+0x4320/0x4320 [ 326.916210] ? __lock_is_held+0xb6/0x140 [ 326.920302] __writeback_single_inode+0xef1/0x1620 [ 326.925270] ? __mark_inode_dirty+0x1590/0x1590 [ 326.929960] ? kasan_check_read+0x11/0x20 [ 326.934117] ? do_raw_spin_unlock+0xa0/0x330 [ 326.938529] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 01:31:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x700, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2d, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x60002, 0x0) [ 326.943818] ? do_raw_spin_trylock+0x270/0x270 [ 326.948427] ? _raw_spin_unlock+0x2d/0x50 [ 326.952583] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 326.958131] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 326.963421] ? __writeback_single_inode+0x1620/0x1620 [ 326.968629] writeback_single_inode+0x3b2/0x590 [ 326.973309] ? wb_writeback+0xf70/0xf70 [ 326.977392] sync_inode_metadata+0x11c/0x180 [ 326.981810] ? sync_inode+0x30/0x30 [ 326.985468] ext4_sync_file+0x11b5/0x14d0 [ 326.989635] ? ext4_getfsmap+0xda0/0xda0 [ 326.993733] ? up_write+0x7b/0x230 [ 326.997286] ? ext4_getfsmap+0xda0/0xda0 [ 327.001366] vfs_fsync_range+0x144/0x230 [ 327.005434] ext4_file_write_iter+0x67f/0x1410 [ 327.010029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.015568] ? ext4_file_mmap+0x410/0x410 [ 327.019716] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 327.025068] ? rcu_read_unlock_special+0x380/0x380 [ 327.030049] ? __fget+0x499/0x710 [ 327.033530] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.039078] ? iov_iter_init+0xea/0x220 [ 327.043054] __vfs_write+0x764/0xb40 [ 327.046754] ? check_preemption_disabled+0x48/0x290 [ 327.051762] ? kernel_read+0x120/0x120 [ 327.055645] ? rcu_read_lock_sched_held+0x110/0x130 [ 327.060654] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 327.065408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.070955] ? __sb_start_write+0x1ac/0x360 [ 327.075287] vfs_write+0x20c/0x580 [ 327.078833] ksys_pwrite64+0x183/0x1c0 [ 327.082720] ? __ia32_sys_pread64+0xf0/0xf0 [ 327.087030] ? __ia32_sys_read+0xb0/0xb0 [ 327.091095] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.096455] ? trace_hardirqs_off_caller+0x300/0x300 [ 327.101574] __x64_sys_pwrite64+0x97/0xf0 [ 327.105714] do_syscall_64+0x1a3/0x800 [ 327.109603] ? syscall_return_slowpath+0x5f0/0x5f0 [ 327.114535] ? prepare_exit_to_usermode+0x232/0x3b0 [ 327.119554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.124413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.129599] RIP: 0033:0x458099 01:31:49 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='timers\x00') accept4$inet6(r1, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f00000003c0)=0x1c, 0x80000) prctl$PR_SET_FPEXC(0xc, 0x20000) 01:31:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x0) write$P9_RXATTRWALK(r2, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0x6}, 0xf) close(r0) [ 327.132802] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.151691] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 327.159399] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 327.166658] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 327.173929] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 327.181192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 327.188459] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:31:49 executing program 3 (fault-call:2 fault-nth:16): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 327.341941] device lo entered promiscuous mode 01:31:49 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x4000) socket$nl_route(0x10, 0x3, 0x0) 01:31:49 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000000c0)={0x89c, 0x7, 0x3, 0x8, 0xffffffff80000001}) [ 327.381006] device lo left promiscuous mode [ 327.396057] device lo entered promiscuous mode [ 327.400917] FAULT_INJECTION: forcing a failure. [ 327.400917] name failslab, interval 1, probability 0, space 0, times 0 [ 327.408723] device lo left promiscuous mode [ 327.420699] CPU: 0 PID: 11447 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 327.427918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.437294] Call Trace: [ 327.437319] dump_stack+0x1db/0x2d0 [ 327.437340] ? dump_stack_print_info.cold+0x20/0x20 [ 327.448691] ? find_get_pages_range_tag+0x1036/0x1540 [ 327.448715] should_fail.cold+0xa/0x15 [ 327.448730] ? add_lock_to_list.isra.0+0x450/0x450 [ 327.448748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.467893] ? add_lock_to_list.isra.0+0x450/0x450 [ 327.472851] __should_failslab+0x121/0x190 [ 327.477112] should_failslab+0x9/0x14 [ 327.480925] kmem_cache_alloc+0x47/0x710 [ 327.485012] mempool_alloc_slab+0x47/0x60 [ 327.489176] mempool_alloc+0x19f/0x500 [ 327.493077] ? __might_sleep+0x95/0x190 [ 327.497067] ? mempool_destroy+0x40/0x40 [ 327.501146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.506705] ? __find_get_block+0xf20/0xf20 [ 327.511039] ? __lock_is_held+0xb6/0x140 [ 327.515117] bio_alloc_bioset+0x3c1/0x720 [ 327.519304] ? bvec_alloc+0x2f0/0x2f0 [ 327.523132] ? arch_local_save_flags+0x50/0x50 [ 327.527741] submit_bh_wbc+0x133/0x7f0 [ 327.531646] __sync_dirty_buffer+0x1ab/0x3d0 [ 327.536069] ? sync_mapping_buffers+0xe60/0xe60 [ 327.540755] ? add_lock_to_list.isra.0+0x450/0x450 [ 327.545701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.551256] sync_dirty_buffer+0x1b/0x20 [ 327.555335] ext4_write_inode+0x514/0x600 [ 327.559508] ? __ext4_iget+0x4320/0x4320 [ 327.563583] ? __lock_is_held+0xb6/0x140 [ 327.567675] __writeback_single_inode+0xef1/0x1620 [ 327.572625] ? __mark_inode_dirty+0x1590/0x1590 [ 327.577315] ? kasan_check_read+0x11/0x20 [ 327.581485] ? do_raw_spin_unlock+0xa0/0x330 [ 327.585907] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 327.591195] ? do_raw_spin_trylock+0x270/0x270 [ 327.595816] ? _raw_spin_unlock+0x2d/0x50 [ 327.599976] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.605530] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 327.610823] ? __writeback_single_inode+0x1620/0x1620 [ 327.616039] writeback_single_inode+0x3b2/0x590 [ 327.620726] ? wb_writeback+0xf70/0xf70 [ 327.624724] sync_inode_metadata+0x11c/0x180 [ 327.629144] ? sync_inode+0x30/0x30 [ 327.632800] ext4_sync_file+0x11b5/0x14d0 [ 327.636998] ? ext4_getfsmap+0xda0/0xda0 [ 327.641092] ? up_write+0x7b/0x230 [ 327.644647] ? ext4_getfsmap+0xda0/0xda0 [ 327.648729] vfs_fsync_range+0x144/0x230 [ 327.652808] ext4_file_write_iter+0x67f/0x1410 [ 327.657408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.662986] ? ext4_file_mmap+0x410/0x410 [ 327.667150] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 327.672444] ? rcu_read_unlock_special+0x380/0x380 [ 327.677403] ? __fget+0x499/0x710 [ 327.680873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.686427] ? iov_iter_init+0xea/0x220 [ 327.690417] __vfs_write+0x764/0xb40 [ 327.694173] ? check_preemption_disabled+0x48/0x290 [ 327.699251] ? kernel_read+0x120/0x120 [ 327.703166] ? rcu_read_lock_sched_held+0x110/0x130 [ 327.708218] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 327.712987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.718540] ? __sb_start_write+0x1ac/0x360 [ 327.722877] vfs_write+0x20c/0x580 [ 327.726440] ksys_pwrite64+0x183/0x1c0 [ 327.730348] ? __ia32_sys_pread64+0xf0/0xf0 [ 327.734681] ? __ia32_sys_read+0xb0/0xb0 [ 327.738755] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.744159] ? trace_hardirqs_off_caller+0x300/0x300 [ 327.749277] __x64_sys_pwrite64+0x97/0xf0 [ 327.753442] do_syscall_64+0x1a3/0x800 [ 327.757365] ? syscall_return_slowpath+0x5f0/0x5f0 [ 327.762304] ? prepare_exit_to_usermode+0x232/0x3b0 [ 327.767340] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.772199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.777412] RIP: 0033:0x458099 [ 327.780614] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.799521] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 327.799537] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 327.799545] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 327.799553] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 01:31:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x214202, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc00}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x384, r3, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r1}, {0x138, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r1}}}]}}, {{0x8, 0x1, r1}, {0xb0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r1}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r1}}}]}}, {{0x8, 0x1, r1}, {0x12c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r1}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x384}, 0x1, 0x0, 0x0, 0x81}, 0x200000d0) close(r0) prctl$PR_GET_FP_MODE(0x2e) [ 327.799562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 327.799570] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 327.901464] device lo entered promiscuous mode 01:31:50 executing program 3 (fault-call:2 fault-nth:17): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 327.934468] device lo left promiscuous mode 01:31:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xa00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 327.970994] device lo entered promiscuous mode 01:31:50 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x1010, r0, 0x0) 01:31:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x41, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:50 executing program 2: ioctl(0xffffffffffffffff, 0xffffffffffffffc3, &(0x7f0000000300)="9f2124809d827e8853e25c5cbf232598956246a7b2ea4a8c377d99460dc261f55bcead") r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x0, 0x80000) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000000c0)='hsr0\x00') ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x9, 0x5, 0x7}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x80010, 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000340)={0x43, 0x7, 0x0, [{0x81, 0x7ff, 0x4, 0x8b61, 0x6, 0x0, 0x101}, {0x0, 0x0, 0x7, 0x7fffffff, 0x5, 0x7, 0x502}, {0x0, 0x4, 0x20, 0x6, 0x3, 0x8, 0x200}, {0x100, 0x3, 0x1ff, 0x1000, 0x28ecf478, 0x0, 0x6}, {0x6, 0x8, 0x2, 0x80000001, 0x3, 0x81, 0x4}, {0x400, 0x9, 0x1, 0x800, 0x8, 0x6, 0x3}, {0x4, 0x2, 0x4, 0x0, 0x0, 0x8, 0x1ff}]}) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000180)={0x1, @capture={0x1000, 0x1, {0x2, 0x4}, 0x2, 0x8bd}}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) getsockname$inet(r0, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) [ 327.993610] device lo left promiscuous mode 01:31:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r2 = gettid() fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x1, r2}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000040)={r1, 0x1, 0x6, @local}, 0x10) [ 328.128571] FAULT_INJECTION: forcing a failure. [ 328.128571] name failslab, interval 1, probability 0, space 0, times 0 [ 328.189474] device lo entered promiscuous mode [ 328.207829] device lo left promiscuous mode [ 328.208403] CPU: 0 PID: 11484 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 328.219390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.228752] Call Trace: [ 328.231354] dump_stack+0x1db/0x2d0 [ 328.234991] ? dump_stack_print_info.cold+0x20/0x20 [ 328.240032] should_fail.cold+0xa/0x15 [ 328.243933] ? add_lock_to_list.isra.0+0x450/0x450 [ 328.248881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 328.248895] ? remove_wait_queue+0x300/0x300 [ 328.248918] ? add_lock_to_list.isra.0+0x450/0x450 [ 328.248943] __should_failslab+0x121/0x190 [ 328.248962] should_failslab+0x9/0x14 [ 328.248977] kmem_cache_alloc+0x47/0x710 [ 328.249006] mempool_alloc_slab+0x47/0x60 [ 328.249022] mempool_alloc+0x19f/0x500 [ 328.249047] ? mempool_destroy+0x40/0x40 [ 328.249065] ? _atomic_dec_and_lock+0x223/0x360 [ 328.258585] ? _atomic_dec_and_lock_irqsave+0x3f0/0x3f0 [ 328.258602] ? writeback_single_inode+0x1e4/0x590 [ 328.258635] bio_alloc_bioset+0x3c1/0x720 [ 328.258653] ? sync_inode+0x30/0x30 [ 328.258671] ? bvec_alloc+0x2f0/0x2f0 [ 328.271833] EXT4-fs: 7 callbacks suppressed [ 328.271846] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 328.275683] blkdev_issue_flush+0xcd/0x300 [ 328.275709] ext4_sync_file+0xba9/0x14d0 [ 328.287813] ? ext4_getfsmap+0xda0/0xda0 [ 328.287850] ? up_write+0x7b/0x230 [ 328.297873] ? ext4_getfsmap+0xda0/0xda0 [ 328.297894] vfs_fsync_range+0x144/0x230 [ 328.297918] ext4_file_write_iter+0x67f/0x1410 [ 328.297936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.297956] ? ext4_file_mmap+0x410/0x410 [ 328.330486] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 328.332824] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 328.332846] ? rcu_read_unlock_special+0x380/0x380 [ 328.332873] ? __fget+0x499/0x710 [ 328.332894] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 328.387833] ? iov_iter_init+0xea/0x220 [ 328.391812] __vfs_write+0x764/0xb40 [ 328.395515] ? check_preemption_disabled+0x48/0x290 [ 328.400551] ? kernel_read+0x120/0x120 [ 328.404452] ? rcu_read_lock_sched_held+0x110/0x130 [ 328.409482] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 328.414242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.419779] ? __sb_start_write+0x1ac/0x360 [ 328.424109] vfs_write+0x20c/0x580 [ 328.427654] ksys_pwrite64+0x183/0x1c0 [ 328.431544] ? __ia32_sys_pread64+0xf0/0xf0 [ 328.435856] ? __ia32_sys_read+0xb0/0xb0 [ 328.439913] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.445264] ? trace_hardirqs_off_caller+0x300/0x300 [ 328.450370] __x64_sys_pwrite64+0x97/0xf0 [ 328.454521] do_syscall_64+0x1a3/0x800 [ 328.458399] ? syscall_return_slowpath+0x5f0/0x5f0 [ 328.463315] ? prepare_exit_to_usermode+0x232/0x3b0 [ 328.468343] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.473197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.478399] RIP: 0033:0x458099 [ 328.481590] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.500541] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 328.508263] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 328.515544] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 328.522801] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 328.530078] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 01:31:50 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x4000, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') socket$nl_crypto(0x10, 0x3, 0x15) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80, 0x100) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x9, 0x4, 0x40, 0x10001, 0x0, 0x5, 0xffffffff, 0x6d, 0x1000, 0x8, 0xfffffffffffffff9, 0x3ff}) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000140)="d652e77f53a053716358942811e73dcf72e47d25b9fbc50afb53b0e7161d7310aa1f1a4ee3897a3765d9ed9abd60577fc8bdbf02b90e877f21fc46f2fb7359bd2175d31adf3aa8ba6a83b8343697de89a4c30ee7ddf62502113b5a9a5a371acebec1e8c4ef3e574a7a6cd70100010036be98154fcfa3e7a93f94b229fb379fbb71770bf0541d5aff8f01d29225da98e6d242ff85be029fb00e642756bce7678cde4a423f0ae2626b1bd29ec759624ec561e1feb5405d5ce5812c5b492a193bd1a24192f4c8cc62e137a630eb0444348a3b839945def90f25a24864bd894a0098d8e6d2f1a17a208f5e8603ad00a069baaafbcc8cf838960fd28e212687cc7be7f9400bbe792636a1fed448449412319c4fb0ded01a8d0b2a09a6ebef240b1ffee8f1da92de7816f2f755ac78885ba034a0003ca6701e2f2eadcd58d871d9379a9d2c1aa15c3db58598cc60bbf7f840a61e9f0ce7d191b898922361b46deadf84bfc6afe9a8cb51bd7ff675d80b58a89c00ca788280289cba09f602e8a4dc8ab16d86fd1422583e2a88da748dc3e1f1e6936d52bd808429c52cd316b38d07c7") 01:31:50 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) fcntl$getown(r0, 0x9) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:50 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @broadcast}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @remote}, 0x10) close(r0) r2 = syz_open_dev$mice(&(0x7f0000001300)='/dev/input/mice\x00', 0x0, 0x80) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000001340)=""/123) socket$xdp(0x2c, 0x3, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000240)={0x0, 0x1, &(0x7f0000000300)=""/4096, &(0x7f00000000c0)=""/113, &(0x7f0000000140)=""/232, 0x6000}) [ 328.537341] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 328.556387] device lo entered promiscuous mode [ 328.563692] device lo left promiscuous mode 01:31:50 executing program 3 (fault-call:2 fault-nth:18): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 328.659891] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 328.693117] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 328.701193] device lo entered promiscuous mode 01:31:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x48, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) fcntl$setflags(r0, 0x2, 0x0) [ 328.740125] device lo left promiscuous mode [ 328.749881] device lo entered promiscuous mode [ 328.755028] device lo left promiscuous mode [ 328.776576] FAULT_INJECTION: forcing a failure. [ 328.776576] name failslab, interval 1, probability 0, space 0, times 0 01:31:51 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x5, 0x5, 0xd0f6c5efdf10f384}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$get_security(0x11, r2, &(0x7f0000000140)=""/55, 0x37) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) r3 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x8, 0x505000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x1}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000340)={r4, 0x8, 0x1, [0x7]}, 0xa) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) [ 328.815109] CPU: 1 PID: 11527 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 328.822317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.831671] Call Trace: [ 328.834271] dump_stack+0x1db/0x2d0 [ 328.837915] ? dump_stack_print_info.cold+0x20/0x20 [ 328.842949] should_fail.cold+0xa/0x15 [ 328.846854] ? add_lock_to_list.isra.0+0x450/0x450 [ 328.851797] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 328.856911] ? remove_wait_queue+0x300/0x300 [ 328.861340] ? add_lock_to_list.isra.0+0x450/0x450 [ 328.866275] __should_failslab+0x121/0x190 [ 328.870503] should_failslab+0x9/0x14 [ 328.874291] kmem_cache_alloc+0x47/0x710 [ 328.878366] mempool_alloc_slab+0x47/0x60 [ 328.882523] mempool_alloc+0x19f/0x500 [ 328.886411] ? mempool_destroy+0x40/0x40 [ 328.890456] ? _atomic_dec_and_lock+0x223/0x360 [ 328.895110] ? _atomic_dec_and_lock_irqsave+0x3f0/0x3f0 [ 328.900477] ? writeback_single_inode+0x1e4/0x590 [ 328.905326] bio_alloc_bioset+0x3c1/0x720 [ 328.909476] ? sync_inode+0x30/0x30 [ 328.913100] ? bvec_alloc+0x2f0/0x2f0 [ 328.916908] blkdev_issue_flush+0xcd/0x300 [ 328.921149] ext4_sync_file+0xba9/0x14d0 [ 328.925218] ? ext4_getfsmap+0xda0/0xda0 [ 328.929283] ? up_write+0x7b/0x230 [ 328.932810] ? ext4_getfsmap+0xda0/0xda0 [ 328.936856] vfs_fsync_range+0x144/0x230 [ 328.940937] ext4_file_write_iter+0x67f/0x1410 [ 328.945515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.951040] ? ext4_file_mmap+0x410/0x410 [ 328.955186] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 328.960741] ? rcu_read_unlock_special+0x380/0x380 [ 328.965673] ? __fget+0x499/0x710 [ 328.969142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 328.974673] ? iov_iter_init+0xea/0x220 [ 328.978651] __vfs_write+0x764/0xb40 [ 328.982369] ? check_preemption_disabled+0x48/0x290 [ 328.987381] ? kernel_read+0x120/0x120 [ 328.991265] ? rcu_read_lock_sched_held+0x110/0x130 [ 328.996264] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 329.001018] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.006558] ? __sb_start_write+0x1ac/0x360 [ 329.010866] vfs_write+0x20c/0x580 [ 329.014396] ksys_pwrite64+0x183/0x1c0 [ 329.018284] ? __ia32_sys_pread64+0xf0/0xf0 [ 329.022609] ? __ia32_sys_read+0xb0/0xb0 [ 329.026668] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.032019] ? trace_hardirqs_off_caller+0x300/0x300 [ 329.037110] __x64_sys_pwrite64+0x97/0xf0 [ 329.041264] do_syscall_64+0x1a3/0x800 [ 329.045176] ? syscall_return_slowpath+0x5f0/0x5f0 [ 329.050091] ? prepare_exit_to_usermode+0x232/0x3b0 [ 329.055097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.059947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.065145] RIP: 0033:0x458099 [ 329.068333] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.087231] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 329.094925] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 329.102201] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 01:31:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xb00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:51 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:51 executing program 3 (fault-call:2 fault-nth:19): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 329.109478] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 329.116736] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 329.124007] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 329.248266] protocol 88fb is buggy, dev hsr_slave_0 [ 329.248280] protocol 88fb is buggy, dev hsr_slave_0 [ 329.322518] device lo entered promiscuous mode 01:31:51 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfc, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10001, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000080)={r1, 0xe00}) inotify_init1(0x800) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000100)={r2, 0x3}) [ 329.355810] device lo left promiscuous mode [ 329.370950] FAULT_INJECTION: forcing a failure. [ 329.370950] name failslab, interval 1, probability 0, space 0, times 0 [ 329.395002] device lo entered promiscuous mode [ 329.396176] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:51 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000240)={0x7, 0x7f, 0x1}, 0x7) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x8, @empty, 0x401}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000001c0)={r2, 0x58, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0xb3a3, @remote, 0x1f}, @in6={0xa, 0x4e21, 0x91, @ipv4={[], [], @rand_addr=0xfff}, 0x4}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e23, @multicast2}]}, &(0x7f0000000200)=0x10) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$void(r0, 0x0) [ 329.433712] device lo left promiscuous mode [ 329.437998] CPU: 1 PID: 11547 Comm: syz-executor3 Not tainted 5.0.0-rc3+ #39 [ 329.445454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.454812] Call Trace: [ 329.457414] dump_stack+0x1db/0x2d0 [ 329.461066] ? dump_stack_print_info.cold+0x20/0x20 [ 329.466109] should_fail.cold+0xa/0x15 [ 329.470019] ? add_lock_to_list.isra.0+0x450/0x450 [ 329.474960] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 329.480078] ? remove_wait_queue+0x300/0x300 [ 329.484508] ? add_lock_to_list.isra.0+0x450/0x450 [ 329.489457] __should_failslab+0x121/0x190 [ 329.489477] should_failslab+0x9/0x14 [ 329.489493] kmem_cache_alloc+0x47/0x710 [ 329.489521] mempool_alloc_slab+0x47/0x60 [ 329.489538] mempool_alloc+0x19f/0x500 [ 329.489563] ? mempool_destroy+0x40/0x40 [ 329.489578] ? _atomic_dec_and_lock+0x223/0x360 [ 329.489595] ? _atomic_dec_and_lock_irqsave+0x3f0/0x3f0 [ 329.489612] ? writeback_single_inode+0x1e4/0x590 [ 329.489644] bio_alloc_bioset+0x3c1/0x720 [ 329.489662] ? sync_inode+0x30/0x30 [ 329.489680] ? bvec_alloc+0x2f0/0x2f0 [ 329.489707] blkdev_issue_flush+0xcd/0x300 [ 329.489728] ext4_sync_file+0xba9/0x14d0 [ 329.489750] ? ext4_getfsmap+0xda0/0xda0 [ 329.489785] ? up_write+0x7b/0x230 [ 329.497814] ? ext4_getfsmap+0xda0/0xda0 [ 329.497833] vfs_fsync_range+0x144/0x230 [ 329.497857] ext4_file_write_iter+0x67f/0x1410 [ 329.497875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.497896] ? ext4_file_mmap+0x410/0x410 [ 329.579764] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 329.585059] ? rcu_read_unlock_special+0x380/0x380 [ 329.590018] ? __fget+0x499/0x710 [ 329.593491] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.599041] ? iov_iter_init+0xea/0x220 [ 329.603017] __vfs_write+0x764/0xb40 [ 329.606724] ? check_preemption_disabled+0x48/0x290 [ 329.611752] ? kernel_read+0x120/0x120 [ 329.615645] ? rcu_read_lock_sched_held+0x110/0x130 [ 329.620664] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 329.625420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.630954] ? __sb_start_write+0x1ac/0x360 [ 329.635281] vfs_write+0x20c/0x580 [ 329.638824] ksys_pwrite64+0x183/0x1c0 [ 329.642713] ? __ia32_sys_pread64+0xf0/0xf0 [ 329.647023] ? __ia32_sys_read+0xb0/0xb0 [ 329.651088] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.656454] ? trace_hardirqs_off_caller+0x300/0x300 [ 329.661562] __x64_sys_pwrite64+0x97/0xf0 [ 329.665716] do_syscall_64+0x1a3/0x800 [ 329.669618] ? syscall_return_slowpath+0x5f0/0x5f0 [ 329.674550] ? prepare_exit_to_usermode+0x232/0x3b0 [ 329.679570] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.684418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.689602] RIP: 0033:0x458099 [ 329.692793] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.711695] RSP: 002b:00007f0fe1cf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 329.719439] RAX: ffffffffffffffda RBX: 00007f0fe1cf3c90 RCX: 0000000000458099 [ 329.726704] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 01:31:52 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2100, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) sched_setscheduler(r1, 0x1, &(0x7f0000000180)=0x7) getsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f0000000080)=""/83, &(0x7f0000000100)=0x53) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x400000000000000, 0x0) ioctl(r2, 0x1ff, &(0x7f0000000280)="8299e24ceaf318f0382a30032e1ad0f096c23499af64d17809f646a34f21546dd024a4a0d8799400a43e95c03b9216841ea34f364d9005aa45db546561543d049bff324024d71bd4867037f92deff245f3ef3a88a970fd60ed110e635800ec871af48b8e4d97f1186489b39cd241ed25bb47efc25868773c44670c2909471ee4e2ea6d7927a0d3") [ 329.733962] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 329.741256] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0fe1cf46d4 [ 329.748528] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 329.761080] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:52 executing program 3 (fault-call:2 fault-nth:20): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:52 executing program 1: r0 = socket$packet(0x11, 0x4, 0x300) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x801, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000340)=""/106) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='coredump_filter\x00') ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000300)=0x1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {}]}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x6, @dev}, 0x10) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f00000001c0)={0x9, &(0x7f0000000140)=[{0x6, 0x8189, 0x7fffffff, 0x401}, {0x1, 0x0, 0x1ce7, 0x7fff}, {0x2, 0x9, 0x8db, 0x7f}, {0x3, 0x8, 0x5, 0xf7cd}, {0x7, 0x1f, 0x2b78, 0xc3}, {0x1, 0x5, 0x1, 0x5}, {0x10000, 0x7fff, 0x3, 0x8}, {0x5, 0x3, 0xdd9}, {0x100000001, 0x9, 0x1f, 0x2}]}, 0x10) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000280)=0x3) close(r0) socket$packet(0x11, 0x3, 0x300) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f0000000040)=0x100, 0x4) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000002c0)=0x7) 01:31:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4c, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:52 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x40000) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000080)={0x3, 0x913}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:52 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='syscall\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000180)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x6, 0x8, 0x101, 0x401, 0x1ff}, &(0x7f0000000100)=0x14) 01:31:52 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 330.082820] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) accept(r0, &(0x7f00000000c0)=@x25={0x9, @remote}, &(0x7f0000000040)=0x80) 01:31:52 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xfffffffffffff001, 0x8000000) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 330.151281] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x204201) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) 01:31:52 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 330.256353] device lo entered promiscuous mode [ 330.310809] device lo left promiscuous mode 01:31:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xe00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x60, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 330.344430] device lo entered promiscuous mode 01:31:52 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x6, 0x400000) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000080)={0x2, 0x0, [{}, {}]}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 330.397711] device lo left promiscuous mode 01:31:52 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000002c0)={0x50, 0x207, 0x6ed7, 0x8e8e, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000340)={r2, 0x10000, 0x0, 0x3f, 0x5}, &(0x7f0000000380)=0x18) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x100000000, 0x80) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x5, @local, 0x2}}, 0x1, 0x2, 0x8, 0x4, 0x22}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000180)={r4, @in={{0x2, 0x4e24, @broadcast}}, 0x38, 0x6, 0x7fff, 0x20, 0x1}, &(0x7f0000000240)=0x98) 01:31:52 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:52 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7, 0x0) r2 = dup3(r0, r0, 0x1) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000000c0)={{0x3, 0x9, 0x8, 0x7}, 'syz0\x00', 0xe}) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000040)=0x5be3, 0x4) [ 330.535333] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0xfffffffffffffffe) r1 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000140)={0x0, 0x5, 0x300f, 0x1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000100)={r2}) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 330.594303] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 330.638428] device lo entered promiscuous mode [ 330.644093] device lo left promiscuous mode [ 330.655134] device lo entered promiscuous mode 01:31:53 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000040)={0x3, 0x5}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 330.695957] device lo left promiscuous mode 01:31:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x68, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:53 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:53 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='auxv\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) syslog(0x9, &(0x7f00000000c0)=""/226, 0xe2) 01:31:53 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x20, 0x4e0080) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000080)=""/195, &(0x7f0000000180)=0xc3) 01:31:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf19, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:53 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x2, 0x4) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x40, 0x2) ioctl(r0, 0x4, &(0x7f00000003c0)) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x100, 0x200001) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r2, 0xf62}, &(0x7f00000001c0)=0x8) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x15e, 0x42000) 01:31:53 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x200000000002000, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x1ff, 0x0, 0x10001, 0x900}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000100)=0x1) r3 = dup2(r0, r0) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0x100000000, r1}) [ 330.988086] device lo entered promiscuous mode [ 331.006271] device lo left promiscuous mode 01:31:53 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e028b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:31:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6c, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x190f, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:53 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = getpgid(0xffffffffffffffff) r2 = getpid() kcmp(r1, r2, 0x0, r0, r0) 01:31:53 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x2, 0x4000) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f00000000c0)={0x1, 0x1200000000, 0x101}) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000000)) 01:31:53 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:53 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x10000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000080)=""/63) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x9, 0x0, 0x1, 0x4}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000100)={0x74, r2}) 01:31:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) r2 = getuid() mount$9p_xen(&(0x7f0000000040)='*\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x4, &(0x7f0000000140)={'trans=xen,', {[{@privport='privport'}], [{@fsmagic={'fsmagic', 0x3d, 0x9}}, {@uid_eq={'uid', 0x3d, r2}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfshat={'smackfshat', 0x3d, 'vmnet1'}}]}}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x8) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000080)=""/216, &(0x7f0000000180)=0xd8) 01:31:54 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) inotify_init1(0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000240)) getsockopt(r1, 0x80000001, 0xffff, &(0x7f0000000080)=""/170, &(0x7f0000000140)=0xaa) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x68, r3, 0x0, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x7fff, @media='udp\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008010}, 0x20000000) 01:31:54 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x74, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1f00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 331.758940] device lo entered promiscuous mode [ 331.763861] device lo left promiscuous mode [ 331.871173] device lo entered promiscuous mode 01:31:54 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x10000, 0x440002) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x1}) tee(r0, r1, 0x5, 0x4) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r2, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 331.897708] device lo left promiscuous mode 01:31:54 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x2, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000180)={0x7, 0x79, 0x2}, 0x7) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x4200, 0x0) ioctl(r1, 0x4, &(0x7f0000000080)) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x100000001, 0x200040) ioctl(r2, 0xffffffffffffffc2, &(0x7f0000000100)) r3 = getuid() setsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000080)="abeaf3512d534e3078e3554089b5b3c67b3385ba36654a7f42e775b9117ff9a0d93b4dc1f7555c2b7004432e253ec5beb954a7650b6bc743df4f2025e9719725e74f27212fe1ea1916705792ed216f99004efd6a05fba2580697cc7c6fcac902939c743730ce92e58c8a0e06e5addb5fa4a822892426a7d43c9f918fbe6f96098e07b93a1458d320ede4c42a5e102ff284505de3b3635c45", 0x98) setuid(r3) 01:31:54 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e058b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 331.918808] device lo entered promiscuous mode [ 331.934108] device lo left promiscuous mode 01:31:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:54 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000240)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) sendto$ax25(r2, &(0x7f0000000140)="c1db9ec163d8594eb1bd55a0fc06af910641b44a19b781d26286578b19edada984ac94c71159658576cd6e0f23ab6e2861270a5631a77dfcc45ba2ce5464f30f275de5306c85b7cac6990d5cf361c9e7244b7f961a2dba1403faa6a64ac495646bccc701f379b0d9f140057da885b715c30f258dac664e2e", 0x78, 0x4040, &(0x7f00000001c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7f, 0x2000) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f00000000c0)) 01:31:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000080)="4369921d296b04e1e7ea514ebdb4dea3285dc4e8fea3e9fec44097e46d1a6e1ea18dfec32fa7175f52b3ae9a5c642740fa597d38bdbab514677072b2d515c185706e0bed72c0f6885fc4b64ae5") 01:31:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7a, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:54 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x7, 0x6}, {0xfffffffffffffffa, 0xfffffffffffff365}]}, 0x14, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) r3 = epoll_create(0x4) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000300)={r3, r0}) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x800, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000500)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r4, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, r5, 0x1, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x8, @media='ib\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x4040}, 0x20004011) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x60118000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r6, 0x100, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x44000) [ 332.215120] device lo entered promiscuous mode [ 332.249254] device lo left promiscuous mode [ 332.287930] device lo entered promiscuous mode 01:31:54 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 332.312603] device lo left promiscuous mode 01:31:54 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x800000, 0x3) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000180)={r1, 0x2d}) r2 = accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80800) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 01:31:54 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x101000) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100000000600200, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x1, {0x80000000, 0x80000000, 0x8bef, 0x80000000}}) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x602, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x32}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c000}, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 01:31:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2d00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:54 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20, 0x8, "2023c1d37e663e1c28f7595a8bf20679c3277bab4d12620780c0e4cedeabeaffff8fe798a3648da65c679069988999f18659af60dfcb2fbb43db0167f22c6f43", "80835c036635e585998efdc05b945de130a39702f508b75f965c69ae8c4dba7a", [0x6, 0x3]}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc0, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:54 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:54 executing program 2: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1000, 0x200) [ 332.614198] device lo entered promiscuous mode 01:31:54 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x100000000, &(0x7f0000000100)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x81, 0x7) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x2, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000100)) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000080)={0x3, 0x7fff}) [ 332.665027] device lo left promiscuous mode [ 332.680401] device lo entered promiscuous mode [ 332.688881] device lo left promiscuous mode 01:31:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x300, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:55 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = syz_open_dev$dmmidi(&(0x7f0000000880)='/dev/dmmidi#\x00', 0x7f, 0x800) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000780)=""/141) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r2 = add_key(&(0x7f0000000600)='id_resolver\x00', &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)="419dbf41aa53fefea010406791ab8872b54f0ef58f7d4a8b4e79faf0c6f9bbc3ea108f8750463b294b51cf3e8f4f8febe63313bc525f563637712db1f0320eff85afd0a0293e221965990f67b4226add5897bf41206633842381dabbb30799a15b6336eb37b203a86d5ef875d73e77c84a272a334c615a4bcf58175af3a8ff8529", 0x81, 0xfffffffffffffffe) keyctl$search(0xa, r2, &(0x7f0000000580)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, r2) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f00000004c0)={0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}]}) 01:31:55 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x4000000, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) connect$vsock_dgram(r1, &(0x7f0000000240)={0x28, 0x0, 0x2711, @hyper}, 0x10) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f0000000100)={0x980000, 0x8, 0x6, [], &(0x7f00000000c0)={0x990a69, 0x9, [], @p_u8=&(0x7f0000000080)=0xbf37}}) ioctl(r2, 0x2, &(0x7f0000000140)="e13db84eab6bcae8dd6fe2746b4d1b9555973946661b132511a5faca2c8feeb9f39f97e5ae36441a7119379c5ad599537a5e8e11b273dfe633ac5376cfb47f0772a936c5029061af318b20329fbf0f90c4888fe5a66335b2b8041c06c0a25feac26fd5eff30a31831559aea9ad7e6157163269037e3e47f85e596a63e540e733452512dc3d4a94c85f6dc4c7") [ 332.944174] device lo entered promiscuous mode [ 332.951035] device lo left promiscuous mode [ 332.973811] device lo entered promiscuous mode [ 332.984919] device lo left promiscuous mode 01:31:55 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040), 0x10) pread64(r0, &(0x7f0000000080)=""/100, 0x64, 0x53) ioctl(r0, 0x0, &(0x7f0000000080)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000140)={0x8000, 0x1, 0xf39d, 0x8}, 0x10) 01:31:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x400000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000440)=0xc3, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x8, &(0x7f0000000180)='lo\x00\x00\x00\x00\x02\x00', 0xffffffffffffffff}, 0x30) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) r2 = getpgrp(0xffffffffffffffff) r3 = getpgid(r2) ioprio_set$pid(0x2, r3, 0x3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8c600, 0x0) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f0000000340)="25414c449f9ac9cec1836d1e4de34fa43a4fae8ce6c6c0d3f7f8f6ca6047614029d243a6d8a8e3a2f328aefb84968929b3a15a980b504ba7ab6911db9c4fccd75c5a4be117f83012b887192b0911b530cce3714684a7da17fd6882dfa0bdc29b2f6c736431e744db751430d602a5a8c29c54ffb55191daaceba88400d4f1bb2bb5cf57c58124e407d08b712c446844fe4950fe7d26a04a6415f0f1443862abca229135d4b93dc0191f2d6a6138f37d606eddd47f7a416e2fe90e89f15c950a4703f8") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r5, 0x3, 0x6, @dev}, 0x10) r6 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2180, 0x1) getpeername$inet6(r6, &(0x7f00000000c0), &(0x7f0000000100)=0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000300)) close(r0) 01:31:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:55 executing program 2: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x480000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000180)={0x171b8000, 0x1, 0xffffffffffff8e9e, 0x998, 0xfa}, 0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000000c0)=0x0) sync_file_range(r0, 0x10000, 0x4, 0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = getpgid(r1) r3 = getpgid(r2) r4 = getpid() tgkill(r3, r4, 0x2c) r5 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x374b845f, 0x101000) ioctl(r5, 0xffffffffffffffc3, &(0x7f00000003c0)) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x10000, 0x101000) ioctl$DRM_IOCTL_AGP_RELEASE(r5, 0x6431) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x7fffffff, 0x80) 01:31:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x500, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 333.241732] device lo entered promiscuous mode [ 333.282969] device lo left promiscuous mode [ 333.298081] EXT4-fs: 24 callbacks suppressed [ 333.298092] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 333.313254] device lo entered promiscuous mode 01:31:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:55 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x80000001, &(0x7f00000002c0)="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") syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x9, 0x800) [ 333.336801] device lo left promiscuous mode 01:31:55 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x52, 0x220200) userfaultfd(0x80000) sync_file_range(r0, 0x80, 0x1ff, 0x6) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000300)={0x1, 0x0, 0x2080, {0x10000000004ffc, 0x0, 0x1}, [], "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", "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"}) getgid() [ 333.401877] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 333.451370] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:55 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x3, 0x2) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4100, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 333.549882] device lo entered promiscuous mode [ 333.555786] device lo left promiscuous mode [ 333.569252] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 333.578310] device lo entered promiscuous mode [ 333.589100] device lo left promiscuous mode [ 333.837069] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:56 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)="b65890dc1162b0016594b82f81524fe613aff8ac38ea0d6eceede42cb54e0971ac4206a9cb6a6633465d2a6ce5fc921d9d8fd038d1cff54c7feab90644d41ea8bdb3cbf90a12ada63e5d196d9d13c43d73d263f00318ee117b2a6eb0305e7fcad4e13b67c070505a414451d05438115479a48c4046bc8290717254240aebb5cb9df81a00748b90346230181e2b359e78df1f") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000200)=0x2, 0x4) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f00000001c0)={0x9, 0x80, 0x961c, 0x0, 0x1, 0xffffffffffffff80}) connect$unix(r1, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 01:31:56 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200000, 0x8) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x2, 0x200000) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000001c0)={0x6, 0x3, @start={0xffff}}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={r1, 0x3, 0xffffffffffffffe1, @dev}, 0x3) close(0xffffffffffffffff) 01:31:56 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) pwritev(r0, &(0x7f00000004c0)=[{&(0x7f0000000040)="a072af67dc1a0d6a57de1264b16769e22300b47006c17594f7a9296569bb971c675f4ebd6ece77eac00540ef14543a5da40476f3e71c10c3", 0x38}, {&(0x7f0000000080)="1fdced5991baa24f5442fa5319dd5a4ffd14b69db34bb6e17167f3d0b1e3088c1037d8ad8f6b318cc84bfa7ef7d84438a75e4bbd60d3ffc2c7df822160d48d0f05ea529225936f1c6dee802cc6ad4195240affb2e88e24054cc8a281fd6c20348c817bfdc5160193f37baa637d30bf1273c9d2795c979dd71c64f76fc11746d9839d59b9", 0x84}, {&(0x7f0000000140)="f4737d7be98782a62237033ca9de06e66443cbf5d508ec04338dc99ca5c75a847684d56c55a8cf0c8cf0257d077790c0a3541540655149114ad9d08d8d03b60120cf1cbf9e32f5f3a3eec276a554010d926af4e3f5ebe2790f21d80e3dde501ee69c4fb7f9ea345ae9852e4b972ba52b92c19a5a30d23a3213365afd11e795f49965b1b4a63e6eaed6cb7210477f0f49d10e56818a7a286bf8c61c61bd42f1b38cef007b929aa29c8d47a4e439b5f5348683eb7dfd291ae81a02cc", 0xbb}, {&(0x7f0000000200)="f7bf326100768027e02922b036eced21f3c733496813baaa3f17ea81d4cf8ffd865a55ca35fd3753ea7e01446af084f66de22c2fc1199f60d96c0c1f9c78687cc441567570e1d23ec940aaf015066bd7d0a1b8e874428e35b0fc5d3bd512012c8018abfd140ef0d43d2adb2e1fcc8ee0f4331a2f06fc226a0c05e9383c0a5ef5e2dcbd18a379dcc676925cc4de07fa8b4b2018e3d6deacce23c32e4028dba812b53bf4f90490700b4273d29d562939de83ac0fa3c9304125bb5c0da4a8de549cdcbc3ba10ec616f14f2fda0b789607c308fa008f58724abe434434eb815e49e7f1bfb0ae2864ece14e3b", 0xea}, {&(0x7f0000000300)="8644e142a52393b1760f8944cc02f6033c01a11544f1f4526268be2e5bd82f5706c0cdee6db21a7e103a4c7a6449", 0x2e}, {&(0x7f0000000340)="7da7c3421c7644bc2c98058f14ff377283dab468ccbdbe06af1b5b778e391d187ff028f9aa77293f1178a512136b6a59d93b7c860835f79141a6ccd8469442a82cfe47ec0fa768a0093b774620683a87fa8f518564739f950c5df572b65daa1d91a4e2882795da6979532a1f79b30ab566f593baf92110133af30c4f16f91e980841474093955ebf662e7446fb327d", 0xfffffffffffffd97}, {&(0x7f0000000400)="f91a7ebfeeda985d0f75009b39fbf09362f931e5101ed81132484c3222b056e45c7f1050e174185f039908ab990699bdc528c91d4ef7a43fb2e733f76127b24af5842aa5911d4fcf5b5e5ca8b96b6595002941724bab6044e42e5230429a68a6cda7068b4f8234a2f14191332d68ee55c187d363ce254fa9fb502fbb0fe50f8df0955073f8cf365503fe563161f5b5748e4158cc3850a052b7e9bf321d57cd7524ae7d96f427682c61bf15dfce93", 0xae}], 0x7, 0x0) 01:31:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x600, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:56 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 333.887364] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4800, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 334.038326] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:56 executing program 2: syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x4, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)=0x8008, 0xfffffe65) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f00000000c0)={{0x3, @addr=0x6}, "0334b7402cff8970d8e32ad281d0447efe39c6a41792cddfaf00", 0x2}) ioctl(r0, 0xffffffffffffffc3, &(0x7f0000000000)="fed78d80e3047b34e7bc50d867") 01:31:56 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0xfffffffffffffefd, @random="9ffb7035e9c5"}, 0x278) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x800, 0x0) connect$pptp(r2, &(0x7f0000000180)={0x18, 0x2, {0x3, @loopback}}, 0x1e) accept4$packet(r0, 0x0, &(0x7f0000000140), 0x80000) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:56 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x20, 0x40400) ioctl(r0, 0x100, &(0x7f00000000c0)="95314d625c2dde5f23b7020808d14a103d7b464c5aade6d9f88fc17d46689b3b8602add4a527f4cece5cafad539c90a23554df598687e9d5091bd4874678f75478c19609c951e2030891e3adc4bdd3ae70da43cc2591a019859e83fe682a8d5420c00ad1a7") r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000180)) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r2, 0xffffffffffffffc2, &(0x7f0000000040)="38f5bcee47799d0900000000000000") [ 334.138500] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 334.160093] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:31:56 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 334.186941] QAT: Invalid ioctl [ 334.209930] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 334.212011] QAT: Invalid ioctl 01:31:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x700, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 334.272127] QAT: Invalid ioctl [ 334.285720] QAT: Invalid ioctl 01:31:56 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x3ff, 0x4, 0x2, 0x3, 0x3826, 0x3}) 01:31:56 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) recvmmsg(r0, &(0x7f0000006800)=[{{&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000003500)=[{&(0x7f0000000180)=""/246, 0xf6}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/79, 0x4f}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/233, 0xe9}, {&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f0000003480)=""/71, 0x47}], 0x7, &(0x7f0000003580)=""/134, 0x86}, 0x400}, {{&(0x7f0000003640)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003940)=[{&(0x7f00000036c0)=""/242, 0xf2}, {&(0x7f00000037c0)=""/124, 0x7c}, {&(0x7f0000000280)=""/34, 0x22}, {&(0x7f0000003840)=""/221, 0xdd}], 0x4}, 0x7}, {{&(0x7f0000003980)=@alg, 0x80, &(0x7f0000004d00)=[{&(0x7f0000003a00)=""/188, 0xbc}, {&(0x7f0000003ac0)=""/73, 0x49}, {&(0x7f0000003b40)=""/4096, 0x1000}, {&(0x7f0000004b40)=""/80, 0x50}, {&(0x7f0000004bc0)=""/196, 0xc4}, {&(0x7f0000004cc0)=""/25, 0x19}], 0x6, &(0x7f0000004d80)}, 0x5}, {{&(0x7f0000004dc0)=@hci, 0x80, &(0x7f0000004f40)=[{&(0x7f0000004e40)=""/220, 0xdc}], 0x1, &(0x7f0000004f80)=""/4096, 0x1000}, 0x401}, {{&(0x7f0000005f80)=@sco, 0x80, &(0x7f0000006740)=[{&(0x7f0000006000)=""/225, 0xe1}, {&(0x7f0000006100)=""/130, 0x82}, {&(0x7f00000061c0)=""/241, 0xf1}, {&(0x7f00000062c0)=""/215, 0xd7}, {&(0x7f00000063c0)=""/184, 0xb8}, {&(0x7f0000006480)=""/31, 0x1f}, {&(0x7f00000064c0)=""/214, 0xd6}, {&(0x7f00000065c0)=""/253, 0xfd}, {&(0x7f00000066c0)=""/119, 0x77}], 0x9}, 0x5a0}], 0x5, 0x3, &(0x7f0000006940)={0x0, 0x1c9c380}) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000006980)=""/227, &(0x7f0000006a80)=0xe3) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4c00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:56 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:56 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x4, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:56 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) socket$caif_stream(0x25, 0x1, 0x0) [ 334.538980] device lo entered promiscuous mode 01:31:56 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x40000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e21, 0x20, @empty, 0x1}}, 0x80, 0xe158, 0x3, 0x1, 0x2}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e20, 0x7, @empty, 0x7fff}}, [0xff, 0xf1, 0xfffffffffffffff9, 0x3, 0x0, 0xe53, 0x7, 0x9, 0x4, 0x3, 0x8, 0x9, 0x7, 0x81, 0x5]}, &(0x7f00000002c0)=0x100) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000340)=""/139) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000080)=0x1) r2 = syz_open_dev$dri(&(0x7f0000000300)='/dev/dri/card#\x00', 0x11, 0xfffffffffffffffc) ioctl(r2, 0x100, &(0x7f0000000100)) 01:31:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xa00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:56 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 334.589258] device lo left promiscuous mode 01:31:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 334.610607] device lo entered promiscuous mode [ 334.615762] device lo left promiscuous mode 01:31:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) recvmsg(r0, &(0x7f0000000a00)={&(0x7f0000000440)=@hci, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/73, 0x49}, {&(0x7f0000000540)=""/235, 0xeb}, {&(0x7f0000000640)=""/175, 0xaf}, {&(0x7f0000000700)=""/50, 0x32}, {&(0x7f0000000740)=""/210, 0xd2}, {&(0x7f0000000840)=""/109, 0x6d}, {&(0x7f00000008c0)=""/155, 0x9b}], 0x7}, 0x2000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000a80)={'vlan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000a40)={'lo\x00\x00\x00\x00c\xfb\x00', r1}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)) r3 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1, 0x2000) ioctl$sock_x25_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@null=' \x00', 0xe, 'ip6erspan0\x00'}) 01:31:57 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200040) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001200)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001240)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001340)=0xe8) stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000001480)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000011c0)=[{&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000001100)="c85100114054410b7a06e127a5a976dc838971f4701c08d7a9182e6a8abe45fc396939b3d6ee181f5e0a", 0x2a}, {&(0x7f0000001140)="d181ab684d2bae88e2d3c975e7e452d93a586dcc6547c41eee46301e4a1b25ad6637395d00beef4fb813917f3b036f46824e3767c79560dd5b1f599bd2f58546aa2661a0fb9b9a1c7c007ae4b468", 0x4e}], 0x3, &(0x7f0000001440)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x20, 0x1}, 0x0) r4 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r4, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7, 0x800) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000000c0)={0xffffffffffffff54, 0x4, 0x0, {0x80000000001, 0x80}}, 0x28d) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x2, 0x1}) [ 334.854585] device lo entered promiscuous mode 01:31:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xb00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:57 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:57 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x100) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6800, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 335.002645] device lo left promiscuous mode 01:31:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 01:31:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ftruncate(r0, 0x5) 01:31:57 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x4) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000080)) [ 335.234751] device lo entered promiscuous mode 01:31:57 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 335.261703] device lo left promiscuous mode [ 335.274403] device lo entered promiscuous mode 01:31:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) ioctl(r0, 0x6, &(0x7f0000000040)="be1271ea215dd7c5c58bc0a2f3522dffd7d7186d1bd4d4e422b91111978b6990bf84b5d5fe0a1b8cc823b256e94a6a3dbf4f2e98c2f51d30327b42829c604173aa2d2d9b4e2b074243eb75c77b0990ec532e7ab3703db3d6a95e9948cc9eb466590e64f6ccb29e4b4f32fb6c62b5f42a7bce24417385ddc0f8f610c5898f11d1179c005f957d51f8f3cc25d8") [ 335.315359] device lo left promiscuous mode 01:31:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xe00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6c00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:57 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) r2 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x389c, 0x400000) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000100)) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SG_GET_TIMEOUT(r3, 0x2202, 0x0) 01:31:57 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 335.508660] device lo entered promiscuous mode 01:31:57 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffd, 0x280) sendto$inet6(r0, &(0x7f0000000080)="a342b360d25d19b12dbe2f6a29c5a9fc8c159601f7f4d6a765cf797f68c70d06100f8e04057abf97333c9d10b0ad01218150bb92ecbaafc7a4a353ab39a01c613817a3c7c79e650468c83362b67e54108fbf713abb4765353ec948c5aaafb1f452d23c1a68efb8", 0x67, 0x20008000, 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)="a5ed60045d9db45db122bab97dc201b5c127fea5540f68145ff9ac044505a2fb8e5d51b07152876f2d338c7311efcea06cbf9d1b9c91b20135aadc51cab91988da964417389713a6bf346c6c32d2886b4cb5fbed8936af233e7e15ab12f531316826ae1c2f68ffea") [ 335.539045] device lo left promiscuous mode [ 335.550561] Unknown ioctl 8706 01:31:57 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r0}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x440000, 0x0) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f00000001c0)={0x1ff, 0x3, 0x8001}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={r1, r2}) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 335.586086] device lo entered promiscuous mode [ 335.603693] device lo left promiscuous mode 01:31:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf19, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 335.640107] Unknown ioctl 8706 01:31:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7400, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x200) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000000c0)={0x0}) r4 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000240)={0x8c, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="03630840", @ANYRES64=r3, @ANYBLOB="0f630c40010000000300000000000000046304400300000009631040", @ANYRES64=r4, @ANYBLOB="010000000000000011634840020000000000000003000000000000000000000010000000000000000000000030000000000000000800000000000000", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000200000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000004200000000f610a1f74d49c5ea1179108114fc133bcd59453cec02a09855c4e60175492878347f00c04ab9687c75f3b16af74cd67964965795595c4a9c50c5057a875a5d5ff0a2965d6267e01df2505400000000000000073ce5c55e2c16fbee3071496f636f48051a9eac0fe84cff30dc1cd2563a2a25b9c44799e397d672b8f2c19723fa235ebfe9168139990d3855d768593d49fb"], @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="01010000000000000563044003000000"], 0xa5, 0x0, &(0x7f0000000300)="661ce3cced9f0d857e5682405c8571378fedaeb61ccc6bba26e54f65c020043a3af3a6583081967940f2e545103224368517b73856554d0f7c6b5bad73887c32df62d61253d502d9e367834619a0dec835048f8d795180756879d345aeffa226947103e363dd7d21e00078d635bac72070a43ed326667a837c74b0679be624cd80b823498d449c420dfb3b6eeaafb4ef6de3a16c24f9a2a5f296eb2ed477eb0d713314e298"}) 01:31:58 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:58 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000080)=0x7fff, 0x4) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:58 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffffc, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) [ 335.827307] device lo entered promiscuous mode [ 335.839407] device lo left promiscuous mode [ 335.846272] device lo entered promiscuous mode [ 335.875588] device lo left promiscuous mode 01:31:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7a00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x02\xda!\xed\xff\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:58 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000080)={0x5, 0x0, @start={0x74e5}}) 01:31:58 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f00000000c0)={0x0, 0x7ff, 0x1000}) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x349402) ioctl(r0, 0xffffffffffffffc3, &(0x7f0000000180)="e7b06ffc7eefc067ef57d71dd969672c2ecefbf0cd93f7b35068cc164be4504dc5e43b2593640df097337c86a9ef51bf51885eee250a6d24eafc5a8f45c0d8ef26731f83148d1de79aff9de5145728ff62b362e8ec74fc8a03cb8a2bad322476a049714503e23024aa2f2917aaae5a1f65aa82553f81cdd498629c8ef025520600826fd812198bec0a8490a758ad81df232d81c01402") 01:31:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x190f, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:58 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:58 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x2000000004, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2000, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80000) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) 01:31:58 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x10001, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='nv\x00', 0x3) 01:31:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xfffffffffffffeff, 0x10000) getpeername(r2, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f00000001c0)=0x80) ioctl$TIOCMGET(r2, 0x5415, &(0x7f00000000c0)) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x5, 0x400) close(r0) [ 336.179668] device lo entered promiscuous mode [ 336.186059] device lo left promiscuous mode [ 336.197701] device lo entered promiscuous mode [ 336.203247] device lo left promiscuous mode [ 336.308467] device lo entered promiscuous mode 01:31:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:58 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 336.352102] device lo left promiscuous mode [ 336.359804] device lo entered promiscuous mode [ 336.365851] device lo left promiscuous mode 01:31:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1f00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:58 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc3, &(0x7f00000003c0)) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101400) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000080)={0x120000000, 0x56, 0xfffffffffffff001, 'queue1\x00', 0xfffffffffffffc00}) 01:31:58 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x100) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000080)={@default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0xd, 0x400, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x1) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000100)=""/56, &(0x7f0000000140)=0x38) 01:31:58 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x78, 0x202000) 01:31:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) [ 336.591192] device lo entered promiscuous mode 01:31:58 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x40000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 336.657274] device lo left promiscuous mode [ 336.689962] device lo entered promiscuous mode 01:31:59 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x120) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x2, [0x0, 0x0]}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0xa78, 0x9, 0x8000, 0x2, 0x3f, 0x0, 0x4, 0x4, r2}, &(0x7f0000000140)=0x20) [ 336.716294] device lo left promiscuous mode [ 336.745307] device lo entered promiscuous mode 01:31:59 executing program 1: r0 = request_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='lo\x00\x00\x00\x00\x02\x00', 0xfffffffffffffff8) keyctl$invalidate(0x15, r0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) close(r1) [ 336.784398] device lo left promiscuous mode 01:31:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 01:31:59 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x9, 0x600001) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) recvfrom$rose(r1, &(0x7f0000000140)=""/4096, 0x1000, 0x1, 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:31:59 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c058d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 336.960027] device lo entered promiscuous mode [ 337.037122] device lo entered promiscuous mode [ 337.057496] device lo left promiscuous mode [ 337.068937] device lo left promiscuous mode [ 337.079783] device lo entered promiscuous mode [ 337.084698] device lo left promiscuous mode 01:31:59 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040), 0x10) pread64(r0, &(0x7f0000000080)=""/100, 0x64, 0x53) ioctl(r0, 0x0, &(0x7f0000000080)) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000140)={0x8000, 0x1, 0xf39d, 0x8}, 0x10) 01:31:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2d00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:59 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x9, 0xffffffffffff8001, 0x1ff, 0x101, 0xfff, 0x9}) 01:31:59 executing program 1: r0 = socket$packet(0x11, 0x400000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000040)) close(r0) 01:31:59 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:31:59 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000040)={0x2398, 0x14, [0xfff, 0x7, 0x5, 0x8, 0x9f5]}) [ 337.341015] device lo entered promiscuous mode 01:31:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 337.363835] device lo left promiscuous mode 01:31:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:31:59 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:31:59 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10000, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0x0, 0x101}, 0x2) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 337.524653] device lo entered promiscuous mode [ 337.558854] device lo left promiscuous mode [ 337.572889] device lo entered promiscuous mode [ 337.626985] device lo left promiscuous mode 01:31:59 executing program 4: prctl$PR_SET_TSC(0x1a, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$nl_generic(r1, &(0x7f0000001480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001440)={&(0x7f00000000c0)={0x134c, 0x2c, 0x303, 0x70bd2d, 0x25dfdbff, {0xd}, [@typed={0x8, 0x2d, @fd=r0}, @nested={0x10, 0x3d, [@typed={0xc, 0x8a, @u64=0x2}]}, @nested={0x128c, 0x2d, [@typed={0x3c, 0x17, @binary="a879125f6fa76f183339babed0ab022af426b3533e5d179430f25730d1d63b50e872d15aae093f20e6ee538f34dbc53a245dd6399c"}, @generic="b6f2808b2cf85f6585bb20ce788f088f62bfee2d6fbde747b7948c04c1334136467bb7bcd37b803982cc9fc2bf7ead89f67c73723d92e9c2e4169a8bdae667fa494917ac1b46bd07ca75a2b7ad743ce051c566d458f1141709764db06726f407e9a3681708e60219e5190833b7e20672b10abacda9ad9d8ff30e637d0fe5609058e05b013048d3c37c579ef07e9c2e71", @generic="3581e5b36cfded4be0a98fae6839880124c9eb0a337679cfebeaa509de0f3d0e4f8fb8d6392977565089467ed27ee74ce74b537637f2043b2cc531e12af25cf64c5ee2d72492e248151e5a3c42496bdcf032d79ef6702824ea6f123dd142dff81c793399c5b76b5bba39acaed8c659338a51b643c142dfa6fadec80399e959bca98cf87a2a5b", @generic="52f5e3aa99b3d0fb14fd1f5cfaf348ffed8d4c3d432e7861667c4eaff31ddf3773efe3be773239a636daca691e21c67f06d6b9386b754cbcbeee99f89c1a2fdf0adf70f7ee53a2522551f5a4d7f50556299a3ee82d749e82082b2301b8042a446109812c6d2542728ae534dd72df9a8e62f36b4a46a68a20e0bc74bbe70f3e4036fae8a40195686baeb0abff80afa1c2a799f468c7ef72afa3034a453c18efc17a62045c2fdc3d2166eb86fd15164eef6880b2ee7f43532f704f4150fccf6a4364fca6178b21e8d1", @typed={0x8, 0x4d, @ipv4=@empty}, @typed={0xc, 0x5f, @u64=0xa1c1}, @generic="674258b8fa4b70f2943527dbb6bf6a87ded9fe4a4a7f8460b7372326cda63127c3ee0e7c03be2d23a46d153270c10e16e35471a0a716281483ad46865d05217c309b5e4938a1cd3622c4788d41b210c9adcbc26d82fc14eec7f45a63de8a666f2aeb0078b51d531fb3bde8a76e136ed3b7dc8112100d99ad3963f9c7896bd18564e53071fd8865a6cd58c6e9c20e9278a8e0977f0573a818f30c6a7575c9eeb5945e52a5679ec43f308ac7ebb473da396a6869c05dc2c7b575cd6009e89ca0dd0b30067a96a61c2f5f444ca7a381d4b566eaa9e7cf047a790b78935dd5c8110acfda4484774412bda79abfe8e0936e221f12576ab7af88613b0fd50cac68420db76a4fdfbdb849823e461559b7fa0a2c057691e870d0849a69eb85b0213492e96e2ac1499dc1b67664f264e858aed02383b93b6d5edae3c005ec83348dac045782c045a478450c983da798b6999ad6645b29b7d87dd16784a27d7fb13aef8bd723e0551323c5bd57ce6eee382be22450c8e6948d713047aed576853b9d52bd088687d8950f2f6993a08163e654d6a814b3dc4697ee4b3859c4ad8f39d8a6cd0aabe287ce59cfddc639ba8c714b2e01592ae01a1093019660596069d1ca256ac98d0cba8e1253679eaa7a2389a42785ce51a9b30fa6b9a7d5348989adb025ad41daa95c34cc03e1ec59a606f650401358b059fb2541ecfffacde6daf6e2c9376fb8887e051a62ae0810dcd27da6a0d109fc291af2e208fe869b2e0890bbbb563a084398f8d3f6ce99b0b7daee31d423112cc2593298de11b245ce36c8e4fec65c456c8b3689c228a7b5680a3c0e61da6d829892f3ba830a84c3acb989e3b6623ea7b4e2b124edc3fbb9ca583571a5776ab1212aa092a726758ff194bcdf5c09e73fd763974b9e53ec1ceba9f6fdab69a15df82880ab3744ed41e708c0eb7652d9b012267e38bb825a1e3c3bd1ece9707ad56d4f09cb6ebea4bb931d6afcb19d2c452b58d02ee720491d4208d8e539f822a60e1fca9cab00a102a342adf475aceab3821bb0980b5f752dfa724bbc439e5621722862a7741bd5f8c41b7cbf3ff5a7b703ff62c3052c308494d18e6abd03a2d72149dbc8e21823d670e6ba19467edc3a03a3b098ff385dcbe7d6ac118f70bd24b22a67fc4d70da124415afb743def3eb7147d176ab9cb94c05b7175b5221e56e9cd642e5112463b78a75b7a5506e91d7d17850ab040649cbd9057083ede268b5399c5382a8872de63f7a7a6a038ee594726ac861491e8a68f3d9ec6baf808ca17a44c1712f5e59d99f2036a20103eb62a29ca0c5b8d08195d99ea25bc2dbae0267eba3509f4024d79ded75c178c0935a2b8173cf88c58c13a9cc494c20026612d9b8c9007696f6c0a37da52aa3427faa7fa32efa063fa122658a96839d8a60c7f91909fcd0642322bd334bf28a4e4938a8408232843b5490853567aac1982087d214936359668591ed669cb4d58790af92b05b2e2f81c29ef9fa8ae19f14cf86ed13496a3fd46ce6549586d2bed04b6681e6f76ade3ac981183a66f0ca9b8f4ce69689be76a6699f26fc9ae093c2d96deca1f0a5941a344089081b57775a6bbbf2c35a58a98ba177d469c02cda27ebab4d317049514237e5c12dac4e8d14bba8eea503a773fb64599ebcbeeb310cc5f92db1cd849ad614c1e3dc2e977c6f8584f4965724d03c942d4e628159be018263e4190f90139bf9ee30d25f1a38e271b485cc131bf5fd557ea766aba55508413d767103685362b2e169997a5193449f77d2ff4f663ff380882b26760dd6773a73ed7852c57e2a825f5d8e2034620424b688b20bf0f129f6e8aeef311848edde4be0a2427a84a384c799c64cd5adf72d9ece5d4c062fd08366e0a6efff8e89c752a29dab55cab4026659a052ca7015f2bd8fe38d6c85b4328d9c95faa5e67153924c485a8feaa72afe71b56657e3369afab7c869d2bdb7f0a526442262d554946f5ea25c5a900756894e817a4f9d974c9dd6b42ebeba2b547cfa71e4ef2d80002cefc01caf432d486a11b517110c177b61cf7096dfa8fd8e9e379a827e060e4757fc44415c2b19086d32bfe56f3b26b7bb00379cb81841823969ab3d62a91e76e41f4d2d5d3a8065485894d15b26e2a9bb8138e333c7ac3b5101a03c7c547fa6411473c40736c0885927ce8239e88579a25e90c8f205a302204dd35098f4f55e5038fc8294b67d3ca0b5f73b521bae00b803aaa2b9107a6327453ef0ef182ca1ac42fc575246d0f3e9f1772a8c8aee50c16cab9a7bb9edd7bf9aa492dc18ba4d9bfd111512a7da44b8c2033fbb3e06f925a7dfacb3f5703818650d6a3cde73e52caa12f799538055e99fb025c177a5da8282a80d9b2ffdedaa1fd4533920e8fecd83cd1f0df883ac6db66062af8bbdcde6c3797e9355adcc6f66ab96abd3e5856803c0152bf9dd3d17a653f2f9d972ca391a579cebe7cc91dcd7f3ebbf9727d204ed7081edfa5026436715facb7764c6658922f4a1599eda0404167f0268ecdbd76d4fbc7d09db6e1f2e3038b8ebd9039bd86c989444caeed7bca827403b6ae85dbb6d21dc8eff9232f3adee887b66aae41c4b1777920bfce406619d915a5ceb76290713f61bc35bcdc1bf908334b7a474ab91629646c6591f1068840003c4613d3abe7118a53c4d354ebbd9f4e03d70d64e0902063b9ec3f2a7f41c88a81c51dac7ea5a30577938d2deb1e317330c12b38af619266ad7e736908eb0b44a3ff87c202dfed7503163464a719fc44f13a68db1113aa5c12b114902b0054821de501a2f1d08693a80ac3e25cd0279e16edf3c306c92d3e2ea82645cc8b5c74d6de129dc77b12df23d56df5d52428957e3c4a8b91b2e3b194fcc20b54c05284b7791b625a5d238cea208ebba1c278b19e34eab47042f657b987aa6b9b0af3ec7333000df19c8c3ae4c382196a1186267f226e8955825391d1038fcde300f97a6f14ac9314aa952f7f8545478d7bcc37404186dae0d3adaa257155d6dfd3ce402dbf9b9e870989957ce2080ed92a16d867d67bfce02b176bca75d9b089e54cee93f8da8d2d09db884783f78e9e3473736a8d455846aa36baabba17d10cea0fb44d5b854b0e1495ff75dc1d9adbb1b3ba29b016428baa8b7c527f0feebdc4eb87e9dafa49ec724e28006e3d34d426b444e1a03f7f9dcd1fed97398124b900ae1edc69b8a4e2706e65438d42115828a2d6d28ef64d1e912e12ae0e875b4b18c637255b14876d92926bfc6bd828117fb90e5195e552fa43927e59b116f9650c7fb709e4b516b5c2f2842b9b021f9abaa88b0916c4b577c05b08f3f290f148261af8a39f71359164620894454a011d8fb87fc6d56d3ec26eb02f0d1fc586af8da24af4fdb85bd6a8a44b61176438da5b627be0676d1258005dc6445a6dc2914d3ddd86edb232defde3f754eda5048f627cf349323a9f4ea4730c4815c45d98775a194221ffe5d9760be2e0688633da052d4b3e84964e513788f26507dd14132bc1fff04d83b239ad24ef4125c3fb9c5d02ef5ef73fdada1ce5f8043f88ac869ca1460a0f4cae1540c2977124577c32fa83dedff7a2581674e70be3c6e65afc536d46c65a50f91cfc162128e2732e65376db7718e36259b07eea51d010bf33865f1c6e35338e72380d74a792d9373d98caa96a50db7cbefe301113c41d0ceaaf73f7f692ba49c209aaf8eee61e8761560cb9924ee2b02e87525f6f566509ec170047ff8e247c79be5ebaa4f9bdb7759284f408fdfb2389ecd006dd31b72ff43ce47e5aee0656ebee43b3289d663c7e41773acffe57707b5329fc50ae4ab980588ecdc17e5d55f39e3c3f2818d5d51d964ae9a6ad90cd0b987203154463f661798554afaca131d57eadcf5e46d16a63e39f429c67c3a73dd5108ef651ae65dd0d93ba6e829845ce4b5953d7bfbce26e0fa101bd35f6793484c0b7e4198f5646642bec12a6542a07cac745ce7f151b20cb00d86f6dcaceca3a87868a038c130f340bf57826bd822a7d92fef035a45d029fcaae37712c2d6a4336e7e840a425c7477ab77005da29a3c4e48449e7e6328e74dce120e6f68c33d5ead5d8d65bd238edba7e0e4496588a57ae11262cd8e620e8a7e6615de35420b2e64455b66853073d8ef593544f6680b81412bf8d52b1db9ec49510c73a5ed3f09fd3f252ac7abfdff10174c611b087c173b341a44e5c927ce08a3b1852497bdfa02c11257140cdf8bbfa3982334d3896dd29148b88f19c17a1435b267dc7b1da5a11150422fb7f37c178b1788af1971c1486ddd0a2f75b04dcc84e922c8d30157b1ed434059669e3b13624dc3353119543efbe6d7dccf79839ded45c0a393e7f5aed954b50574ddcea00dc48a8ed689c887c99e74246d8e06300e4eb236a23f8dd1342e9c06cc7cdb32b4f2c3c0e82776caef92db768546f8567b6ea2a5b91f234a3c0b84c96f8c4494947c6f6885cf438fd63ff094226afc93196f2a7f009084200e236ec0c6d8005151b94ec558c2e278ed72eeda6ecd2e6f8456ed00d64b0ca28d7dc993c614f96bb27ca11fd687de88db911d90ed1cb99845056774038da21e309a6ae3b7393c3df195f94cb07da994426cedce7d352ecc3f834a5bc39089cba5accbb7c2d8096fb31627c68b5f58d83ae7c41a03cf771907608e80644c0196535278a224fe9d29d46abe81f2b6c55a436aa09232cb4cd58e3b4a93fec849859332164de467cede98a768edfb7eb4fb83367b6b43bed1e8767a0efe6c2792b7fce474c20536b9bd2837d31f2b67d4cb5d2fecc2e7c69ce716146a57193422e51c78984fdcc805c970d0b15312659370322d6d36c61f89db9b71194c0c3e37bc201f013197732a441575474d16e9c0733358694efab382f3d8748c25699c2150fcf7b53b5ed668957fd209874d24934140fbd0e28b13d30b7a11e5744d25353c06414e411fc8c49a8c8e6af0198e7ec4810e28cce241a79253dfcb3b47eee1feefa8e21e42461478017479a25754e1b5b47ac7e961bf216a6c36cc04f5854c880d55bf600802df9e55788b970c7b8745a0984841c9f30740eb598f463ffcc9967c9a8ead71be8af07da1601e2d6c9adace5bb1300f6e7bf480f083d40ba12fc65bd566236ecfc65d0fff2928703d7ff094f703fa7253033e965af0b6207329b20ead89435122e9ff24d9499b606d631edbe45567b96065e31f4184453b18046cc4f732d21494cf97a015ffffc5d4c6014aa4436ebfadb32882d7bbe97ca4caf491cf6f35cbc5f637e69c35644ce06700f3d86e3a82573cd4041287b296607ecf5cc5b5306edfa87777d97a7b3390b50b6c06d570ac0c5bde09a6fd7b80adbe8ce7ffdeef94f293094ba295240e2a67cf61de8350eb60b598deee855ffd54076f238e1e9dfe6b2ae3e71d46a28cd41e28192ae6ac8cc19b1493ccfc9f24ae99b7d01b7c0f7af630f8d6d4a64fc3e9910bf35a68fbd2908aba73b80d33beb72830879a03841818ce3f1aa8c70f3354895abe1fef69e2d5d8cdcd9e8f8d6471c3c3531da938f91f8ce7a954dcf36ce5dd6d2cbf3fbc1eae08682a6f7d4863b9e30640e23239cf883efe9a782f7fc3e01397a340528680f67d3611af146c27589cb2e5cf6648a5795adb6065f6d751416028248e8246fc58ad1c4c40f34ea87fd583898c184b029810bda4b575aa2839d0a0fcba0c8b5ff8ab33e8911576a97b4ce52a7d387ce3d650715340e414655110e1e5413ec9a317e66b7dd7c80ec02f8b54b72719e23743f6257ad875c", @typed={0x8, 0x70, @fd=r0}, @generic="5cc8183d7c2002469676c0665415c17a30ebd061d93731ab608e86e41228884c8a21fee3eb5e870b4e578ab41f7188c3efd6a5488906cecab4f73753349732a65e6bdcc948fdc96b07d8ff77cc2643"]}, @generic="59c08ebc7746b9b5f632bf0606841389b1ce0268c49f7ab5cb17a999e76098a8daaa4fe84a152022231983b8ccfef1e5c3b20f3b66f6d0963c14647538d353ad784a9a75921b9f9b9e8abb8b7e126511c175a7b037ec5adc1e379d647d1f595ec63ac1b8ea177dee3d1bb688b2fff290aa0b22c96a5983f8c11102f804b59e890eb4b6f8c87896ddbf81a96fed3591f3a50b"]}, 0x134c}, 0x1, 0x0, 0x0, 0x4040}, 0x4000) 01:32:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x400000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000440)=0xc3, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x8, &(0x7f0000000180)='lo\x00\x00\x00\x00\x02\x00', 0xffffffffffffffff}, 0x30) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) r2 = getpgrp(0xffffffffffffffff) r3 = getpgid(r2) ioprio_set$pid(0x2, r3, 0x3) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8c600, 0x0) ioctl$PIO_SCRNMAP(r4, 0x4b41, &(0x7f0000000340)="25414c449f9ac9cec1836d1e4de34fa43a4fae8ce6c6c0d3f7f8f6ca6047614029d243a6d8a8e3a2f328aefb84968929b3a15a980b504ba7ab6911db9c4fccd75c5a4be117f83012b887192b0911b530cce3714684a7da17fd6882dfa0bdc29b2f6c736431e744db751430d602a5a8c29c54ffb55191daaceba88400d4f1bb2bb5cf57c58124e407d08b712c446844fe4950fe7d26a04a6415f0f1443862abca229135d4b93dc0191f2d6a6138f37d606eddd47f7a416e2fe90e89f15c950a4703f8") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r5, 0x3, 0x6, @dev}, 0x10) r6 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2180, 0x1) getpeername$inet6(r6, &(0x7f00000000c0), &(0x7f0000000100)=0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000300)) close(r0) 01:32:00 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = accept4(r0, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x80, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', r2}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @dev}, 0x278) r4 = socket$packet(0x11, 0x100000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) setsockopt$packet_int(r4, 0x107, 0x14, &(0x7f0000000000)=0x100000000000004, 0x4) bind$packet(r4, &(0x7f0000000080)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @random="32cae4783d32"}, 0x14) sendto$inet6(r4, &(0x7f0000000180)="050300000300000000000000c52c", 0xe, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f00000001c0)) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @dev}, 0x10) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f0000000040)="260000005e0009000000eaf83a0040000000000001000000ffffff000008db1ee9ff4435eade", 0x26) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x20000, 0x0) ioctl$KVM_GET_TSC_KHZ(r7, 0xaea3) close(r0) 01:32:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:00 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x2a8200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) connect$caif(r0, &(0x7f0000000080), 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000200)={0xa, 0xffffffffffffff4b, 0xfa00, {r1}}, 0xfc86) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x200) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8, 0x0) ioctl(r2, 0xffffffffffffffc2, &(0x7f0000000100)) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x0}) [ 338.211824] device lo entered promiscuous mode [ 338.235531] device lo left promiscuous mode [ 338.247187] device lo entered promiscuous mode 01:32:00 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x3}) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x20) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='attr/fscreate\x00') ioctl$TCSETA(r2, 0x5406, &(0x7f0000000100)={0x8, 0x1ff, 0x101, 0x9, 0x8, 0x4, 0x1, 0x80, 0x6, 0x3}) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000140)={0x8, 0x3, 0x3}) socket$caif_seqpacket(0x25, 0x5, 0xb) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000080)={r1, 0x80000, r0}) 01:32:00 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e088b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 338.281270] device lo left promiscuous mode [ 338.296145] device lo entered promiscuous mode [ 338.315192] device lo left promiscuous mode 01:32:00 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 338.359151] EXT4-fs: 38 callbacks suppressed [ 338.359164] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:00 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f00000000c0)={0x6e, "24dacb939ee5ac5f9e8daa38efea29ba36d2728a0b3563105083514bab5bfaad9b8d8f0f607d638ea91b29776c29a5ed672f9dda542cb986f277aa3845c5a867115d06cadbc1db7c3ff4c899cca0ac70b27e50a7b6896167b16efbef96347f0291c355d5724b1240b0de95a27b05fefc2c471dc957b382bf16d144ef6f57329d"}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) r3 = semget$private(0x0, 0x6, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) 01:32:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4100, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:00 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000280)=0xe8) setfsuid(r1) r2 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@sco, &(0x7f00000000c0)=0x80, 0xb9a12a3c75e50650) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000100)='\x00', 0x1) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r2, 0x6, 0x3d, &(0x7f00000002c0)=0x87fe, 0x4) r3 = dup3(r2, r0, 0x80000) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000140)={0x8}) 01:32:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x20, 0x8, "2023c1d37e663e1c28f7595a8bf20679c3277bab4d12620780c0e4cedeabeaffff8fe798a3648da65c679069988999f18659af60dfcb2fbb43db0167f22c6f43", "80835c036635e585998efdc05b945de130a39702f508b75f965c69ae8c4dba7a", [0x6, 0x3]}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) [ 338.598340] device lo entered promiscuous mode 01:32:01 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 338.654629] device lo left promiscuous mode [ 338.674005] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 338.689499] device lo entered promiscuous mode [ 338.721903] device lo left promiscuous mode [ 338.738096] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 338.754163] device lo entered promiscuous mode 01:32:01 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0x0) r1 = semget(0x2, 0x5, 0xa0) semctl$SETVAL(r1, 0x1, 0x10, &(0x7f0000000040)=0x3) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x18080, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x10c, r2, 0x128, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffffa}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'hsr0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffc1953}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x72d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa35}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x857}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4004010}, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @dev}, 0x10) 01:32:01 executing program 2 (fault-call:2 fault-nth:0): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 338.775119] device lo left promiscuous mode 01:32:01 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 338.870788] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:01 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='+\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012dbd7000fddbdf2501000000000000000741000000140018000000007564703a73797a3100000000"], 0x30}, 0x1, 0x0, 0x0, 0x8810}, 0x40010) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0x0, @remote, 0x7}}}, &(0x7f00000002c0)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000300)=r3, 0x4) bind$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x9, 0x7fffffff, 0x81, @dev={[], 0xa}}, 0x10) [ 338.913897] device lo entered promiscuous mode [ 338.919021] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 338.928268] net_ratelimit: 8 callbacks suppressed [ 338.928276] protocol 88fb is buggy, dev hsr_slave_0 [ 338.938261] protocol 88fb is buggy, dev hsr_slave_1 [ 338.959347] device lo left promiscuous mode 01:32:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:01 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x140, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') ioctl$TIOCMGET(r2, 0x5415, &(0x7f00000001c0)) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x1a0, r3, 0x10, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5b}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdc4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd44}]}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x375199fb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff6e2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x10}, 0x40000) close(r0) [ 338.981876] FAULT_INJECTION: forcing a failure. [ 338.981876] name failslab, interval 1, probability 0, space 0, times 0 [ 339.027927] CPU: 0 PID: 12480 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 339.035147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.044501] Call Trace: [ 339.047091] dump_stack+0x1db/0x2d0 [ 339.050719] ? dump_stack_print_info.cold+0x20/0x20 [ 339.055733] ? mark_held_locks+0x100/0x100 [ 339.059968] should_fail.cold+0xa/0x15 [ 339.063852] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 339.068952] ? ___might_sleep+0x1e7/0x310 [ 339.073097] ? arch_local_save_flags+0x50/0x50 [ 339.077676] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 339.083227] ? iov_iter_alignment+0x234/0xcf0 [ 339.087730] __should_failslab+0x121/0x190 [ 339.091962] should_failslab+0x9/0x14 [ 339.095760] kmem_cache_alloc+0x2be/0x710 [ 339.099907] ? mark_held_locks+0x100/0x100 [ 339.104143] ? print_usage_bug+0xd0/0xd0 [ 339.108232] do_blockdev_direct_IO+0x5a5/0xdc10 [ 339.112900] ? print_usage_bug+0xd0/0xd0 [ 339.116958] ? print_usage_bug+0xd0/0xd0 [ 339.121113] ? rcu_read_unlock_special+0x380/0x380 [ 339.126052] ? add_lock_to_list.isra.0+0x450/0x450 [ 339.131121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.136650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.142182] ? check_preemption_disabled+0x48/0x290 [ 339.147230] ? add_lock_to_list.isra.0+0x450/0x450 [ 339.152155] ? __lock_is_held+0xb6/0x140 [ 339.156233] ? write_end_fn+0xf0/0xf0 [ 339.160029] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 339.165648] ? sb_init_dio_done_wq+0x90/0x90 [ 339.170055] ? ___might_sleep+0x1e7/0x310 [ 339.174203] ? __might_sleep+0x95/0x190 [ 339.178227] ? __find_get_block+0xf20/0xf20 [ 339.182545] ? mark_held_locks+0x100/0x100 [ 339.186775] ? __lock_acquire+0x572/0x4a30 [ 339.191012] ? print_usage_bug+0xd0/0xd0 [ 339.195081] ? rcu_read_unlock_special+0x380/0x380 [ 339.200005] ? print_usage_bug+0xd0/0xd0 [ 339.204068] ? mark_held_locks+0x100/0x100 [ 339.208298] ? __lock_acquire+0x572/0x4a30 [ 339.212544] ? add_lock_to_list.isra.0+0x450/0x450 [ 339.217480] ? mark_held_locks+0x100/0x100 [ 339.221717] ? __brelse+0x105/0x180 [ 339.225339] ? add_lock_to_list.isra.0+0x450/0x450 [ 339.230265] ? __lock_is_held+0xb6/0x140 [ 339.234377] ? ext4_direct_IO+0xfee/0x2090 [ 339.238607] ? find_held_lock+0x35/0x120 [ 339.242659] ? ext4_direct_IO+0xfee/0x2090 [ 339.246888] ? lock_acquire+0x1db/0x570 [ 339.250870] ? lock_downgrade+0x910/0x910 [ 339.255026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.260558] ? ext4_journal_check_start+0x188/0x230 [ 339.265594] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 339.271252] __blockdev_direct_IO+0xa1/0xca [ 339.275583] ? write_end_fn+0xf0/0xf0 [ 339.279381] ext4_direct_IO+0x10a3/0x2090 [ 339.283524] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 339.289147] ? ext4_iomap_end+0x7e0/0x7e0 [ 339.293294] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 339.298826] ? file_remove_privs+0x213/0x500 [ 339.303248] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 339.308778] ? filemap_check_errors+0xd8/0x110 [ 339.313360] generic_file_direct_write+0x214/0x4b0 [ 339.318289] __generic_file_write_iter+0x2ee/0x630 [ 339.323247] ext4_file_write_iter+0x37a/0x1410 [ 339.327832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.333376] ? ext4_file_mmap+0x410/0x410 [ 339.337524] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 339.342800] ? rcu_read_unlock_special+0x380/0x380 [ 339.347825] ? __fget+0x499/0x710 [ 339.351278] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 339.356813] ? iov_iter_init+0xea/0x220 [ 339.360784] __vfs_write+0x764/0xb40 [ 339.364496] ? check_preemption_disabled+0x48/0x290 [ 339.369529] ? kernel_read+0x120/0x120 [ 339.373429] ? rcu_read_lock_sched_held+0x110/0x130 [ 339.378438] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 339.383188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.388744] ? __sb_start_write+0x1ac/0x360 [ 339.393203] vfs_write+0x20c/0x580 [ 339.396779] ksys_pwrite64+0x183/0x1c0 [ 339.400662] ? __ia32_sys_pread64+0xf0/0xf0 [ 339.404979] ? __ia32_sys_read+0xb0/0xb0 [ 339.409049] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.414422] ? trace_hardirqs_off_caller+0x300/0x300 [ 339.419566] __x64_sys_pwrite64+0x97/0xf0 [ 339.423728] do_syscall_64+0x1a3/0x800 [ 339.427623] ? syscall_return_slowpath+0x5f0/0x5f0 [ 339.432549] ? prepare_exit_to_usermode+0x232/0x3b0 [ 339.437563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.442408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.447592] RIP: 0033:0x458099 [ 339.450789] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.469701] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 01:32:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4800, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:01 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:01 executing program 2 (fault-call:2 fault-nth:1): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 339.477404] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 339.484671] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 339.491946] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 339.499225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 339.506543] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:01 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 339.724800] device lo entered promiscuous mode [ 339.728265] protocol 88fb is buggy, dev hsr_slave_0 [ 339.734595] protocol 88fb is buggy, dev hsr_slave_1 [ 339.739798] protocol 88fb is buggy, dev hsr_slave_0 [ 339.744884] protocol 88fb is buggy, dev hsr_slave_1 [ 339.768736] device lo left promiscuous mode [ 339.778440] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:02 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000040)) [ 339.810383] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 339.819056] FAULT_INJECTION: forcing a failure. [ 339.819056] name failslab, interval 1, probability 0, space 0, times 0 [ 339.832103] device lo entered promiscuous mode [ 339.836291] CPU: 1 PID: 12497 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 339.839291] device lo left promiscuous mode [ 339.843905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.843913] Call Trace: [ 339.843942] dump_stack+0x1db/0x2d0 [ 339.843976] ? dump_stack_print_info.cold+0x20/0x20 [ 339.868844] ? attach_entity_load_avg+0x810/0x810 [ 339.873709] ? rb_insert_color+0x12e0/0x12e0 [ 339.878139] should_fail.cold+0xa/0x15 [ 339.882040] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 339.887141] ? ___might_sleep+0x1e7/0x310 [ 339.891307] ? arch_local_save_flags+0x50/0x50 [ 339.895899] __should_failslab+0x121/0x190 [ 339.900134] should_failslab+0x9/0x14 [ 339.903927] __kmalloc+0x2dc/0x740 [ 339.907469] ? ext4_find_extent+0x76e/0x9d0 [ 339.911955] ext4_find_extent+0x76e/0x9d0 [ 339.916136] ext4_ext_map_blocks+0x261/0x60a0 [ 339.920644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.926229] ? ext4_ext_release+0x10/0x10 [ 339.930386] ? check_preemption_disabled+0x48/0x290 [ 339.935409] ? __lock_is_held+0xb6/0x140 [ 339.939572] ? lock_acquire+0x1db/0x570 [ 339.943554] ? ext4_map_blocks+0x496/0x1bb0 [ 339.947882] ? ___might_sleep+0x1e7/0x310 [ 339.952037] ? lock_release+0xc40/0xc40 [ 339.956016] ? ext4_es_lookup_extent+0x478/0xdd0 [ 339.960793] ? down_read+0x8d/0x120 [ 339.964426] ? ext4_map_blocks+0x496/0x1bb0 [ 339.968754] ? __down_interruptible+0x740/0x740 [ 339.973441] ? ext4_direct_IO+0x10a3/0x2090 [ 339.977772] ? generic_file_direct_write+0x214/0x4b0 [ 339.982870] ? __generic_file_write_iter+0x2ee/0x630 [ 339.987969] ext4_map_blocks+0xf90/0x1bb0 [ 339.992138] ? ext4_issue_zeroout+0x170/0x170 [ 339.996646] ? iov_iter_get_pages+0x34c/0x1290 [ 340.001240] ? check_preemption_disabled+0x48/0x290 [ 340.006267] ? do_blockdev_direct_IO+0x5a5/0xdc10 [ 340.011123] _ext4_get_block+0x245/0x7a0 [ 340.015187] ? iov_iter_npages+0x289/0xf20 [ 340.019439] ? ext4_map_blocks+0x1bb0/0x1bb0 [ 340.023851] ? blk_start_plug+0xb5/0x340 [ 340.027968] ? iov_iter_npages+0xf20/0xf20 [ 340.032240] ext4_dio_get_block+0xa3/0xc0 [ 340.036400] do_blockdev_direct_IO+0x3822/0xdc10 [ 340.041195] ? __lock_acquire+0x572/0x4a30 [ 340.045470] ? sb_init_dio_done_wq+0x90/0x90 [ 340.049888] ? __lock_is_held+0xb6/0x140 [ 340.053995] ? arch_local_save_flags+0x50/0x50 [ 340.058589] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 340.064233] ? __ext4_handle_dirty_metadata+0x1e3/0x570 [ 340.069617] ? __lock_acquire+0x572/0x4a30 [ 340.073882] ? mark_held_locks+0x100/0x100 [ 340.078134] ? __might_sleep+0x95/0x190 [ 340.082120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 340.087654] ? __ext4_journal_get_write_access+0x70/0xa0 [ 340.093109] ? add_lock_to_list.isra.0+0x450/0x450 [ 340.098045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.103591] ? ext4_mark_inode_dirty+0x257/0xb80 [ 340.108368] ? add_lock_to_list.isra.0+0x450/0x450 [ 340.113317] ? __lock_is_held+0xb6/0x140 [ 340.117406] ? ext4_direct_IO+0xfee/0x2090 [ 340.121651] ? find_held_lock+0x35/0x120 [ 340.125706] ? ext4_direct_IO+0xfee/0x2090 [ 340.129945] ? lock_acquire+0x1db/0x570 [ 340.133936] ? lock_downgrade+0x910/0x910 [ 340.138092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.143632] ? ext4_journal_check_start+0x188/0x230 [ 340.148671] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 340.154314] __blockdev_direct_IO+0xa1/0xca [ 340.158654] ? write_end_fn+0xf0/0xf0 [ 340.162453] ext4_direct_IO+0x10a3/0x2090 [ 340.166606] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 340.172271] ? ext4_iomap_end+0x7e0/0x7e0 [ 340.176428] ? generic_update_time+0x268/0x440 [ 340.181010] ? file_remove_privs+0x500/0x500 [ 340.185414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.190973] ? preempt_count_add+0xbc/0x1b0 [ 340.195311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.200863] ? __mnt_drop_write+0x5d/0x80 [ 340.205009] ? __mnt_drop_write_file+0x31/0x40 [ 340.209600] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 340.215154] ? filemap_check_errors+0xd8/0x110 [ 340.219762] generic_file_direct_write+0x214/0x4b0 [ 340.224706] __generic_file_write_iter+0x2ee/0x630 [ 340.229647] ext4_file_write_iter+0x37a/0x1410 [ 340.234261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.239807] ? ext4_file_mmap+0x410/0x410 [ 340.243951] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 340.249254] ? rcu_read_unlock_special+0x380/0x380 [ 340.254232] ? __fget+0x499/0x710 [ 340.257697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 340.263252] ? iov_iter_init+0xea/0x220 [ 340.267251] __vfs_write+0x764/0xb40 [ 340.270975] ? check_preemption_disabled+0x48/0x290 [ 340.276021] ? kernel_read+0x120/0x120 [ 340.279918] ? rcu_read_lock_sched_held+0x110/0x130 [ 340.284929] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 340.289688] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.295246] ? __sb_start_write+0x1ac/0x360 [ 340.299566] vfs_write+0x20c/0x580 [ 340.303104] ksys_pwrite64+0x183/0x1c0 [ 340.307030] ? __ia32_sys_pread64+0xf0/0xf0 [ 340.311356] ? __ia32_sys_read+0xb0/0xb0 [ 340.315426] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.320799] ? trace_hardirqs_off_caller+0x300/0x300 [ 340.325952] __x64_sys_pwrite64+0x97/0xf0 [ 340.330114] do_syscall_64+0x1a3/0x800 [ 340.334028] ? syscall_return_slowpath+0x5f0/0x5f0 [ 340.338962] ? prepare_exit_to_usermode+0x232/0x3b0 [ 340.343993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.348850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.354052] RIP: 0033:0x458099 [ 340.357278] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.376183] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 340.383901] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 340.391171] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 340.398443] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 340.405746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 01:32:02 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 340.413018] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4c00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:02 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) close(r0) r3 = socket$nl_route(0x10, 0x3, 0x0) fsync(r1) sendmsg$nl_route(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xeb6b9d4cd0a84020}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="8ca52317597d0a3982201c5e8e0076e48be47aef0a48b95c6cf7914fa8a285adf59b3ba328e00707160055"], 0x14}}, 0x4000) r4 = open(&(0x7f0000000100)='./file0\x00', 0x20001, 0x24) write$apparmor_exec(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="737461636b202d2d7d3a40260032c3606d0029edce8c3f5782e6f205c783a6421fb01c4321dc0e6531"], 0xd) r5 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x549, 0x8000) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f00000000c0)=0x9, 0x4) [ 340.495165] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:02 executing program 2 (fault-call:2 fault-nth:2): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:02 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:02 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x8001, 0x200) ioctl(r0, 0xffffffffffffffbf, &(0x7f0000000040)) [ 340.660110] device lo entered promiscuous mode [ 340.674141] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 340.685782] device lo left promiscuous mode [ 340.691255] FAULT_INJECTION: forcing a failure. [ 340.691255] name failslab, interval 1, probability 0, space 0, times 0 [ 340.702547] CPU: 0 PID: 12536 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 340.709833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.719186] Call Trace: [ 340.721798] dump_stack+0x1db/0x2d0 [ 340.725430] ? dump_stack_print_info.cold+0x20/0x20 [ 340.730444] ? __lock_acquire+0x572/0x4a30 [ 340.734680] should_fail.cold+0xa/0x15 [ 340.738568] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 340.743680] ? mark_held_locks+0x100/0x100 [ 340.747940] ? rcu_softirq_qs+0x20/0x20 [ 340.751933] ? kernel_text_address+0x73/0xf0 [ 340.756354] ? __kernel_text_address+0xd/0x40 [ 340.760850] __should_failslab+0x121/0x190 [ 340.765084] should_failslab+0x9/0x14 [ 340.768881] kmem_cache_alloc+0x47/0x710 [ 340.772943] ? __es_remove_extent+0x871/0xb30 [ 340.777453] __es_insert_extent+0x366/0x1190 [ 340.781858] ? ext4_es_free_extent+0x770/0x770 [ 340.786439] ? do_raw_read_unlock+0x70/0x70 [ 340.790757] ? __lock_is_held+0xb6/0x140 [ 340.794962] ext4_es_insert_extent+0x369/0xc80 [ 340.799547] ? ext4_es_scan_clu+0x50/0x50 [ 340.803692] ? ext4_es_init_tree+0x70/0x70 [ 340.807930] ext4_ext_put_gap_in_cache+0x176/0x200 [ 340.812871] ? ext4_rereserve_cluster+0x240/0x240 [ 340.817728] ? ext4_find_extent+0x76e/0x9d0 [ 340.822050] ? ext4_find_extent+0x6a6/0x9d0 [ 340.826371] ext4_ext_map_blocks+0x2ab8/0x60a0 [ 340.830954] ? ext4_ext_release+0x10/0x10 [ 340.835099] ? check_preemption_disabled+0x48/0x290 [ 340.840119] ? __lock_is_held+0xb6/0x140 [ 340.844176] ? lock_acquire+0x1db/0x570 [ 340.848152] ? ext4_map_blocks+0x496/0x1bb0 [ 340.852488] ? ___might_sleep+0x1e7/0x310 [ 340.856632] ? lock_release+0xc40/0xc40 [ 340.860602] ? ext4_es_lookup_extent+0x478/0xdd0 [ 340.865358] ? down_read+0x8d/0x120 [ 340.868976] ? ext4_map_blocks+0x496/0x1bb0 [ 340.873296] ? __down_interruptible+0x740/0x740 [ 340.877958] ? ext4_direct_IO+0x10a3/0x2090 [ 340.882288] ? generic_file_direct_write+0x214/0x4b0 [ 340.887442] ? __generic_file_write_iter+0x2ee/0x630 [ 340.892542] ext4_map_blocks+0xf90/0x1bb0 [ 340.896691] ? ext4_issue_zeroout+0x170/0x170 [ 340.901186] ? iov_iter_get_pages+0x34c/0x1290 [ 340.905789] ? check_preemption_disabled+0x48/0x290 [ 340.910802] ? do_blockdev_direct_IO+0x5a5/0xdc10 [ 340.915714] _ext4_get_block+0x245/0x7a0 [ 340.919779] ? iov_iter_npages+0x289/0xf20 [ 340.924025] ? ext4_map_blocks+0x1bb0/0x1bb0 [ 340.928604] ? blk_start_plug+0xb5/0x340 [ 340.932673] ? iov_iter_npages+0xf20/0xf20 [ 340.936961] ext4_dio_get_block+0xa3/0xc0 [ 340.941109] do_blockdev_direct_IO+0x3822/0xdc10 [ 340.945865] ? print_usage_bug+0xd0/0xd0 [ 340.949931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.955529] ? sb_init_dio_done_wq+0x90/0x90 [ 340.959939] ? ___might_sleep+0x1e7/0x310 [ 340.964088] ? __might_sleep+0x95/0x190 [ 340.968098] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 340.973822] ? __find_get_block+0xf20/0xf20 [ 340.978154] ? mark_held_locks+0x100/0x100 [ 340.982403] ? __lock_acquire+0x572/0x4a30 [ 340.986685] ? print_usage_bug+0xd0/0xd0 [ 340.990809] ? rcu_read_unlock_special+0x380/0x380 [ 340.995749] ? print_usage_bug+0xd0/0xd0 [ 340.999826] ? mark_held_locks+0x100/0x100 [ 341.004071] ? __lock_acquire+0x572/0x4a30 [ 341.008358] ? add_lock_to_list.isra.0+0x450/0x450 [ 341.013287] ? mark_held_locks+0x100/0x100 [ 341.017522] ? __brelse+0x105/0x180 [ 341.021147] ? add_lock_to_list.isra.0+0x450/0x450 [ 341.026168] ? __lock_is_held+0xb6/0x140 [ 341.030359] ? ext4_direct_IO+0xfee/0x2090 [ 341.034639] ? find_held_lock+0x35/0x120 [ 341.038707] ? ext4_direct_IO+0xfee/0x2090 [ 341.042951] ? lock_acquire+0x1db/0x570 [ 341.046930] ? lock_downgrade+0x910/0x910 [ 341.051078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.056610] ? ext4_journal_check_start+0x188/0x230 [ 341.061627] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 341.067258] __blockdev_direct_IO+0xa1/0xca [ 341.071586] ? write_end_fn+0xf0/0xf0 [ 341.075384] ext4_direct_IO+0x10a3/0x2090 [ 341.079530] ? ext4_dio_get_block_unwritten_sync+0xf0/0xf0 [ 341.085169] ? ext4_iomap_end+0x7e0/0x7e0 [ 341.089321] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 341.094862] ? file_remove_privs+0x213/0x500 [ 341.099280] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 341.104813] ? filemap_check_errors+0xd8/0x110 [ 341.109437] generic_file_direct_write+0x214/0x4b0 [ 341.114372] __generic_file_write_iter+0x2ee/0x630 [ 341.119317] ext4_file_write_iter+0x37a/0x1410 [ 341.123928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.129478] ? ext4_file_mmap+0x410/0x410 [ 341.133683] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 341.138964] ? rcu_read_unlock_special+0x380/0x380 [ 341.143898] ? __fget+0x499/0x710 [ 341.147353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 341.152901] ? iov_iter_init+0xea/0x220 [ 341.156930] __vfs_write+0x764/0xb40 [ 341.160681] ? check_preemption_disabled+0x48/0x290 [ 341.165706] ? kernel_read+0x120/0x120 [ 341.169652] ? rcu_read_lock_sched_held+0x110/0x130 [ 341.174666] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 341.179554] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.185246] ? __sb_start_write+0x1ac/0x360 [ 341.189631] vfs_write+0x20c/0x580 [ 341.193175] ksys_pwrite64+0x183/0x1c0 [ 341.197178] ? __ia32_sys_pread64+0xf0/0xf0 [ 341.201605] ? __ia32_sys_read+0xb0/0xb0 [ 341.205665] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.211083] ? trace_hardirqs_off_caller+0x300/0x300 [ 341.216197] __x64_sys_pwrite64+0x97/0xf0 [ 341.220369] do_syscall_64+0x1a3/0x800 [ 341.224263] ? syscall_return_slowpath+0x5f0/0x5f0 [ 341.229249] ? prepare_exit_to_usermode+0x232/0x3b0 [ 341.234286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.239128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.244312] RIP: 0033:0x458099 [ 341.247512] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.266431] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 341.274148] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 341.281410] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 341.288681] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 341.295955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 341.303236] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) close(r0) [ 341.413960] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:03 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x5, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000200)) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x180) r3 = dup3(r0, r0, 0x80000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000080)=r3, 0x4) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}) ioctl$PIO_FONTRESET(r3, 0x4b6d, 0x0) 01:32:03 executing program 2 (fault-call:2 fault-nth:3): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 341.470628] device lo entered promiscuous mode 01:32:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:03 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478082ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 341.545703] device lo left promiscuous mode 01:32:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 341.572722] device lo entered promiscuous mode [ 341.589732] device lo left promiscuous mode [ 341.589865] FAULT_INJECTION: forcing a failure. [ 341.589865] name fail_page_alloc, interval 1, probability 0, space 0, times 0 01:32:03 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x4) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x7) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) timer_create(0x4, &(0x7f00000001c0)={0x0, 0x13, 0x2, @tid=r1}, &(0x7f0000000200)) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 01:32:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f0000005a00)=[{{&(0x7f00000000c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x4, 0xffff, 0x0, "043cd9062fee3b438c16a2995e525abea809fe155d9012d0055e04e3e7a2bad00a883290edacd5149fd7716ac1933daa228fa359e79e6ec868d47d74c00379", 0x8}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000140)="91c0ead02d4464b079d18c11fe9890ac7f09ddae79a97ff114acef7a47b35fad099443a2dbdcb687305fa98ac6bdae581d4c0395d47073dae56c99f72bae49437513ba0545f8adb2a8581b19e1548c92cb8ea5680a3990dc987b3b8d2bbe095ba6da569559f837eb4aa2baf28bec65cc2fd97f9ad3ebbc36566251eddeb0e948a2b79820e19d6328be4d1f8f37f7a5480d84d56c03904f94550908bc3aeda76e5b4daf718ac187ec0c13d9b218809e7d829d81d364bc96efc94a34fc6a3c0fc0e4ded33ea156de9124363a6b856fedd93b16e73be91b17", 0xd7}, {&(0x7f0000000300)="8fc563153b2d1f25c41fed4d95e9427df857e1f4534a2ae129d9e398c0ea7b17d92cdcc3b18beb598fb0b8f5f2f90c543f2cac60e6947ee72e6399b39e82e8bbbb79360a2f97b782edc175280f54fb93dfb3dbb5b4889bd72083f95ec3a88cf8e250cde66dca9c3f2911fa06a6110a64ffc41023ad784a17e5b0d2e622fadff90d92a04aa761c065b5bef28e", 0x8c}, {&(0x7f00000003c0)="72a27912e8ea9c92031a2df22b9a1a6358600832e4da86c29b9aced744e76a4605230f47b2062b62c4cf2a78b753d48ccb603252d2d234bff210c3e7f29b974db275008a313516488379383e669eb5eeb107145862a02b23a6b5db516ff61810e61340794b08a6af0134e9c348a09ace7b1868eae49e5f0f48eab3577cedc05d791dc024844534919231557a38e2bc0827f2a609ada13ade740532b26e5d66ddb4d7b3102fa3e76a20672a41bd31cc003c427a703977882ddc39892142bd9d97464cce493c69337b9e24a7927fb041e5e940b5c87a8d25f35c6b5e2d1c", 0xdd}, {&(0x7f0000000040)="7496", 0x2}, {&(0x7f0000000240)="bbea3f5c43a24c568bc4898c849cf208fa3e3935e713f436979ccb6b0a0c2a31f7276a9d132f67727fe6d0cdedea2c7296f330d6a5f6", 0x36}, {&(0x7f00000004c0)="cb790de327c5e13cf8d3c5306f3e4a1fcdd6e0fd4ebe91f57b3f1dca15232669fb2ca8e54287de649ec2645a1afd78cf34128940a0be938cdcf09e18d3317651e858a9a39301be2fd004a34088c70da64c7a61d3f1f06393aa5e4722168727715ee8ed0a4f60902cace3e5b5ed43a71043ca653657adccf2a0824004bc170224efd0e1da0a27a72b24d85f486aef485d27b011b042ef20f088c63e5f08801f4f56023aa7c8e95d13b39f151823a5394ccc2a27", 0xb3}, {&(0x7f0000000580)="846a89593fbe12f52768f3bedd4121a91bc5b7071c354ef7ee06687edca07314cbc1a643cf0cfb973f509719c9b931fdd89c7825689881c693b9805787e441175ac9aea9575f885877c77b79af80c8a0e0fa31cb515a9f54cc5140c35c5eb00d32abd938fcd72b75e55c2931d6a40d716b0a3f9225cd9cfc462048f53a3a868d2f40250378234da8cf9bada6b5025289a9301fdf0bcc0bffcb90b541b8b1d677db44f16b9f7218cdaf77ec529d711ba3f78ef56f2e729bcedafbfe2949205c2233c4eb9ef3a99cdfdf3e5df63f65c088e3e23b24fb784222b5b712a0d7f6336dc8d24eca", 0xe4}, {&(0x7f0000000680)="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", 0x1000}], 0x8, &(0x7f0000001700)=[{0x100, 0x114, 0x86, "fe5adb92e6159a941d41e6994257715279e598c33b60ae8567b28c415eca0691dc4336d3ac25a43b5e6e4171b11993213d0d1f203bed89d0f9181ad4974fcf28ab834d5b306955fe6cc299199a556f29089536589e8a2589894fd8da99ff89626c22a17c9516b94a5211beffa4fc7133b754d3caadda68b60221bb2c4925926714b037261c8e784fd7686188eed916b6b707b72bdc2a1105daa295fbc4c06b19f9516ea4245f2ef171cb53337ff44b80ca330229bc9240bc022a4038e7e3712aabdad479e2f30b8be8eafc143f2fdb33e14639bbd3b794f42850c14f799fd4be9f71b18917dbed940b3b690f"}, {0x88, 0x115, 0x8, "f5fdc45cd42a775089f0e57d760273aa476752354b23d1b8445db822f145fd978682e9565fa638cde1e579154f1e32e49914d9d5ef3cc9aef91c35d353434d6cc46237ea77ccc7ca217eeebd0bc5787ce02feb5f618b7960b8f6948c808d3de0ee9e2391ce14c545b5a9af1b44c1a8943465800058533710"}, {0x108, 0x112, 0x40, "079a35ac2bedca8b755e31bcd4f50c8e11b5e2a29dcaffb58d05426ccf8d8ad11ff91a21d716324d29a51cdff0a4a7afbfca75946b0bbd8b2915e82c52c9b731fcd655da102298beb5df4a55007cec5d4f9a946f77b1dda2a082d9e578ec0f0320a18a89bccb6ec2b2d86ef206d6e7cb13f28208182f55eb0574aa666e8d3595e62c319eb6ec577d45cafdf09b8bfb71d545a8df6d3831e2d36a5f55f6af06af95634154a269f9d4c9285bdd50d8ed4c4d877e981f0bc4453b32094ec2a651de2210b7422829185b3c732e2b20e391ffd3f3fe26223eadf4b20515763656d5aa02e7cea7665e13d127739627d1fe2f85bdd4268517bf"}, {0x38, 0x10a, 0x1ff000000, "5ac9ec2954b9c2dcb89a2a353067b9b3c9ce68fbeaacb04bbb8dcd0d2663a904b1ca"}], 0x2c8}, 0x8}, {{&(0x7f0000001a00)=@ethernet={0x6, @dev={[], 0x13}}, 0x80, &(0x7f0000001b00)=[{&(0x7f0000001a80)="8959cafff7d72d5e07bf2ca176a5db7531a0d2c70dc8766b8963bab30c029da78998c026d78c6214c8bc1151344f54718c0e7ba14073d225ee8e027ff8e0787dc6d8b3ed221280c3902ad4d857df5988c965207c1e81205aa7015c3dad9eb53baabd291a091812065cb55e6be0df9903c3d5921d8884b0338f9ddff0d17928af", 0x80}, {&(0x7f0000000280)="5256be7c75ce530df7e2cde1baed85fc08c63e9bda998ed9a7211ea7edd4fe6b4fb012232b6ab4", 0x27}], 0x2, &(0x7f0000001b40)=[{0xd8, 0x0, 0x2, "1736c36c702dae54e785e4630cf466fc39af919089890942d5bce1fe27d153e521fca7fd0f487cfd621fa833807eeb4c56b8f57128c89cbcb96d88ee23646ac1dddbcd9efc4f86095ee0f1ff7e953ff48fc7ad6770c477cffbf4d8dd90dae415bd42151b1ef768669be30f674dfdb5d753ecc9ba1f8ea91891af5c6b3a5ef0d742ef1a0b29e0dfbe20746ba73053b872c0fccb0a6ef324a08f38473b6c1ef9df9daad8785626a20e10565e1f3f319fb73fd539f2575cba99fb05d63e2ca1cce7bbb288"}], 0xd8}, 0x7}, {{&(0x7f0000001c40)=@in={0x2, 0x4e24, @rand_addr=0x2}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001cc0)="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", 0x1000}], 0x1, &(0x7f0000002d00)=[{0xb8, 0x1ff, 0xbae6, "c816b6fbc55433d874f38bf85f8163dcf67704cbeb836fb4583b90d2fcbe685ed11a9cdca74a3dd39464378585a4c96bf981f97572ed459da85e82d2e351031b19fc660930df3d6811980c6a2265eb6abbc3d2e204514f4e54fd08c92c100c70c2d5512d834972eee04c540b884e189da89dbddb0d5c497c87ef09caff5511ac8d4ba54c3955beb7267a91e6ba60c4ef5160b753dcb010b610d67bb15a1edeac846d5e8130dfcc8a"}, {0x58, 0x117, 0x1, "0629cb422d421cb42d938750816197b8b03fe401b87b0b0778944f442139c2a0acb7cea9f9cf7c322769cb224b53eb91596de23b80e8324ff4b91f03f08ef69008"}, {0x98, 0x1ff, 0x0, "3b19e89189056e835670c8ac927e1a20e96b31e53fa668ca6e54e0e8c66bba972f79c9f624559525e0245867ed71b1fceb172c0def5013c4fab0046c205afa4c48b797bc90b8b39fd494c94f40c50bee398d556f648dd4f649ec1a08edeaa01bcfa90ab8a22570c7c954999730e930fbed5213d6c9372a5eca76abc46fecda76a4"}, {0x18, 0x29, 0x9, "0cbcb7ec"}], 0x1c0}, 0x100}, {{0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f0000002ec0)="3faf0911a7a9ada3d248a0cdd50bc32f31b2f54d864987c6b0199b5e5a8d9d2a93c6599af97da05922147fa93000fcb09b3042d6085dde0d2c42930ffdc2359b0c05b092cd8ac6d87b9d4e3793e6ad63592aedcf027f9ba24f350f8e699b0f43a9af43d41e4bc5a063abb443cbe7663e1157bd9011ac8eed1f", 0x79}], 0x1, &(0x7f0000002f80)=[{0xc0, 0x188, 0xffff, "5540764db80282ed3030d978bd73052ac1537376192c4e73aded9850d6fc849eb601b7df152969edc4ebdb5d893f82be729d8a4d3611cfb67118567b06b48ec02ee45718cd55cb50f6fe64ef6c075319be10ddb643c387bdf7684a860da2378fe76b2e6fafe46f3f16bdf1e550e99132dd992c7787ee130828d5b35386039a60c4813bcd2e90df65aa6bcce38aadfff3209c9ed69f37d43ba275cb9eb4cdd0389ffae8b36616eb43316ff757d58b"}, {0x68, 0x117, 0x7, "c248bd8e7b559733cbe3690ea0e47c955ffc571149216777e931ae25b24541cc4206ae5a2e83b07a6ed933fd709e7b920880ff3316247491e391eed1f7f97aed8f93b95448c2ec72eed7c04efb51b20e06"}, {0xb8, 0x10e, 0x4, "25bda87522cda438831c6bd22a5640aba986c36ad34c52633ce3295953dddf67e988f5f665c6544c97c85d98a2281447780b0ea4a6da7c48ef32776472e57400d54d22862136b31662b9fc1ee5d1493d14a50296671ceeab691a477224ce457f377ef2695fe9dc5f71b83d2e08804ec2964dcc4b1bb76348eee1a28c14590ac5515532171baae753940ce8b333b7b795460c659ff3d06b6b8ba5c68c06e1a601d624467edcc1b0b2"}, {0x10, 0x1ff, 0x81c}, {0x40, 0x0, 0x4000000000, "7b195ebc45680dfebaf7c539bf8aff83307674737f385434a4b549609309388e8a0dc80f59621af9b1b67d97"}], 0x230}, 0x3}, {{&(0x7f00000031c0)=@isdn={0x22, 0x8, 0x5, 0x5, 0x2}, 0x80, &(0x7f00000046c0)=[{&(0x7f0000003240)="ac46d2446886dfb8a356d87bf89108859b0674798c50391321d2ae7cfb95385a2eeffab68893aab5705b34771e11dda975eb85c26d563a5129ce661377dc273d4473f3213bb476220525080e66e3f0da76702310929cb18abf2fe5dbc9db43b9f143f6c385463617931cd24dadc73bce417db1c6f3eb4de383de1bd2297b9f69e8561bd587ef1c692387e26ba1e6b78378ef064c76c872fc4f2926b0c7d4b611b269c396", 0xa4}, {&(0x7f0000003300)="45d32aed1cd76da3049a578df4a9869d0ad867870734e22d88c164d1d9b725aa715b0cf9c366b035f18967f7b8595b", 0x2f}, {&(0x7f0000003340)="674aaf15f404f3e9718682ff8df2ebf5a0f90b41c85972cf3cb3213643d1ed19d045", 0x22}, {&(0x7f0000003380)="60e517495b9bfc1d9087a38cc64bbb6ac86bc613bdbb7616ab91fde5231a81a6ec36094b80e353c04da9b19d65b6fdfac94e7ea381dd477764a2aeea49c40bd766256b625e749a2ea436a2dbdc6ca24dfea7360e3e2cc960711f9727f2ad47e9005baca1c663bb3c2374f5927b373f05be6d124420d62a6fcf2b0df9e3279945909967e4a5c50e6bf75c8829b8981a18ad16ce5b3c8fd65c3c3ff044bd9682039fb4a15dc04f8a8a6e7592b745155b31eefd83d7380816009022af3213c97b4825e132a2d7dbb740d36956f41eea5022c4cf15d5bedc9e097bdc88", 0xdb}, {&(0x7f0000003480)="16fabc1da4bc1fae4e9f678e751638b61ba199ca7fef522d83d6b2386ad262a9be5f12c76d9108a091ca954a6119dc53e69315c11c903cfe0aa14a0ca101490bb4c96982628b4d7d46759adc077158a253d6db90ec53ac14ed8b4fd8b77aacbf1917f37b05fc3b27408296359658016696759a184c3b7a13f781ecb5668e9af023c3f2abed0953a7b3a918157570a3eb3f4f6f9b61211b52b4f54f4547a30f76cd785fed5c0dfaa969d4243f874270013877ef0684eca7131c49bc202aef3c30744256f28ac27c78434c7f4264f953247a72de1524c56d53ec3b152ea477920e", 0xe0}, {&(0x7f0000003580)="df417a9abd4f4c18243e8180c191b617675ee369cac70423564872c64766ef8cac2630ab46ccbb739e646be258c6ce7d340daa099577c19bb7b79bc7008ad1b24c3442861b3fb31c856357ee39176263ad1efa86b2262fd46eb1e9211136131bd726ee69f323b412a6189ac5afbceabaf3e95944a6d86f4abd4352206e9657c9c40273d5aca2df774478b185ee877389c2b7b81d716b116fb006dbc56042f65ab262a7d67731880990412cda565beb2eb8bfabc5c9be5f3a16fa998b25912c8678e7e2046e13019e01e2ad5a0c7196c6dd91ddea4220ce77d329d0067cd99f9c5a68e3614241c17f5ffc", 0xea}, {&(0x7f0000003680)="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", 0x1000}, {&(0x7f0000004680)="ba28760acc8348720e60af50b5725af7", 0x10}], 0x8, &(0x7f0000004740)=[{0x1010, 0x10f, 0x63, "8df822acbe701eaf5d6785f5f62e98c403b831c6d56f3f807e0c76b36e86e25f31e7a0b45b60e1a7f78fc4d502497f53323fedc6f169130f2ab5df8b6b468c36c8edd188274f5e839e233966fb263bba1a0f578958145292e869ab892bb24c08fb60e381f2e1681779b1441b829094bf3727d98f4d11201f1bc57c8105eae243396c666e413638df0825d2c9e24fab57ca235da8eb76bbff53e81a7c811df94d401559e658bcef25c1b61547503d3c1720dfc29dfbfecac6dc3c85ea8b7c5d25436df7c4dde44e99b3c8946f4eb16c866337c1a7cefc42e1ca7232297a69617d2cbb1fe57be51f4f8716ce0acd88c8d4a22808d27fcbe5f10c44a222eaf6fc818aa07157fb5ec451e685cdb3a615e196bfe4d24647fa071d1be3f85200e2d28624a1497acad83240b6629204412ede69752bdcbe4bd397adcd221bd557a53440085d3b9002cce63d324c5c50696ed4bfa38a06c498d9abaa3027c61443c29b5bafa4de8373aecfd68c6ba977bf2d05efbc654a3d0e061fc88943a5e5ef0c1389c619336e9ee6d61afa7a419bd9a86768a1ef588732435379dc6db77f25a2f77d65661822ea2259fe84833331f269fc5fb9cd00cc19e2cbf68b0e97ae830faf60660d31d38ccdea01ae56faf5e227a3afa81767f0b379606b82bf2fc4b4db9dd41f41bf91ba6214e9d86e0c630a518ace5ef0407193f75980267ab98bcc52181c2e9788011e4a3e718bc31f665a6ebb484994029a53689143d5a4e974358a415da0bd13bffa9815f89e7e536082d1175a82ff8291db38c0bd6929af1cc3203f9892ec35a9429446a60e7c73d147b19cb4c24d71a05af7c8960825f3628d0f3961b8c636c434b7880911b61dbc43dc869e13e06bb4f2b32f4ee3021f17fda28c37d65c19a69df0ae17574d19a72e6e6045c8b4df25d8b2f601d0d906ace265de3056737780d691c7f19c15d4b3a6615d118dbdef70373cb44168300c5ee33e71f7bf9c4ff2ae81fa45a8d02a193f18cee6883f9d7ee5aced06c72ad8ffdfc46add1c0e86a927eb59699155881114603268f77de9aa08766268d2f3ea8d81039fcae4b7d6982d821d1a373cc109c9086939fbf1348300e9101aae10aeaae2b893feb64059e07fa201440b69143726a110a5956264e2bb3d79df6bd0a7cdc9e44f4315a1e5fe76fb8848d438337da58bf5e1c19bbeb474278552ebb19e5ec74433275434a56cfe1e49af1bd5d89a786fa5f8458a0c7dbf3cd5a3ed0a091d9e1662ab405c5b358c25f3e5b176076046dc0c0262b31b6579359e7b397323704c63af69a30344e2f1bfef284d2c2a6f1bb62581ba5c371059813bf8196229187541bd0cb66c40621e061340ad11a7cc8ce92d2d5c09d95df9ce4983894db6192652a195ffbbae3c65bcc7e78108c6b1a7472d0ccc7595b8ed7a6436d748d5aeb30bde98ce109fd4cd6175e7ec0624ddf77d625898e484f07bf979a928ceeb45187868cf472dc5c050eaeabf70a80591d186683b161e310c5ae00d84033b2ec812c47530e654f41f45d027524e7734b21f54b2ae34561278f5cf7bafc28dc300cfbea82479499cddffb29811160a17f9cc828d7cbb57cef8d490611e54044a0d24b9cd46b559490715d5347322406a8cefb670e5aac2ed376e4de25d0f6092ca8185759eef975c5df9bfdbacf7ad446b22e91772b714a49ed9ba55f84e418fb87f5417dd48f0216cc7e28b4dae371e6df4fcdfd0ed212033154e54f643cc29a56e1820048976af774ea7e5a1d1a2f4e48887986a49dee087ee5cbd97c187b5a9168578838044f56c49b46c004babfc7b10101c6b55bd80d61181a3de18f865081b687522f4e7d73371753e227a52e82a5de75ef00fe4acaa6d3ef0b1e948a8e5553c64844a9cc758f8b3499fda8c4c4229452c6dadd0fffc96a739f9453805b6b5be1f96660bee40fb13e9b2ec84968c0839f7a415adcc9cc610cd4621c5b5fab1608143bd15374e9ad6d46d88683c71af355e62a91a3b05448fb59f44ca0e34703efa86868fc06332f696b69542de38567667363aae4cd1847f12c75d960b0caf55106ca65c81a3bc236a71ce27db0827254d5d67546ee0a89d867857b854bd8357a71f2d4856ad590933056c4a2d70827b1b82b7a4dc29acec221f14f413414737f13b6e8dc0d246de840bc4ecf6d1603c0732e0b8544fee85ac866274c471bccd1dd2d796209fdd24c251efc0c4f1f14995d22cce45d101bbf8c770306c0e7cfe7c5eacbd201166352671bab0fa502d834930f9e055b5d35de920e8af3a004d07defa7d4da4cc5e0c8f25ff6a16fc331817b77beafb693974bd1280d7c9af0570083ed1db6e1d86b1cf3eef27568781199b9861ee22912ea85ad8a8b7314f35246545b79d3981d56be20317797c2e8822ec2edc9907b633aea558445842adf6fe9ae080d68b4b841c9029d1758fd88f3cd2ccc4755556331e41be76183500c2f46c02b6b05b83b6dd11a8b8c1444473f33c52e21b80c5fb3b664266ff14aef6f7190a191402d6e988981acc585f352b5fa9a850122b9a8d9cd6d34d53a4762578194f2302241c3179d25bbd81e2b86e9c9d0af4f8ca36ed311b051e1965330a114d1f49db459378e75cc96a6514f4961569c53d8c440f6d24cde7f8705a11d6a507c975ef4c9e693f5d35cbe42a4a116a7333b8fe24b54e01eaa71e65723164a83a0c9e531e6cdf7897376469012696646118237d85dc5c7762b986970cacc3e59de53429471a4577483564f5f95a9461911315b699d0280f65273c1c2f32eda7b95239cbd902ca1c6092dddbe54be6eda2b08e4d72525b5263b2ee876f413810808fe1fcc3ef2c088bca27b289e4362057151df2b5a0136b7d5673c7f6b4826d7ac2e1a37fb2bb91f2fc8544376b255d2d54b866e68656fb4ff6b1d8640f8b3bcc5004d1b6e7bdf70da4fa295ccb9b73d580a491e3cdbab8f12913123f650f15bccb534ba52340213787504b89e7ae259305c42505f27f9b0671be7da65c2b8750d752fd5f8bedf23091d3ef41ba4dddd7e781c93e3a2316c5c0aa9056e7172e3d4bcad99d01da1052da67e356637afa7b66dae3241f28d8400767d0787e2513c20dd5438fec1182e91d6a80e83a2f0c1697c689de1a772f9730e49ff54762735c0f60b983f7dcb83464925218634a045e353d35351377872ee169a68aebbcef2c748bfd6af9032b9052d9450ef05ad3a9e17e048df29887e034815801bf089c660eb357738b0bf56e94cfeff57fd66f9c575ce95ab26061ea3655c8f22d6ac03eae2a44b16aa3e725216b41b0f34b5e0791c55927e905ffb683bd2f291ec007758c30001599aacb61a9eb5756b3594b689fe6d310a15fa6649e8665fa80dfc830ad19c6fcee7b18b6d3c91db3d1bcd52fa0ea7e98ec27c4c67de578666732662dfaeaa5e66fb3f67182428c48c483b5383143950f8b33f51671f3cd176075c81ac44220769d0785a2aa6c7cc40e938fd8ff9a1a53fd11de6ae28dc491bedf36d68b8612284859d56463140ee906b2d5a7150d846fd1f9c65f53ca04837d0b8510fc885ba1148b0fbe934a6acd214f1d074ff110d9c77066e416eae6f2d2d6f8b9dd0bc61ed36ae0bc44297bb396219aaf7bc54c279c9a711dabb0fe21e22690c2d62236eb25cfc1f3c7113b14d91b0c70ccfb9c960dbc069914a8da82e904cbeee98d894953f191cadd3647135f3f171d937ee6a028042821d470e20cd921d30e49426585cc3252a3eae2bed020dd0d1ce913ff4c53eaca0e67ab2e2c3f0d88263472a06656e43469c0a6414302da08e6d28ccd73a027a41f859481f158da40808b7ce9b950ad6b7c67bd7db5c58608cddeea4713f5390df6602813d9f096e4662bfdfaa541ef41703ed1cf7edf9cb71e5755c54d4c5e1f960ff36bf50134ef2071efab8649e24ca0c6362068fe7786ebebe0ad7bcaeccb162663c2e8f334122bdd9280fdeb4959834e97d22021deec908067eae096030111a0e41fc215097da9103548440354cfd6affdc9616ce785c5ff0b574963acfea25d6e9c26d0c84781fbc965969a384c597359b6cbdcbdadad6ced1b7be2dbd2c64c3638061cfca526d0eaf272ac1e73bcf0c46661e348bd2a6a329d18e62e1d88f8b3d5ec3ae01bbb472dc46aef3a0fec79a85c22789d1519eb8e998a6b569ab826f0d05f040a509417d2a1661d6b894e0bddea344aa342df665e8d8a19f6120903ccb8fd948eb6b5e7a4e6368e0defe1c07edbe595c6c68551a996e6cc05b6be55b63836b145cab209fd3b350042d0a1d99b3c2f79b66c216407ff36ba3ef9bd94934d81ddc6914b2e0c564a824f8e7683a328d17c820d12c6f7e67e0ecab33b111329910058b578179290323a6c686526afcd2574ebb093b694a5193ecab322a0b481466df1f8824d5bad6cd4726b91edc73cbd76edd096720ca32d07001d63445a4c88a2d5768bb8320ceee5c39817efc7e9ce27b7ab21ec1d118e0c1e3c1e6defe64988730b934da11ec2e7a722e59a33c7ae084750e8b6e3c4d227f6d42495542b4527448bfea775d8ed7cfd2077ee6e04309e1c27e313fe73ca6b458d5dbfede9c4551eb28c22cce459bd6b9afcecc29cd8dba1ab9fc8e7f13920591c578ceeab1bf21eecfaf7f20fecca016f766597fa3a11b92c9c3ed670dc5ca56155365a8c940ab937f89d4dc04fe425bb607b11491307e6947035761f4c849045ef9e967d196761e93810c09c276e4f3af10de091082db7770ccddcdfdc915a02775991a5cf59640c2282621beefb8b6b7a59c01d80bef4dde362fbd777599f8992f5b0b02ff28919ae29f30a8e7660846cfb167b6e678e65f6f3a313a2f2e7d438fb0e8affd8a561bb57346215e3dcf4eb1c365152300d380b9ea5ea826fe64a7f53365a97774fc84cb21c7a5e0b7450487e4b200802d4f1f8ecc2f1bbc84fc36cae2774212c4442f7cd057020e8df027d21264fcc0d13481dbfbfe5ca87daf492afc2aed7b8f75df2cc8d51e17430469500e81123b80738d889917d7b4265b9966735f6fe44614d446fdf3d8e47e6f46d32218fd7384d989e562bd8da45f62fbf2c330fdda2bd9b7b141cacae597371056d797b12e02de63be2a6a7682d240e8fa84617434ef869810a0911e01e61fbdb1296c11f85c68570298198d52df449ff0ea741fa47503f0cf0b94559c6e8160d351e812db2ff9bdfa50f7118582a9c957f24a87bc71c067d8983d54e0f5a4dfae8c934ffea88391850fc4ea0df97ff94a09d7dbe44289086664b11bef5da7837478ff4d08548e63b585549815e28d794a2cad4c2dd7960aa2bf8b1d77f6066b33497f59cd8d7652e14df947d3e24fe6f6d076fd73f18a695bedd82cc71aabf8ec67670b61e09df13d6915f78d84854dbea2b2e38674405df4d627ef97863dda8046b65951a6b456042e3aaa9d4d543b35b1be5e5f5ebd9ba6a3a849545e0f21c81c80beb7f4d5d64620656cd0876cbfef418946e31cd28de2df29372699c9a7327a28028fc7a94a7577be56e8580b732369f2bcbd8bcbf23beead07dfbe854c41057ba49e0dbc075820f05c9ea0cd7b4a4b338e98e9c38ac9f4137e068931caa75112dd6323e29d459695f67a911d1a78c8e988e63f7abbb7a6ceb4a2b4a125954bd1d3bb3210cf3813dc36b5e7e6d6ee8f8bfe7599ef6102f62e4c0e2e394d2ab1e383c514370534d3f9ba3bf539962c1be97ce423a92bd6377f4775a33101aa6be5aa0e57823453ba860f1b3bb2913c5200ee806e755922f"}, {0x40, 0x0, 0x30, "0c593cf2a23f1d47493cd08bcf798c91d95d631266b3049288d75365daaae7f2f83e08987a4f050c6f3972a2de309fc4"}, {0x20, 0x19d, 0x6, "cce7053c4d7569a5b16faa6d"}, {0x68, 0x18f, 0xfffffffffffffff8, "7aede953c6776419715b154e96c416732aa781f720355d077c57d5912fbe5f3d5c11452d20c5181675d71b5346aa64047622c4f08d547bce9cc034dd6b497ec8a4ede43e4dad1d55e968d53d1341183f754a2000"}, {0xd8, 0x108, 0x6, "978953748ba38c6a2572e7f57d9b20a17b3cea7f7814f75399ff5958c0f9d7238eaafd0d4e822bf6be82567b53e3b9b218d40f59c7b1b8237d9ec975ff8a914c6755cc2bf370a2baf19330ed23aee779d14e93c4bc339cfbcd11aa6d0368eb53169da8afef0423c51565693f8c78f1fa3043b78746c06d4982270b9fd4c776fd1c76b62ec739194ee6becdc2f016bb522dc0135329f6f8153da4917b49f314eea4e639b4cc366d0eb3bb31ceab00e8313edf02982d490539ab6c4ff22cc650d22b0af666472949"}, {0xe8, 0x108, 0xf71, "095a055dc28ef7e53e53050de6b814009eea4a6671b551f6634417b0c2d9cffe7fd72383691986da140c26c00d903d0194395a78bbe099404b68b10cb19182952a282f56c553b40e1fa11ddd5781e3d00629ee252429cb3e832c1a63378a37bccfb4db11c38422790236cd4fa4fc441f21b21c6ed65f30c0d56981c754b8c5d33999db6962a14b3126fd5210cb39b43128976851d5381e541ac151a786f7d5f14211b1c3ba9357a0fcfcefefe6728a76c7a2ed7ec7e967a02ee50f6fd6efcf32e0418d592736eda623542066aabd1ae8a42650012c"}], 0x1298}, 0x1}], 0x5, 0x40) r1 = syz_open_dev$vcsa(&(0x7f0000005b40)='/dev/vcsa#\x00', 0x9, 0x3c5640) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000005b80)={0x0, 0x4}, &(0x7f0000005bc0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000005c00)={0x8001, 0x0, 0x2, 0x8001, r2}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000005c40)={r3, 0x3, 0x6, @dev}, 0xa) close(r0) 01:32:04 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x440c40, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x3, 0x76c, 0x356, 0x9000000}, 0x8) [ 341.744895] CPU: 0 PID: 12564 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 341.752236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.761606] Call Trace: [ 341.764235] dump_stack+0x1db/0x2d0 [ 341.767887] ? dump_stack_print_info.cold+0x20/0x20 [ 341.772925] ? __lock_is_held+0xb6/0x140 [ 341.777017] should_fail.cold+0xa/0x15 [ 341.780931] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 341.786064] ? arch_local_save_flags+0x50/0x50 [ 341.790660] ? lock_release+0xc40/0xc40 [ 341.794654] ? lock_downgrade+0x910/0x910 [ 341.798832] should_fail_alloc_page+0x50/0x60 [ 341.803353] __alloc_pages_nodemask+0x323/0xdc0 [ 341.808056] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 341.809817] device lo entered promiscuous mode [ 341.813109] ? __find_get_block+0xf20/0xf20 [ 341.813126] ? mark_held_locks+0x100/0x100 [ 341.813144] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 341.820237] device lo left promiscuous mode [ 341.822073] alloc_pages_current+0x107/0x210 [ 341.822095] __page_cache_alloc+0x3cd/0x620 [ 341.822113] ? print_usage_bug+0xd0/0xd0 [ 341.848978] ? __filemap_set_wb_err+0x3f0/0x3f0 [ 341.853690] ? mark_held_locks+0x100/0x100 [ 341.857919] ? __lock_acquire+0x572/0x4a30 [ 341.862152] pagecache_get_page+0x36e/0x1020 [ 341.866573] ? add_to_page_cache_lru+0xd20/0xd20 [ 341.871338] ? __brelse+0x105/0x180 [ 341.874962] ? add_lock_to_list.isra.0+0x450/0x450 [ 341.879888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.885421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.891003] ? check_preemption_disabled+0x48/0x290 [ 341.896022] ? __lock_is_held+0xb6/0x140 [ 341.900084] grab_cache_page_write_begin+0x75/0xb0 [ 341.905011] ext4_da_write_begin+0x360/0x12d0 [ 341.909513] ? ext4_write_begin+0x1810/0x1810 [ 341.914004] ? __lock_is_held+0xb6/0x140 [ 341.918070] ? rcu_read_lock_sched_held+0x110/0x130 [ 341.923081] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 341.928683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 341.934247] ? iov_iter_fault_in_readable+0x22c/0x450 [ 341.939449] ? copy_page_from_iter+0x900/0x900 [ 341.944030] generic_perform_write+0x2a0/0x6b0 [ 341.948615] ? add_page_wait_queue+0x480/0x480 [ 341.953197] ? generic_file_direct_write+0x37c/0x4b0 [ 341.958337] __generic_file_write_iter+0x4b3/0x630 [ 341.963285] ext4_file_write_iter+0x37a/0x1410 [ 341.967909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.973461] ? ext4_file_mmap+0x410/0x410 [ 341.977626] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 341.982915] ? rcu_read_unlock_special+0x380/0x380 [ 341.987861] ? __fget+0x499/0x710 [ 341.991313] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 341.996861] ? iov_iter_init+0xea/0x220 [ 342.000846] __vfs_write+0x764/0xb40 [ 342.004557] ? check_preemption_disabled+0x48/0x290 [ 342.009585] ? kernel_read+0x120/0x120 [ 342.013496] ? rcu_read_lock_sched_held+0x110/0x130 [ 342.018576] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 342.023329] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.028860] ? __sb_start_write+0x1ac/0x360 [ 342.033184] vfs_write+0x20c/0x580 [ 342.036775] ksys_pwrite64+0x183/0x1c0 [ 342.040664] ? __ia32_sys_pread64+0xf0/0xf0 [ 342.045021] ? __ia32_sys_read+0xb0/0xb0 [ 342.049084] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.054445] ? trace_hardirqs_off_caller+0x300/0x300 [ 342.059548] __x64_sys_pwrite64+0x97/0xf0 [ 342.063697] do_syscall_64+0x1a3/0x800 [ 342.067583] ? syscall_return_slowpath+0x5f0/0x5f0 [ 342.072517] ? prepare_exit_to_usermode+0x232/0x3b0 [ 342.077594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.082439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.087626] RIP: 0033:0x458099 [ 342.090813] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.109714] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 342.117439] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 342.124759] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 342.132025] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 342.139292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 01:32:04 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 342.146566] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 342.161154] device lo entered promiscuous mode [ 342.166026] device lo left promiscuous mode 01:32:04 executing program 2 (fault-call:2 fault-nth:4): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:04 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7fff, 0x4040) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f00000000c0)={0x1, {}, 0x8000, 0x10000}) 01:32:04 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) sync_file_range(r0, 0x2, 0x3, 0x5) ioctl(r0, 0xffffffffffffffc0, &(0x7f0000000100)) [ 342.267038] FAULT_INJECTION: forcing a failure. [ 342.267038] name failslab, interval 1, probability 0, space 0, times 0 [ 342.278579] CPU: 0 PID: 12596 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 342.285782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.295149] Call Trace: [ 342.297763] dump_stack+0x1db/0x2d0 [ 342.301417] ? dump_stack_print_info.cold+0x20/0x20 [ 342.306474] should_fail.cold+0xa/0x15 [ 342.310503] ? fault_create_debugfs_attr+0x1e0/0x1e0 01:32:04 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 342.315630] ? mark_held_locks+0x100/0x100 [ 342.319897] ? find_held_lock+0x35/0x120 [ 342.323980] ? __dquot_alloc_space+0x54a/0x8b0 [ 342.328591] __should_failslab+0x121/0x190 [ 342.332847] should_failslab+0x9/0x14 [ 342.336662] kmem_cache_alloc+0x47/0x710 [ 342.340737] ? __es_remove_extent+0x871/0xb30 [ 342.345267] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 342.350309] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 342.355086] __es_insert_extent+0x366/0x1190 [ 342.359508] ? ext4_es_free_extent+0x770/0x770 [ 342.364101] ? do_raw_read_unlock+0x70/0x70 [ 342.368425] ? __lock_is_held+0xb6/0x140 [ 342.372514] ext4_es_insert_delayed_block+0x28e/0x710 [ 342.377712] ? ext4_is_pending+0x220/0x220 [ 342.381944] ? _raw_spin_unlock+0x2d/0x50 [ 342.386090] ? ext4_da_reserve_space+0x166/0x6c0 [ 342.390845] ? ext4_update_bh_state+0x210/0x210 [ 342.395512] ? down_read+0x8d/0x120 [ 342.399142] ? ext4_da_get_block_prep+0xe12/0x1570 [ 342.404078] ? __down_interruptible+0x740/0x740 [ 342.408797] ext4_da_get_block_prep+0x9ce/0x1570 [ 342.413554] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 342.419172] ? create_page_buffers+0x2a3/0x610 [ 342.423754] ? create_empty_buffers+0xd80/0xd80 [ 342.428418] ? alloc_pages_current+0x10f/0x210 [ 342.433002] ? __page_cache_alloc+0x19c/0x620 [ 342.437508] ? print_usage_bug+0xd0/0xd0 [ 342.441585] __block_write_begin_int+0x605/0x2010 [ 342.446429] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 342.452097] ? __breadahead+0x160/0x160 [ 342.456094] ? ___might_sleep+0x1e7/0x310 [ 342.460261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.465793] ? wait_for_stable_page+0x192/0x570 [ 342.470456] ? arch_local_save_flags+0x50/0x50 [ 342.475032] ? set_page_dirty_lock+0x1a0/0x1a0 [ 342.479607] ? __lock_is_held+0xb6/0x140 [ 342.483715] ? ext4_inode_attach_jinode.part.0+0x150/0x150 [ 342.489337] __block_write_begin+0x31/0x40 [ 342.493609] ext4_da_write_begin+0x622/0x12d0 [ 342.498108] ? ext4_write_begin+0x1810/0x1810 [ 342.502612] ? __lock_is_held+0xb6/0x140 [ 342.506763] ? rcu_read_lock_sched_held+0x110/0x130 [ 342.511782] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 342.517314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 342.522847] ? iov_iter_fault_in_readable+0x22c/0x450 [ 342.528034] ? copy_page_from_iter+0x900/0x900 [ 342.532626] generic_perform_write+0x2a0/0x6b0 [ 342.537248] ? add_page_wait_queue+0x480/0x480 [ 342.541833] ? generic_file_direct_write+0x37c/0x4b0 [ 342.546936] __generic_file_write_iter+0x4b3/0x630 [ 342.551865] ext4_file_write_iter+0x37a/0x1410 [ 342.556446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.562001] ? ext4_file_mmap+0x410/0x410 [ 342.566155] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 342.571435] ? rcu_read_unlock_special+0x380/0x380 [ 342.576504] ? __fget+0x499/0x710 [ 342.579981] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 342.585527] ? iov_iter_init+0xea/0x220 [ 342.589553] __vfs_write+0x764/0xb40 [ 342.593277] ? check_preemption_disabled+0x48/0x290 [ 342.598289] ? kernel_read+0x120/0x120 [ 342.602188] ? rcu_read_lock_sched_held+0x110/0x130 [ 342.607268] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 342.612114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.617648] ? __sb_start_write+0x1ac/0x360 [ 342.621970] vfs_write+0x20c/0x580 [ 342.625519] ksys_pwrite64+0x183/0x1c0 [ 342.629403] ? __ia32_sys_pread64+0xf0/0xf0 [ 342.633719] ? __ia32_sys_read+0xb0/0xb0 [ 342.637779] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.643184] ? trace_hardirqs_off_caller+0x300/0x300 [ 342.648413] __x64_sys_pwrite64+0x97/0xf0 [ 342.652573] do_syscall_64+0x1a3/0x800 [ 342.656459] ? syscall_return_slowpath+0x5f0/0x5f0 [ 342.661401] ? prepare_exit_to_usermode+0x232/0x3b0 [ 342.666420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.671299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.676497] RIP: 0033:0x458099 [ 342.679686] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.698592] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 342.706306] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 342.713601] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 342.720869] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 342.728145] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 342.735434] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:05 executing program 2 (fault-call:2 fault-nth:5): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 342.846029] device lo entered promiscuous mode 01:32:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6800, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 342.915298] device lo left promiscuous mode [ 342.949892] FAULT_INJECTION: forcing a failure. [ 342.949892] name failslab, interval 1, probability 0, space 0, times 0 [ 342.963504] device lo entered promiscuous mode 01:32:05 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = socket$isdn(0x22, 0x3, 0x23) r2 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x200) write$FUSE_DIRENT(r2, &(0x7f00000004c0)={0x50, 0x0, 0x2, [{0x5, 0x7, 0x0, 0x7, 'self/systemem1user'}, {0x0, 0x7}]}, 0x1c2) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x44000, 0x0) write$apparmor_current(r3, &(0x7f00000003c0)=@hat={'permhat ', 0x2, 0x5e, ['.\x00']}, 0x1d) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x478, 0x390, 0x278, 0x278, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000440), {[{{@uncond, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x5, 0xa74381f}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0xb}, @multicast1, 0xffffffff, 0x0, @empty, {[0xff, 0xff, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0xff, 0x0, 0x0, 0x0, 0xff]}, 0x6e0, 0x198, 0x20, 0xd3d, 0x6b, 0x6, 'nr0\x00', 'veth0_to_bond\x00', {0xff}, {}, 0x0, 0x10}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback, @multicast1}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x1b}, @rand_addr=0x100000000, 0xff0000ff, 0xffffff00, @mac=@broadcast, {[0x0, 0xff, 0xff, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}, 0xfffffffffffff000, 0xe1, 0x7f, 0x3, 0x4, 0x7, 'netdevsim0\x00', 'bridge0\x00', {0xff}, {0xff}}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x8, 0x200, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c8) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000040)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r4) r5 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r5, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x128, r6, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x868}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffffd9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7a06}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6f69}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x75110467}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x8001}, 0x4010) [ 342.990615] device lo left promiscuous mode [ 343.023633] CPU: 1 PID: 12617 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 343.030880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.040254] Call Trace: [ 343.040288] dump_stack+0x1db/0x2d0 [ 343.040311] ? dump_stack_print_info.cold+0x20/0x20 [ 343.040327] ? print_usage_bug+0xd0/0xd0 [ 343.040358] should_fail.cold+0xa/0x15 [ 343.040380] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 343.059574] ? ___might_sleep+0x1e7/0x310 [ 343.059594] ? arch_local_save_flags+0x50/0x50 01:32:05 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 343.059611] ? trace_hardirqs_off_caller+0x300/0x300 [ 343.059628] ? do_raw_spin_trylock+0x270/0x270 [ 343.059671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.059696] __should_failslab+0x121/0x190 [ 343.092937] should_failslab+0x9/0x14 [ 343.096806] kmem_cache_alloc+0x2be/0x710 [ 343.100982] ext4_init_io_end+0x8e/0x220 [ 343.105054] ? ext4_end_io_rsv_work+0x990/0x990 [ 343.109723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.115260] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.120797] ? ext4_meta_trans_blocks+0x25c/0x310 [ 343.125659] ext4_writepages+0x134a/0x41a0 [ 343.129901] ? mark_held_locks+0x100/0x100 [ 343.134134] ? balance_dirty_pages_ratelimited+0x6d2/0x2370 [ 343.139868] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 343.144611] ? add_lock_to_list.isra.0+0x450/0x450 [ 343.149532] ? add_lock_to_list.isra.0+0x450/0x450 [ 343.154462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.160008] ? find_held_lock+0x35/0x120 [ 343.164088] ? kasan_check_read+0x11/0x20 [ 343.168255] ? do_raw_spin_unlock+0xa0/0x330 [ 343.172673] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 343.177957] ? do_raw_spin_trylock+0x270/0x270 [ 343.182540] ? _raw_spin_unlock+0x2d/0x50 [ 343.186675] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.192298] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 343.197563] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 343.202330] do_writepages+0x99/0x1a0 [ 343.206158] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 343.210932] ? do_writepages+0x99/0x1a0 [ 343.214940] __filemap_fdatawrite_range+0x352/0x470 [ 343.220000] ? delete_from_page_cache_batch+0x1690/0x1690 [ 343.225538] filemap_write_and_wait_range+0x4b/0xd0 [ 343.230547] __generic_file_write_iter+0x4ea/0x630 [ 343.235472] ext4_file_write_iter+0x37a/0x1410 [ 343.240065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.245658] ? ext4_file_mmap+0x410/0x410 [ 343.249804] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 343.255082] ? rcu_read_unlock_special+0x380/0x380 [ 343.260021] ? __fget+0x499/0x710 [ 343.263463] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.269010] ? iov_iter_init+0xea/0x220 [ 343.273000] __vfs_write+0x764/0xb40 [ 343.276711] ? check_preemption_disabled+0x48/0x290 [ 343.281716] ? kernel_read+0x120/0x120 [ 343.285619] ? rcu_read_lock_sched_held+0x110/0x130 [ 343.290627] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 343.295375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.300907] ? __sb_start_write+0x1ac/0x360 [ 343.305237] vfs_write+0x20c/0x580 [ 343.308782] ksys_pwrite64+0x183/0x1c0 [ 343.312671] ? __ia32_sys_pread64+0xf0/0xf0 [ 343.316980] ? __ia32_sys_read+0xb0/0xb0 [ 343.321042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.326396] ? trace_hardirqs_off_caller+0x300/0x300 [ 343.331497] __x64_sys_pwrite64+0x97/0xf0 [ 343.335676] do_syscall_64+0x1a3/0x800 [ 343.339595] ? syscall_return_slowpath+0x5f0/0x5f0 [ 343.344515] ? prepare_exit_to_usermode+0x232/0x3b0 [ 343.349535] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.354384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.359559] RIP: 0033:0x458099 [ 343.362740] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.381787] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 343.389510] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 343.396787] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 343.404051] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 343.411317] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 01:32:05 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x6, 0xc200) write$FUSE_INTERRUPT(r0, &(0x7f0000000280)={0x10, 0xffffffffffffffda, 0x1}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @dev}, 0x278) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000480)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000440)={r3, 0x3, &(0x7f0000000340)=[0x3ff, 0x3, 0x7ff], &(0x7f0000000380)=[0x100000000, 0x3, 0x400, 0x4, 0x9, 0x81, 0xfffffffffffffffa], 0x2, 0x2, 0x20, &(0x7f00000003c0)=[0x80000000, 0x1], &(0x7f0000000400)=[0x5, 0x9, 0x3ff, 0x400, 0x8, 0x7, 0x5, 0x404000000000000]}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={r2, 0x3, 0x6, @dev}, 0x10) clone(0x0, &(0x7f00000000c0)="b3b2273bea23efd115485fde0b3a5fdc25468fd48840aec21df38b082333aa3c8ebbebd49176151498743531f5e33fc53da7823cead3f3dfb6a107bb81e43d785a10", &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)="b8765cd62cbbfb2650e4474aba66dac9d13c9938f950dfa5d8c34ccf3df0b70136583f49cfdf9d120e6361c55f09cda50dd30ce42f7b4efd156b51751437447f1e02a432cd95c90ba2227440a895b081004a269c84c64f3ed8cd58483fa27faa7f05b15562f64504690da21bc3670d47b54ffdeb99f1c777366e6395681c2525fc7a2de88f1b6aafd25f338662c24cf752fce2de91e5d839adcd19de13c3a9") [ 343.418574] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 343.432543] EXT4-fs: 5 callbacks suppressed [ 343.432555] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:05 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$VT_RELDISP(r1, 0x5605) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl(r0, 0x6, &(0x7f0000000100)) [ 343.478643] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 343.537778] device lo entered promiscuous mode 01:32:05 executing program 2 (fault-call:2 fault-nth:6): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6c00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 343.602350] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:06 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 343.712405] FAULT_INJECTION: forcing a failure. [ 343.712405] name failslab, interval 1, probability 0, space 0, times 0 [ 343.758273] CPU: 1 PID: 12652 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 343.765513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.774875] Call Trace: [ 343.777483] dump_stack+0x1db/0x2d0 [ 343.781137] ? dump_stack_print_info.cold+0x20/0x20 [ 343.786190] ? lru_add_drain_cpu+0x1c4/0x520 [ 343.790652] should_fail.cold+0xa/0x15 [ 343.794564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 343.799690] ? ___might_sleep+0x1e7/0x310 [ 343.803861] ? arch_local_save_flags+0x50/0x50 [ 343.808322] protocol 88fb is buggy, dev hsr_slave_0 [ 343.808460] __should_failslab+0x121/0x190 [ 343.813525] protocol 88fb is buggy, dev hsr_slave_1 [ 343.817691] should_failslab+0x9/0x14 [ 343.817708] kmem_cache_alloc+0x2be/0x710 [ 343.817735] ext4_init_io_end+0x8e/0x220 [ 343.834702] ? ext4_end_io_rsv_work+0x990/0x990 [ 343.839378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.844923] ext4_writepages+0x147e/0x41a0 [ 343.849173] ? mark_held_locks+0x100/0x100 [ 343.853431] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 343.858187] ? add_lock_to_list.isra.0+0x450/0x450 [ 343.863138] ? add_lock_to_list.isra.0+0x450/0x450 [ 343.868076] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.873644] ? kasan_check_read+0x11/0x20 [ 343.877798] ? do_raw_spin_unlock+0xa0/0x330 [ 343.882208] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 343.887497] ? do_raw_spin_trylock+0x270/0x270 [ 343.892094] ? _raw_spin_unlock+0x2d/0x50 [ 343.896252] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.901797] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 343.907082] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 343.911848] do_writepages+0x99/0x1a0 [ 343.915649] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 343.920408] ? do_writepages+0x99/0x1a0 [ 343.924397] __filemap_fdatawrite_range+0x352/0x470 [ 343.929419] ? delete_from_page_cache_batch+0x1690/0x1690 [ 343.934982] filemap_write_and_wait_range+0x4b/0xd0 [ 343.940016] __generic_file_write_iter+0x4ea/0x630 [ 343.944956] ext4_file_write_iter+0x37a/0x1410 [ 343.949548] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.955095] ? ext4_file_mmap+0x410/0x410 [ 343.959270] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 343.964551] ? rcu_read_unlock_special+0x380/0x380 [ 343.969496] ? __fget+0x499/0x710 [ 343.972957] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.978529] ? iov_iter_init+0xea/0x220 [ 343.982527] __vfs_write+0x764/0xb40 [ 343.986298] ? check_preemption_disabled+0x48/0x290 [ 343.991322] ? kernel_read+0x120/0x120 [ 343.995236] ? rcu_read_lock_sched_held+0x110/0x130 [ 344.000256] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 344.005016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.010557] ? __sb_start_write+0x1ac/0x360 [ 344.014883] vfs_write+0x20c/0x580 [ 344.018436] ksys_pwrite64+0x183/0x1c0 [ 344.022331] ? __ia32_sys_pread64+0xf0/0xf0 [ 344.026656] ? __ia32_sys_read+0xb0/0xb0 [ 344.030723] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.036092] ? trace_hardirqs_off_caller+0x300/0x300 [ 344.041204] __x64_sys_pwrite64+0x97/0xf0 [ 344.045371] do_syscall_64+0x1a3/0x800 [ 344.049278] ? syscall_return_slowpath+0x5f0/0x5f0 [ 344.054248] ? prepare_exit_to_usermode+0x232/0x3b0 [ 344.059297] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.064154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.069356] RIP: 0033:0x458099 [ 344.072594] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.091517] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 344.099240] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 01:32:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0x10) close(r0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1c, &(0x7f00000000c0)=""/7, &(0x7f0000000100)=0x7) [ 344.106515] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 344.113787] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 344.121056] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 344.128325] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 344.135992] protocol 88fb is buggy, dev hsr_slave_0 [ 344.141133] protocol 88fb is buggy, dev hsr_slave_1 [ 344.146282] protocol 88fb is buggy, dev hsr_slave_0 [ 344.151414] protocol 88fb is buggy, dev hsr_slave_1 01:32:06 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x2000000000000004, &(0x7f0000000180)="c7e537fdd203e454060100005b684c54311cbe7b4c067931f1fc9f3cfbeee54760ba70f177da5c1b2d390ef3869f005c0d0b864ffa95c02cc030454f68eae7eeae533751ec6881b4ab907a116e75123c6a2064e376a54177c389bd5e792e80bcf066f047a72570") [ 344.176132] device lo left promiscuous mode 01:32:06 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 344.229033] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:06 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x800, 0x0, 0x10000, 0x1f}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000080)={0x1, r1, 0x10001, 0x7}) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r2 = syz_open_dev$media(&(0x7f00000051c0)='/dev/media#\x00', 0x1ff, 0x800) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000005240)='nbd\x00') r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000005280)='/proc/capi/capi20ncci\x00', 0x418000, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000005380)='/dev/vga_arbiter\x00', 0x50000, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000006780)='/dev/hwrng\x00', 0x40100, 0x0) r7 = syz_open_dev$amidi(&(0x7f00000067c0)='/dev/amidi#\x00', 0x0, 0x101003) r8 = fcntl$dupfd(r0, 0x406, r0) r9 = dup3(r0, r0, 0x80000) r10 = syz_open_dev$swradio(&(0x7f0000006800)='/dev/swradio#\x00', 0x0, 0x2) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000006840)='/proc/self/net/pfkey\x00', 0x2000, 0x0) pipe(&(0x7f0000006880)={0xffffffffffffffff}) sendmsg$NBD_CMD_STATUS(r2, &(0x7f00000069c0)={&(0x7f0000005200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000006980)={&(0x7f00000000c0)=ANY=[@ANYBLOB="bc000000", @ANYRES16=r3, @ANYBLOB="000425bd7000fcdbdf25050000000c000800c2000000000000003c00070008000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="b238d83ea1df3dbf08fff300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="08080300", @ANYRES32=r10, @ANYBLOB="0c000500000000000000000008000100000000000c0005000a000000000000000c00020007000000000000000c0002008b440000000000000c00040000000000000000001c00070008000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=r0], 0xbc}, 0x1, 0x0, 0x0, 0x20000080}, 0x800) 01:32:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7400, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 344.289917] device lo entered promiscuous mode [ 344.296301] device lo left promiscuous mode [ 344.305657] device lo entered promiscuous mode [ 344.315753] device lo left promiscuous mode 01:32:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f0000000040)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=""/209, 0xd1}, {&(0x7f0000000300)=""/210, 0xd2}, {&(0x7f0000000400)=""/212, 0xd4}, {&(0x7f0000000500)=""/251, 0xfb}, {&(0x7f0000000600)=""/173, 0xad}], 0x5, &(0x7f00000006c0)=""/192, 0xc0}, 0x2000) r2 = geteuid() sendmsg$nl_xfrm(r1, &(0x7f0000000ac0)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f0000000a80)={&(0x7f0000000b00)=@getae={0x28c, 0x1f, 0x1, 0x70bd2b, 0x25dfdbff, {{@in=@multicast1, 0x4d4, 0x2, 0x7f}, @in=@loopback, 0xf400, 0x3507}, [@algo_auth={0x124, 0x1, {{'sm3\x00'}, 0x6e0, "53dd1e11cdacb42485514897778b4496e206af97c47da1c018da0444e54a0c0e6c5a4f165a5b69e0a920d65fd2ba48491c71d69a4ff50f6e10f620d4b504c9156c1664a71f11c713102c0200e7ed6b5459dff0f2e4803705750053e3bc4bfa9099eeba541fa0eb65054ffd26c6f0e047041108188a413a9fee3496134338dba9378f4a3fa745d5fb07c7e1980fe801df664b758109c2654e6b3e014c5c2fd09f70c77f9293b370449ea24dde2795496cf1902575ad25f15d455b29e59f7cd300a7cc601ece9ff3ef268ef2d859d27ac0fd2a7dae001275aebbad553d"}}, @sa={0xe4, 0x6, {{@in=@local, @in6=@loopback, 0x4e22, 0x7, 0x4e20, 0x2, 0x2, 0x80, 0xa0, 0x3b, 0x0, r2}, {@in6=@loopback, 0x8d4, 0x2b}, @in6=@loopback, {0x1, 0x6, 0x1, 0x49, 0x1, 0x4, 0x0, 0x8}, {0x6, 0x0, 0x0, 0x32683706}, {0x6, 0x8db, 0x100}, 0x70bd2b, 0x3503, 0xa, 0x4, 0x0, 0x40}}, @replay_esn_val={0x2c, 0x17, {0x4, 0x70bd2a, 0x70bd27, 0x70bd2c, 0x70bd2a, 0x0, [0x7, 0x4, 0x5, 0x0]}}, @proto={0x8, 0x19, 0x33}, @ipv4_hthresh={0x8, 0x3, {0x12, 0x4}}, @ipv4_hthresh={0x8, 0x3, {0x11, 0x19}}]}, 0x28c}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r3, 0x3, 0x6, @dev}, 0x10) close(r0) 01:32:06 executing program 2 (fault-call:2 fault-nth:7): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:06 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a048f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:32:06 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000080)={{0x10001, 0x3}, 0x1, 0x3, 0x7, {0x9, 0x101}, 0x1, 0x5}) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 344.476447] device lo entered promiscuous mode [ 344.527010] device lo left promiscuous mode [ 344.573623] device lo entered promiscuous mode [ 344.586483] device lo left promiscuous mode [ 344.600668] FAULT_INJECTION: forcing a failure. [ 344.600668] name failslab, interval 1, probability 0, space 0, times 0 [ 344.624116] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 344.665759] CPU: 1 PID: 12696 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 344.673011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.682374] Call Trace: [ 344.685010] dump_stack+0x1db/0x2d0 [ 344.688660] ? dump_stack_print_info.cold+0x20/0x20 [ 344.693678] ? put_pages_list+0x520/0x520 [ 344.697824] ? find_held_lock+0x35/0x120 [ 344.701878] should_fail.cold+0xa/0x15 [ 344.705777] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 344.710892] ? ___might_sleep+0x1e7/0x310 [ 344.715029] ? arch_local_save_flags+0x50/0x50 [ 344.719605] __should_failslab+0x121/0x190 [ 344.723835] should_failslab+0x9/0x14 [ 344.727624] __kmalloc+0x2dc/0x740 [ 344.731182] ? ext4_find_extent+0x76e/0x9d0 [ 344.735543] ext4_find_extent+0x76e/0x9d0 [ 344.739683] ext4_ext_map_blocks+0x261/0x60a0 [ 344.744173] ? ext4_ext_release+0x10/0x10 [ 344.748319] ? check_preemption_disabled+0x48/0x290 [ 344.753342] ? __lock_is_held+0xb6/0x140 [ 344.757393] ? lock_acquire+0x1db/0x570 [ 344.761358] ? ext4_map_blocks+0x949/0x1bb0 [ 344.765684] ? ___might_sleep+0x1e7/0x310 [ 344.769839] ? lock_release+0xc40/0xc40 [ 344.773813] ? ext4_es_lookup_extent+0x478/0xdd0 [ 344.778578] ? down_write+0x8a/0x130 [ 344.782317] ? ext4_map_blocks+0x949/0x1bb0 [ 344.786627] ? down_read+0x120/0x120 [ 344.790349] ext4_map_blocks+0x9b1/0x1bb0 [ 344.794507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.800036] ? ext4_issue_zeroout+0x170/0x170 [ 344.804566] ? __lock_is_held+0xb6/0x140 [ 344.808640] ext4_writepages+0x2383/0x41a0 [ 344.812978] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 344.817758] ? add_lock_to_list.isra.0+0x450/0x450 [ 344.822688] ? add_lock_to_list.isra.0+0x450/0x450 [ 344.827616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.833155] ? kasan_check_read+0x11/0x20 [ 344.837302] ? do_raw_spin_unlock+0xa0/0x330 [ 344.841696] ? do_raw_spin_trylock+0x270/0x270 [ 344.846268] ? _raw_spin_unlock+0x2d/0x50 [ 344.850409] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 344.855954] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 344.861239] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 344.865992] do_writepages+0x99/0x1a0 [ 344.869787] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 344.874546] ? do_writepages+0x99/0x1a0 [ 344.878513] __filemap_fdatawrite_range+0x352/0x470 [ 344.883520] ? delete_from_page_cache_batch+0x1690/0x1690 [ 344.889089] filemap_write_and_wait_range+0x4b/0xd0 [ 344.894120] __generic_file_write_iter+0x4ea/0x630 [ 344.899041] ext4_file_write_iter+0x37a/0x1410 [ 344.903620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.909176] ? ext4_file_mmap+0x410/0x410 [ 344.913322] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 344.918599] ? rcu_read_unlock_special+0x380/0x380 [ 344.923560] ? __fget+0x499/0x710 [ 344.927023] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 344.932560] ? iov_iter_init+0xea/0x220 [ 344.936555] __vfs_write+0x764/0xb40 [ 344.940276] ? check_preemption_disabled+0x48/0x290 [ 344.945280] ? kernel_read+0x120/0x120 [ 344.949183] ? rcu_read_lock_sched_held+0x110/0x130 [ 344.954232] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 344.958995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.964519] ? __sb_start_write+0x1ac/0x360 [ 344.968886] vfs_write+0x20c/0x580 [ 344.972458] ksys_pwrite64+0x183/0x1c0 [ 344.976349] ? __ia32_sys_pread64+0xf0/0xf0 [ 344.980659] ? __ia32_sys_read+0xb0/0xb0 [ 344.984708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.990071] ? trace_hardirqs_off_caller+0x300/0x300 [ 344.995197] __x64_sys_pwrite64+0x97/0xf0 [ 344.999356] do_syscall_64+0x1a3/0x800 [ 345.003242] ? syscall_return_slowpath+0x5f0/0x5f0 [ 345.008173] ? prepare_exit_to_usermode+0x232/0x3b0 [ 345.013192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.018039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.023209] RIP: 0033:0x458099 [ 345.026420] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.045324] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 345.053028] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 345.060299] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 01:32:07 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:07 executing program 1: r0 = socket$packet(0x11, 0x1003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x3, 0x6, @dev}, 0xff3b) close(r0) [ 345.067555] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 345.074821] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 345.082077] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 345.157191] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 345.175712] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:07 executing program 4: ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffffff}) read(r0, &(0x7f0000000080)=""/4096, 0x1000) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:07 executing program 2 (fault-call:2 fault-nth:8): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:07 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101000, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1f, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000001780)={@empty, @initdev}, &(0x7f00000017c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @dev}, 0x278) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x3, 0x6, @dev}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000003c0)=0x21) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x32c, 0x70bd27, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) close(r0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x1a7, 0x5) 01:32:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7a00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:07 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 345.390656] FAULT_INJECTION: forcing a failure. [ 345.390656] name failslab, interval 1, probability 0, space 0, times 0 01:32:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 345.441089] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 345.468959] CPU: 0 PID: 12726 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 345.476178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.476186] Call Trace: [ 345.476211] dump_stack+0x1db/0x2d0 [ 345.476263] ? dump_stack_print_info.cold+0x20/0x20 [ 345.496822] ? is_bpf_text_address+0xac/0x170 [ 345.501332] should_fail.cold+0xa/0x15 [ 345.505244] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 345.505269] ? ___might_sleep+0x1e7/0x310 [ 345.505286] ? arch_local_save_flags+0x50/0x50 [ 345.519117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.524673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.530240] ? check_preemption_disabled+0x48/0x290 [ 345.535279] __should_failslab+0x121/0x190 01:32:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 345.539536] should_failslab+0x9/0x14 [ 345.543351] kmem_cache_alloc+0x2be/0x710 [ 345.547536] ext4_mb_new_blocks+0x6e8/0x4850 [ 345.551966] ? save_stack+0xa9/0xd0 [ 345.555609] ? ext4_map_blocks+0x9b1/0x1bb0 [ 345.556775] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 345.559970] ? do_writepages+0x99/0x1a0 [ 345.559989] ? __generic_file_write_iter+0x4ea/0x630 [ 345.560016] ? ext4_file_write_iter+0x37a/0x1410 [ 345.560033] ? ext4_discard_preallocations+0x1400/0x1400 [ 345.560048] ? __x64_sys_pwrite64+0x97/0xf0 [ 345.560063] ? do_syscall_64+0x1a3/0x800 [ 345.560081] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.560107] ? print_usage_bug+0xd0/0xd0 [ 345.602998] ? __lock_is_held+0xb6/0x140 [ 345.607051] ? add_lock_to_list.isra.0+0x450/0x450 [ 345.611974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.617502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.623026] ? check_preemption_disabled+0x48/0x290 [ 345.628030] ? __lock_is_held+0xb6/0x140 [ 345.632095] ? rcu_read_lock_sched_held+0x110/0x130 [ 345.637095] ? __kmalloc+0x5d5/0x740 [ 345.640796] ? ext4_find_extent+0x76e/0x9d0 [ 345.645109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.650647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.656261] ? ext4_inode_to_goal_block+0x2e9/0x400 [ 345.661281] ext4_ext_map_blocks+0x36d0/0x60a0 [ 345.665859] ? ext4_ext_release+0x10/0x10 [ 345.670003] ? check_preemption_disabled+0x48/0x290 [ 345.675037] ? ___might_sleep+0x1e7/0x310 [ 345.679190] ? lock_release+0xc40/0xc40 [ 345.683167] ? ext4_es_lookup_extent+0x478/0xdd0 [ 345.687934] ? down_write+0x8a/0x130 [ 345.691646] ? ext4_map_blocks+0x949/0x1bb0 [ 345.695974] ? down_read+0x120/0x120 [ 345.699725] ext4_map_blocks+0x9b1/0x1bb0 [ 345.703884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.709431] ? ext4_issue_zeroout+0x170/0x170 [ 345.713930] ? __lock_is_held+0xb6/0x140 [ 345.718022] ext4_writepages+0x2383/0x41a0 [ 345.722303] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 345.727042] ? add_lock_to_list.isra.0+0x450/0x450 [ 345.731972] ? add_lock_to_list.isra.0+0x450/0x450 [ 345.736899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.742435] ? kasan_check_read+0x11/0x20 [ 345.746582] ? do_raw_spin_unlock+0xa0/0x330 [ 345.750996] ? do_raw_spin_trylock+0x270/0x270 [ 345.755601] ? _raw_spin_unlock+0x2d/0x50 [ 345.759738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 345.765275] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 345.770547] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 345.775303] do_writepages+0x99/0x1a0 [ 345.779139] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 345.783915] ? do_writepages+0x99/0x1a0 [ 345.787893] __filemap_fdatawrite_range+0x352/0x470 [ 345.792913] ? delete_from_page_cache_batch+0x1690/0x1690 [ 345.798466] filemap_write_and_wait_range+0x4b/0xd0 [ 345.803474] __generic_file_write_iter+0x4ea/0x630 [ 345.808441] ext4_file_write_iter+0x37a/0x1410 [ 345.813046] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.818585] ? ext4_file_mmap+0x410/0x410 [ 345.822742] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 345.828009] ? rcu_read_unlock_special+0x380/0x380 [ 345.832947] ? __fget+0x499/0x710 [ 345.836388] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 345.841927] ? iov_iter_init+0xea/0x220 [ 345.845888] __vfs_write+0x764/0xb40 [ 345.849588] ? check_preemption_disabled+0x48/0x290 [ 345.854596] ? kernel_read+0x120/0x120 [ 345.858492] ? rcu_read_lock_sched_held+0x110/0x130 [ 345.863500] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 345.868271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 345.873821] ? __sb_start_write+0x1ac/0x360 [ 345.878141] vfs_write+0x20c/0x580 [ 345.881681] ksys_pwrite64+0x183/0x1c0 [ 345.885558] ? __ia32_sys_pread64+0xf0/0xf0 [ 345.889865] ? __ia32_sys_read+0xb0/0xb0 [ 345.893911] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.899277] ? trace_hardirqs_off_caller+0x300/0x300 [ 345.904373] __x64_sys_pwrite64+0x97/0xf0 [ 345.908521] do_syscall_64+0x1a3/0x800 [ 345.912409] ? syscall_return_slowpath+0x5f0/0x5f0 [ 345.917340] ? prepare_exit_to_usermode+0x232/0x3b0 [ 345.922348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.927202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.932395] RIP: 0033:0x458099 [ 345.935576] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.954479] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 345.962227] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 345.969517] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 345.976774] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 345.984029] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 01:32:08 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 345.991281] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:08 executing program 2 (fault-call:2 fault-nth:9): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 346.047526] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x2, 0x80) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000080)={0x8, 0x103, 0x4, {0x0, 0x72f, 0xbad, 0x8}}) 01:32:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="08cde38a062a44ecad57d3edaef6f2e932b4", 0xfffffd42}, {&(0x7f0000000080)="93c8efa73d7bb0faba1e08194ae1dda24e1e76e0c0dcc9fcb44476242fd06053b1d606d3bd40bf9da38f0fcdcde0e6b5a19a", 0x32}, {&(0x7f00000000c0)="5528fb3c4e9e61039628b92cd1de31edcc00a07fa72df42d2a24109e78715121c09d2724e43711afcccb49290972f6266a1bd11ba642726808b6e58512216a26370737b2e95c912bb6671da309c69fcbefd858bcdbba1da874b240775fab8907998fb5d990ec1b547f000e10d9ee5b80a5f39ca99cd771581ba4a1bb93079aa4ad5415668c45bba9ab652b885701d88bd1d3b47167fb40ec3e6ef1ef84", 0x9d}], 0x3) [ 346.279690] FAULT_INJECTION: forcing a failure. [ 346.279690] name failslab, interval 1, probability 0, space 0, times 0 [ 346.291038] CPU: 1 PID: 12769 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 346.298245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.307599] Call Trace: [ 346.310203] dump_stack+0x1db/0x2d0 [ 346.313899] ? dump_stack_print_info.cold+0x20/0x20 [ 346.318925] ? __lock_is_held+0xb6/0x140 [ 346.323009] should_fail.cold+0xa/0x15 01:32:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xe1, &(0x7f00000000c0)="e4a482417b21ca25fca1a28a47b6c60c4d7e13ef552e03639a0031c6f2e2ea59a380d6f935ab") 01:32:08 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 346.326902] ? ext4_es_free_extent+0x2b8/0x770 [ 346.331495] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 346.336612] ? ext4_es_free_extent+0x2b8/0x770 [ 346.341242] ? __lock_is_held+0xb6/0x140 [ 346.345322] __should_failslab+0x121/0x190 [ 346.349571] should_failslab+0x9/0x14 [ 346.353386] kmem_cache_alloc+0x47/0x710 [ 346.357455] ? __es_remove_extent+0x871/0xb30 [ 346.361956] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 346.367012] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 346.371811] __es_insert_extent+0x366/0x1190 [ 346.376290] ? ext4_es_free_extent+0x770/0x770 [ 346.380900] ? do_raw_read_unlock+0x70/0x70 [ 346.385255] ? __lock_is_held+0xb6/0x140 [ 346.389338] ext4_es_insert_extent+0x369/0xc80 [ 346.393940] ? ext4_es_scan_clu+0x50/0x50 [ 346.398100] ? ext4_es_cache_extent+0x6f0/0x6f0 [ 346.402789] ? down_write+0x8a/0x130 [ 346.406529] ? ext4_map_blocks+0x949/0x1bb0 [ 346.410891] ? down_read+0x120/0x120 [ 346.414638] ext4_map_blocks+0xc67/0x1bb0 [ 346.418823] ? ext4_issue_zeroout+0x170/0x170 [ 346.423328] ? __lock_is_held+0xb6/0x140 01:32:08 executing program 1: r0 = epoll_create1(0x80000) epoll_wait(r0, &(0x7f00000004c0)=[{}], 0x1, 0x200) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) splice(0xffffffffffffffff, &(0x7f0000000000), r0, &(0x7f0000000040), 0xf7f5, 0x5) epoll_create(0x5) shutdown(0xffffffffffffffff, 0xfffffffffffffffe) 01:32:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = dup2(r0, r0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/95) creat(&(0x7f00000000c0)='./file0\x00', 0x113) [ 346.427404] ext4_writepages+0x2383/0x41a0 [ 346.431685] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 346.436449] ? add_lock_to_list.isra.0+0x450/0x450 [ 346.441400] ? add_lock_to_list.isra.0+0x450/0x450 [ 346.446393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 346.451977] ? kasan_check_read+0x11/0x20 [ 346.456137] ? do_raw_spin_unlock+0xa0/0x330 [ 346.460556] ? do_raw_spin_trylock+0x270/0x270 [ 346.465176] ? _raw_spin_unlock+0x2d/0x50 [ 346.469341] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 346.474885] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 346.474903] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 346.474921] do_writepages+0x99/0x1a0 [ 346.474934] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 346.474949] ? do_writepages+0x99/0x1a0 [ 346.493514] __filemap_fdatawrite_range+0x352/0x470 [ 346.493535] ? delete_from_page_cache_batch+0x1690/0x1690 [ 346.493571] filemap_write_and_wait_range+0x4b/0xd0 [ 346.493590] __generic_file_write_iter+0x4ea/0x630 [ 346.502585] ext4_file_write_iter+0x37a/0x1410 [ 346.502604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 346.502627] ? ext4_file_mmap+0x410/0x410 [ 346.502646] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 346.513205] ? rcu_read_unlock_special+0x380/0x380 [ 346.513243] ? __fget+0x499/0x710 [ 346.513265] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 346.513282] ? iov_iter_init+0xea/0x220 [ 346.513304] __vfs_write+0x764/0xb40 [ 346.522836] ? check_preemption_disabled+0x48/0x290 [ 346.537780] ? kernel_read+0x120/0x120 [ 346.537828] ? rcu_read_lock_sched_held+0x110/0x130 [ 346.537859] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 346.537873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 346.537889] ? __sb_start_write+0x1ac/0x360 [ 346.588480] vfs_write+0x20c/0x580 [ 346.592040] ksys_pwrite64+0x183/0x1c0 [ 346.595934] ? __ia32_sys_pread64+0xf0/0xf0 [ 346.600274] ? __ia32_sys_read+0xb0/0xb0 [ 346.604350] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.609728] ? trace_hardirqs_off_caller+0x300/0x300 [ 346.609752] __x64_sys_pwrite64+0x97/0xf0 [ 346.609775] do_syscall_64+0x1a3/0x800 [ 346.609810] ? syscall_return_slowpath+0x5f0/0x5f0 [ 346.609828] ? prepare_exit_to_usermode+0x232/0x3b0 [ 346.609848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.609869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.609896] RIP: 0033:0x458099 [ 346.609910] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.609918] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 346.609932] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 01:32:08 executing program 4: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x6, 0x1ff, 0x9, 0x6, 0x0, 0x7, 0xac0, 0x0, 0x7ff, 0x944, 0x81, 0x4, 0xfffffffffffffff7, 0xfffffffffffffffc, 0xfffffffffffffffd, 0x2f03, 0x0, 0x9, 0x8001, 0x3, 0x67d, 0x34f, 0x8, 0x4, 0x6bd, 0xc54, 0x3f, 0x8001, 0x4, 0x9, 0x4000000000000000, 0x8, 0x2, 0x4, 0x4, 0x101, 0x0, 0x2, 0x2, @perf_config_ext={0x6, 0x1}, 0x80, 0x2, 0x3, 0x7, 0x6, 0xffffffff, 0x2}, r0, 0x10, 0xffffffffffffffff, 0xb) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x1) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) [ 346.609941] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 346.609950] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 346.609960] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 346.609969] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:09 executing program 2 (fault-call:2 fault-nth:10): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:32:09 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x40000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:09 executing program 4: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000040)) 01:32:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 346.932269] FAULT_INJECTION: forcing a failure. [ 346.932269] name failslab, interval 1, probability 0, space 0, times 0 [ 346.969164] CPU: 0 PID: 12806 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 01:32:09 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc6, &(0x7f0000000080)="dd390700000000000000185d30d2b619346bb0575a420f7527255b55bdf3913bac24834f2ee9ca2648718fb1fc34be8ca720b3") [ 346.976448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.985817] Call Trace: [ 346.988424] dump_stack+0x1db/0x2d0 [ 346.992072] ? dump_stack_print_info.cold+0x20/0x20 [ 346.997104] ? add_lock_to_list.isra.0+0x450/0x450 [ 347.002047] ? add_lock_to_list.isra.0+0x450/0x450 [ 347.006988] ? do_raw_spin_unlock+0xa0/0x330 [ 347.011415] should_fail.cold+0xa/0x15 [ 347.015314] ? add_lock_to_list.isra.0+0x450/0x450 [ 347.020268] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 347.025382] ? __unlock_page_memcg+0x53/0x100 [ 347.029908] __should_failslab+0x121/0x190 [ 347.034160] should_failslab+0x9/0x14 [ 347.037975] kmem_cache_alloc+0x47/0x710 [ 347.042047] ? __unlock_page_memcg+0x70/0x100 [ 347.046567] mempool_alloc_slab+0x47/0x60 [ 347.050729] mempool_alloc+0x19f/0x500 [ 347.054629] ? find_get_pages_range+0x1009/0x1560 [ 347.059500] ? mempool_destroy+0x40/0x40 [ 347.063578] ? find_held_lock+0x35/0x120 [ 347.067653] ? clear_page_dirty_for_io+0x9d6/0x18d0 [ 347.072696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.078253] bio_alloc_bioset+0x3c1/0x720 [ 347.082402] ? __this_cpu_preempt_check+0x1d/0x30 [ 347.087245] ? bvec_alloc+0x2f0/0x2f0 [ 347.091044] ext4_bio_write_page+0xf1b/0x1936 [ 347.095539] ? ext4_io_submit_init+0x90/0x90 [ 347.099943] ? ext4_map_blocks+0xc8d/0x1bb0 [ 347.104276] ? lock_downgrade+0x910/0x910 [ 347.108419] mpage_submit_page+0x15a/0x270 [ 347.112664] mpage_map_and_submit_buffers+0x545/0x9a0 [ 347.117882] ? mpage_process_page_bufs+0x610/0x610 [ 347.122825] ? ext4_issue_zeroout+0x170/0x170 [ 347.127325] ? __lock_is_held+0xb6/0x140 [ 347.131403] ext4_writepages+0x252b/0x41a0 [ 347.135647] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 347.140402] ? add_lock_to_list.isra.0+0x450/0x450 [ 347.145329] ? add_lock_to_list.isra.0+0x450/0x450 [ 347.150256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.155827] ? kasan_check_read+0x11/0x20 [ 347.159976] ? do_raw_spin_unlock+0xa0/0x330 [ 347.164396] ? do_raw_spin_trylock+0x270/0x270 [ 347.168991] ? _raw_spin_unlock+0x2d/0x50 [ 347.173130] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.178672] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 347.183961] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 347.188731] do_writepages+0x99/0x1a0 [ 347.192531] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 347.197279] ? do_writepages+0x99/0x1a0 [ 347.201279] __filemap_fdatawrite_range+0x352/0x470 [ 347.206302] ? delete_from_page_cache_batch+0x1690/0x1690 [ 347.211859] filemap_write_and_wait_range+0x4b/0xd0 [ 347.216878] __generic_file_write_iter+0x4ea/0x630 [ 347.221808] ext4_file_write_iter+0x37a/0x1410 [ 347.226400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.231951] ? ext4_file_mmap+0x410/0x410 [ 347.236099] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 347.241376] ? rcu_read_unlock_special+0x380/0x380 [ 347.246308] ? __fget+0x499/0x710 [ 347.249757] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.255295] ? iov_iter_init+0xea/0x220 [ 347.259283] __vfs_write+0x764/0xb40 [ 347.263014] ? check_preemption_disabled+0x48/0x290 [ 347.268030] ? kernel_read+0x120/0x120 [ 347.271921] ? rcu_read_lock_sched_held+0x110/0x130 [ 347.276932] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 347.281678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.287199] ? __sb_start_write+0x1ac/0x360 [ 347.291534] vfs_write+0x20c/0x580 [ 347.295117] ksys_pwrite64+0x183/0x1c0 [ 347.299030] ? __ia32_sys_pread64+0xf0/0xf0 [ 347.303350] ? __ia32_sys_read+0xb0/0xb0 [ 347.307418] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.312776] ? trace_hardirqs_off_caller+0x300/0x300 [ 347.317881] __x64_sys_pwrite64+0x97/0xf0 [ 347.322075] do_syscall_64+0x1a3/0x800 [ 347.325994] ? syscall_return_slowpath+0x5f0/0x5f0 [ 347.330914] ? prepare_exit_to_usermode+0x232/0x3b0 [ 347.335933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.340780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.345964] RIP: 0033:0x458099 [ 347.349169] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.368055] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 347.375758] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 347.383041] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 347.390317] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 347.397577] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 347.404841] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xa000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:09 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:09 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, &(0x7f0000000100)) 01:32:09 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xe, 0x4, 0x4, 0x8002}, 0x1c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)}, 0x18) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x4c0080) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000040)={{0x77, 0x100}, 0x4}, 0x10) 01:32:09 executing program 2 (fault-call:2 fault-nth:11): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x80000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:10 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) fsync(r0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 347.728760] FAULT_INJECTION: forcing a failure. [ 347.728760] name failslab, interval 1, probability 0, space 0, times 0 [ 347.763387] CPU: 0 PID: 12838 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 347.770587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.779942] Call Trace: [ 347.782560] dump_stack+0x1db/0x2d0 [ 347.786190] ? dump_stack_print_info.cold+0x20/0x20 [ 347.791246] ? ext4_bio_write_page+0xf1b/0x1936 [ 347.795940] ? mpage_submit_page+0x15a/0x270 [ 347.800360] ? mpage_map_and_submit_buffers+0x545/0x9a0 [ 347.805736] ? ext4_writepages+0x252b/0x41a0 [ 347.810155] ? do_writepages+0x99/0x1a0 [ 347.814115] ? filemap_write_and_wait_range+0x4b/0xd0 [ 347.819305] should_fail.cold+0xa/0x15 [ 347.823180] ? add_lock_to_list.isra.0+0x450/0x450 [ 347.828093] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 347.833186] ? should_fail+0x1e6/0xd22 [ 347.837063] ? add_lock_to_list.isra.0+0x450/0x450 [ 347.842016] __should_failslab+0x121/0x190 [ 347.846249] should_failslab+0x9/0x14 [ 347.850039] kmem_cache_alloc+0x47/0x710 [ 347.854089] ? mempool_alloc_slab+0x47/0x60 [ 347.858413] mempool_alloc_slab+0x47/0x60 [ 347.862557] mempool_alloc+0x19f/0x500 [ 347.866436] ? mempool_destroy+0x40/0x40 [ 347.870505] ? kasan_check_write+0x14/0x20 [ 347.874740] ? bio_init+0x12f/0x260 [ 347.878355] ? bio_add_page+0x120/0x120 [ 347.882316] bvec_alloc+0xe0/0x2f0 [ 347.885854] bio_alloc_bioset+0x492/0x720 [ 347.890048] ? __this_cpu_preempt_check+0x1d/0x30 [ 347.894891] ? bvec_alloc+0x2f0/0x2f0 [ 347.898697] ext4_bio_write_page+0xf1b/0x1936 [ 347.903180] ? ext4_io_submit_init+0x90/0x90 [ 347.907569] ? ext4_map_blocks+0xc8d/0x1bb0 [ 347.911895] ? lock_downgrade+0x910/0x910 [ 347.916045] mpage_submit_page+0x15a/0x270 [ 347.920279] mpage_map_and_submit_buffers+0x545/0x9a0 [ 347.925459] ? mpage_process_page_bufs+0x610/0x610 [ 347.930376] ? ext4_issue_zeroout+0x170/0x170 [ 347.934947] ? __lock_is_held+0xb6/0x140 [ 347.939003] ext4_writepages+0x252b/0x41a0 [ 347.943277] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 347.948053] ? add_lock_to_list.isra.0+0x450/0x450 [ 347.952972] ? add_lock_to_list.isra.0+0x450/0x450 [ 347.957891] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 347.963443] ? kasan_check_read+0x11/0x20 [ 347.967594] ? do_raw_spin_unlock+0xa0/0x330 [ 347.972004] ? do_raw_spin_trylock+0x270/0x270 [ 347.976604] ? _raw_spin_unlock+0x2d/0x50 [ 347.980753] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.986277] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 347.991548] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 347.996299] do_writepages+0x99/0x1a0 [ 348.000085] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 348.004863] ? do_writepages+0x99/0x1a0 [ 348.008857] __filemap_fdatawrite_range+0x352/0x470 [ 348.013974] ? delete_from_page_cache_batch+0x1690/0x1690 [ 348.019543] filemap_write_and_wait_range+0x4b/0xd0 [ 348.024557] __generic_file_write_iter+0x4ea/0x630 [ 348.029475] ext4_file_write_iter+0x37a/0x1410 [ 348.034063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.039592] ? ext4_file_mmap+0x410/0x410 [ 348.043722] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 348.048983] ? rcu_read_unlock_special+0x380/0x380 [ 348.053932] ? __fget+0x499/0x710 [ 348.057387] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 348.062908] ? iov_iter_init+0xea/0x220 [ 348.066883] __vfs_write+0x764/0xb40 [ 348.070580] ? check_preemption_disabled+0x48/0x290 [ 348.075600] ? kernel_read+0x120/0x120 [ 348.079485] ? rcu_read_lock_sched_held+0x110/0x130 [ 348.084521] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 348.089272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.094792] ? __sb_start_write+0x1ac/0x360 [ 348.099109] vfs_write+0x20c/0x580 [ 348.102655] ksys_pwrite64+0x183/0x1c0 [ 348.106535] ? __ia32_sys_pread64+0xf0/0xf0 [ 348.110841] ? __ia32_sys_read+0xb0/0xb0 [ 348.114901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.120257] ? trace_hardirqs_off_caller+0x300/0x300 [ 348.125349] __x64_sys_pwrite64+0x97/0xf0 [ 348.129516] do_syscall_64+0x1a3/0x800 [ 348.133404] ? syscall_return_slowpath+0x5f0/0x5f0 [ 348.138338] ? prepare_exit_to_usermode+0x232/0x3b0 [ 348.143363] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.148226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.153411] RIP: 0033:0x458099 [ 348.156585] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:32:10 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, &(0x7f0000000100)) [ 348.175485] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 348.183235] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 348.190519] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 348.197769] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 348.205027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 348.212299] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:10 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:10 executing program 2 (fault-call:2 fault-nth:12): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xb000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 348.632352] FAULT_INJECTION: forcing a failure. [ 348.632352] name failslab, interval 1, probability 0, space 0, times 0 [ 348.644970] EXT4-fs: 8 callbacks suppressed [ 348.644980] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 348.662780] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 348.682817] CPU: 1 PID: 12865 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 348.690034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.699580] Call Trace: [ 348.702184] dump_stack+0x1db/0x2d0 [ 348.705839] ? dump_stack_print_info.cold+0x20/0x20 [ 348.710900] ? __lock_acquire+0x572/0x4a30 [ 348.715195] should_fail.cold+0xa/0x15 [ 348.719114] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 348.724232] ? print_usage_bug+0xd0/0xd0 [ 348.728302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.733886] ? __radix_tree_lookup+0x3aa/0x4f0 [ 348.738499] ? add_lock_to_list.isra.0+0x450/0x450 [ 348.743436] ? __lock_acquire+0x572/0x4a30 [ 348.747684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.753299] __should_failslab+0x121/0x190 [ 348.757548] should_failslab+0x9/0x14 [ 348.761383] kmem_cache_alloc_node+0x56/0x710 [ 348.765893] ? find_held_lock+0x35/0x120 [ 348.769968] ? generic_make_request_checks+0x1008/0x21d0 [ 348.775437] create_task_io_context+0xa5/0x5d0 01:32:11 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:11 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x8, 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r1, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f00000004c0)) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f00000001c0)=0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {&(0x7f0000000780)=""/158, 0x9e}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, &(0x7f00000002c0)=0x8) r4 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={r3, 0x8000}, &(0x7f0000000440)=0x8) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000600)={0x1f, 0x3e, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d42442ebcd23f3c91b35198e241d5786"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=ANY=[]) ioctl$VHOST_SET_LOG_FD(r4, 0x4004af07, &(0x7f0000001980)=r4) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000001a00)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) ioctl(r0, 0x5, &(0x7f0000000100)) [ 348.780059] ? ioc_clear_queue+0x680/0x680 [ 348.784314] ? kasan_check_read+0x11/0x20 [ 348.788475] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 348.793763] ? rcu_read_unlock_special+0x380/0x380 [ 348.798713] generic_make_request_checks+0x1c15/0x21d0 [ 348.804014] ? trace_event_raw_event_block_rq_requeue+0x6e0/0x6e0 [ 348.810276] ? blk_cleanup_queue+0x200/0x200 [ 348.814691] ? kasan_check_write+0x14/0x20 [ 348.818928] ? __brelse+0x105/0x180 [ 348.822553] ? __might_sleep+0x95/0x190 [ 348.826517] ? block_commit_write+0x30/0x30 [ 348.830841] ? __ext4_handle_dirty_metadata+0x1e3/0x570 [ 348.836207] ? kasan_check_write+0x14/0x20 [ 348.840446] ? ext4_mark_iloc_dirty+0x1947/0x2f00 [ 348.845291] generic_make_request+0x2ab/0x17f0 [ 348.849888] ? ext4_chunk_trans_blocks+0x30/0x30 [ 348.854655] ? blk_queue_enter+0x1200/0x1200 [ 348.859090] ? __might_sleep+0x95/0x190 [ 348.863069] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 348.868602] ? __ext4_journal_get_write_access+0x70/0xa0 [ 348.874065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.879628] ? ext4_mark_inode_dirty+0x257/0xb80 [ 348.884394] submit_bio+0xba/0x480 [ 348.887936] ? submit_bio+0xba/0x480 [ 348.891827] ? generic_make_request+0x17f0/0x17f0 [ 348.896686] ? up_write+0x7b/0x230 [ 348.900248] ? down_write_nested+0x130/0x130 [ 348.904663] ? down_read+0x120/0x120 [ 348.908396] ext4_io_submit+0x197/0x230 [ 348.912383] ext4_writepages+0x1c99/0x41a0 [ 348.916632] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 348.921484] ? add_lock_to_list.isra.0+0x450/0x450 [ 348.926452] ? add_lock_to_list.isra.0+0x450/0x450 [ 348.931398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.936959] ? kasan_check_read+0x11/0x20 [ 348.941130] ? do_raw_spin_unlock+0xa0/0x330 [ 348.945534] ? do_raw_spin_trylock+0x270/0x270 [ 348.950128] ? _raw_spin_unlock+0x2d/0x50 [ 348.954279] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 348.959814] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 348.965083] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 348.969834] do_writepages+0x99/0x1a0 [ 348.973653] ? ext4_mark_inode_dirty+0xb80/0xb80 [ 348.978415] ? do_writepages+0x99/0x1a0 [ 348.982391] __filemap_fdatawrite_range+0x352/0x470 [ 348.987396] ? delete_from_page_cache_batch+0x1690/0x1690 [ 348.992951] filemap_write_and_wait_range+0x4b/0xd0 [ 348.997967] __generic_file_write_iter+0x4ea/0x630 [ 349.002894] ext4_file_write_iter+0x37a/0x1410 [ 349.007464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.013007] ? ext4_file_mmap+0x410/0x410 [ 349.017154] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 349.022418] ? rcu_read_unlock_special+0x380/0x380 [ 349.027342] ? __fget+0x499/0x710 [ 349.030902] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 349.036438] ? iov_iter_init+0xea/0x220 [ 349.040418] __vfs_write+0x764/0xb40 [ 349.044136] ? check_preemption_disabled+0x48/0x290 [ 349.049152] ? kernel_read+0x120/0x120 [ 349.053058] ? rcu_read_lock_sched_held+0x110/0x130 [ 349.058092] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 349.062844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.068378] ? __sb_start_write+0x1ac/0x360 [ 349.072712] vfs_write+0x20c/0x580 [ 349.076288] ksys_pwrite64+0x183/0x1c0 [ 349.080182] ? __ia32_sys_pread64+0xf0/0xf0 [ 349.084499] ? __ia32_sys_read+0xb0/0xb0 [ 349.088564] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.093925] ? trace_hardirqs_off_caller+0x300/0x300 [ 349.099029] __x64_sys_pwrite64+0x97/0xf0 [ 349.103202] do_syscall_64+0x1a3/0x800 [ 349.107113] ? syscall_return_slowpath+0x5f0/0x5f0 [ 349.112040] ? prepare_exit_to_usermode+0x232/0x3b0 [ 349.117071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.121920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.127125] RIP: 0033:0x458099 [ 349.130313] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.149229] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 349.156941] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 349.164224] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 349.171508] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 01:32:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, &(0x7f0000000100)) 01:32:11 executing program 2 (fault-call:2 fault-nth:13): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 349.178795] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 349.186057] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x100000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:11 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, &(0x7f0000000100)) [ 349.338927] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 349.368415] mmap: syz-executor4 (12893) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 349.395044] FAULT_INJECTION: forcing a failure. [ 349.395044] name failslab, interval 1, probability 0, space 0, times 0 [ 349.443930] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 349.452886] CPU: 1 PID: 12895 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 349.460082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.469434] Call Trace: [ 349.472048] dump_stack+0x1db/0x2d0 [ 349.475696] ? dump_stack_print_info.cold+0x20/0x20 [ 349.480730] ? __this_cpu_preempt_check+0x1d/0x30 [ 349.485618] should_fail.cold+0xa/0x15 01:32:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 349.489531] ? add_lock_to_list.isra.0+0x450/0x450 [ 349.494524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 349.499680] ? add_lock_to_list.isra.0+0x450/0x450 [ 349.504637] __should_failslab+0x121/0x190 [ 349.508880] should_failslab+0x9/0x14 [ 349.512690] kmem_cache_alloc+0x47/0x710 [ 349.516762] mempool_alloc_slab+0x47/0x60 [ 349.520931] mempool_alloc+0x19f/0x500 [ 349.524819] ? __might_sleep+0x95/0x190 [ 349.528839] ? mempool_destroy+0x40/0x40 [ 349.532903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.538445] ? __find_get_block+0xf20/0xf20 [ 349.542785] ? __lock_is_held+0xb6/0x140 [ 349.546856] bio_alloc_bioset+0x3c1/0x720 [ 349.551015] ? bvec_alloc+0x2f0/0x2f0 [ 349.554824] ? arch_local_save_flags+0x50/0x50 [ 349.559426] submit_bh_wbc+0x133/0x7f0 [ 349.563317] __sync_dirty_buffer+0x1ab/0x3d0 [ 349.567731] ? sync_mapping_buffers+0xe60/0xe60 [ 349.572956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.578495] ? file_check_and_advance_wb_err+0x13e/0x530 [ 349.583947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.589486] sync_dirty_buffer+0x1b/0x20 [ 349.593552] ext4_write_inode+0x514/0x600 [ 349.597700] ? __ext4_iget+0x4320/0x4320 [ 349.601762] ? __lock_is_held+0xb6/0x140 [ 349.605842] ext4_sync_file+0xa71/0x14d0 [ 349.609909] ? ext4_getfsmap+0xda0/0xda0 [ 349.613997] ? up_write+0x7b/0x230 [ 349.617541] ? ext4_getfsmap+0xda0/0xda0 [ 349.621609] vfs_fsync_range+0x144/0x230 [ 349.625673] ? __generic_file_write_iter+0x1b0/0x630 [ 349.630781] ext4_file_write_iter+0x67f/0x1410 [ 349.635386] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.640933] ? ext4_file_mmap+0x410/0x410 [ 349.645083] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 349.650366] ? rcu_read_unlock_special+0x380/0x380 [ 349.655305] ? __fget+0x499/0x710 [ 349.658772] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 349.664332] ? iov_iter_init+0xea/0x220 [ 349.668314] __vfs_write+0x764/0xb40 [ 349.672050] ? check_preemption_disabled+0x48/0x290 [ 349.677072] ? kernel_read+0x120/0x120 [ 349.681030] ? rcu_read_lock_sched_held+0x110/0x130 [ 349.686045] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 349.690807] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 349.696346] ? __sb_start_write+0x1ac/0x360 [ 349.700676] vfs_write+0x20c/0x580 [ 349.704234] ksys_pwrite64+0x183/0x1c0 [ 349.708132] ? __ia32_sys_pread64+0xf0/0xf0 [ 349.712456] ? __ia32_sys_read+0xb0/0xb0 [ 349.716520] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.721896] ? trace_hardirqs_off_caller+0x300/0x300 [ 349.727010] __x64_sys_pwrite64+0x97/0xf0 [ 349.731194] do_syscall_64+0x1a3/0x800 [ 349.735119] ? syscall_return_slowpath+0x5f0/0x5f0 [ 349.740053] ? prepare_exit_to_usermode+0x232/0x3b0 [ 349.745080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.749929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 349.755116] RIP: 0033:0x458099 [ 349.758313] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.777224] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 349.784947] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 01:32:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3ff7f8, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 349.792207] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 349.799503] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 349.806842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 349.814150] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:12 executing program 2 (fault-call:2 fault-nth:14): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:12 executing program 1: ioctl(0xffffffffffffffff, 0xffffffffffffffc4, &(0x7f0000000100)) 01:32:12 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x57, 0x40) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000380)=0x8, 0x4) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) [ 350.029535] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:12 executing program 1: ioctl(0xffffffffffffffff, 0xffffffffffffffc4, &(0x7f0000000100)) 01:32:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 350.079746] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 350.096078] FAULT_INJECTION: forcing a failure. [ 350.096078] name failslab, interval 1, probability 0, space 0, times 0 [ 350.150001] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 350.170570] CPU: 0 PID: 12922 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 350.177780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.187153] Call Trace: [ 350.189754] dump_stack+0x1db/0x2d0 [ 350.193402] ? dump_stack_print_info.cold+0x20/0x20 [ 350.198417] ? _raw_spin_unlock_irq+0x28/0x90 [ 350.202926] should_fail.cold+0xa/0x15 [ 350.202941] ? add_lock_to_list.isra.0+0x450/0x450 [ 350.202958] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 350.202971] ? print_usage_bug+0xd0/0xd0 [ 350.203001] __should_failslab+0x121/0x190 [ 350.203015] should_failslab+0x9/0x14 [ 350.203028] kmem_cache_alloc+0x47/0x710 [ 350.233227] mempool_alloc_slab+0x47/0x60 [ 350.237412] mempool_alloc+0x19f/0x500 [ 350.241326] ? mempool_destroy+0x40/0x40 [ 350.245401] ? __lock_acquire+0x572/0x4a30 [ 350.249662] ? add_lock_to_list.isra.0+0x450/0x450 [ 350.254615] ? __lock_is_held+0xb6/0x140 [ 350.258695] bio_alloc_bioset+0x3c1/0x720 [ 350.262877] ? bvec_alloc+0x2f0/0x2f0 [ 350.266691] ? arch_local_save_flags+0x50/0x50 [ 350.271301] ? kasan_check_read+0x11/0x20 [ 350.275468] submit_bh_wbc+0x133/0x7f0 [ 350.279378] write_dirty_buffer+0xb6/0x140 [ 350.283622] sync_mapping_buffers+0x53e/0xe60 [ 350.288130] ? dput+0x250/0x790 [ 350.291497] ? write_dirty_buffer+0x140/0x140 [ 350.296012] ? iput+0x683/0xae0 [ 350.299317] ? inode_add_lru+0x2a0/0x2a0 [ 350.303390] ? dput+0x27c/0x790 [ 350.306681] ? shrink_dcache_sb+0x340/0x340 [ 350.311023] ext4_sync_file+0x118e/0x14d0 [ 350.315206] ? ext4_getfsmap+0xda0/0xda0 [ 350.319370] ? up_write+0x7b/0x230 [ 350.322948] ? ext4_getfsmap+0xda0/0xda0 [ 350.327042] vfs_fsync_range+0x144/0x230 [ 350.331120] ext4_file_write_iter+0x67f/0x1410 [ 350.335716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.341321] ? ext4_file_mmap+0x410/0x410 [ 350.345478] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 350.350780] ? rcu_read_unlock_special+0x380/0x380 [ 350.355729] ? __fget+0x499/0x710 [ 350.359207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 350.364798] ? iov_iter_init+0xea/0x220 [ 350.368787] __vfs_write+0x764/0xb40 [ 350.372513] ? check_preemption_disabled+0x48/0x290 [ 350.377544] ? kernel_read+0x120/0x120 [ 350.381457] ? rcu_read_lock_sched_held+0x110/0x130 [ 350.386499] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 350.391263] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.396852] ? __sb_start_write+0x1ac/0x360 [ 350.401183] vfs_write+0x20c/0x580 [ 350.404746] ksys_pwrite64+0x183/0x1c0 [ 350.408647] ? __ia32_sys_pread64+0xf0/0xf0 [ 350.412975] ? __ia32_sys_read+0xb0/0xb0 [ 350.417045] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 350.422421] ? trace_hardirqs_off_caller+0x300/0x300 [ 350.427547] __x64_sys_pwrite64+0x97/0xf0 [ 350.431725] do_syscall_64+0x1a3/0x800 [ 350.435618] ? syscall_return_slowpath+0x5f0/0x5f0 [ 350.440550] ? prepare_exit_to_usermode+0x232/0x3b0 [ 350.440572] ? trace_hardirqs_off_thunk+0x1a/0x1c 01:32:12 executing program 4: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) getsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) sysinfo(&(0x7f0000000040)=""/182) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x380, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x800, 0x84a, 0x8}, &(0x7f0000000180)=0x10) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000007, 0x40810, r2, 0x22) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @local}}, 0x0, 0x1, 0x1000, 0x8001, 0x11}, &(0x7f0000000280)=0x98) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000003c0)=0x7, 0x4) 01:32:12 executing program 1: ioctl(0xffffffffffffffff, 0xffffffffffffffc4, &(0x7f0000000100)) [ 350.440593] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 350.440608] RIP: 0033:0x458099 [ 350.450470] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 350.450499] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 350.450529] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 350.450538] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 350.450547] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 350.450555] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 350.450568] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 [ 350.465407] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:12 executing program 2 (fault-call:2 fault-nth:15): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3ff800, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xe000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:12 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000080)) 01:32:12 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, &(0x7f0000000100)) [ 350.754339] FAULT_INJECTION: forcing a failure. [ 350.754339] name failslab, interval 1, probability 0, space 0, times 0 [ 350.765695] CPU: 1 PID: 12956 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 350.772882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.782231] Call Trace: [ 350.784837] dump_stack+0x1db/0x2d0 [ 350.788454] ? dump_stack_print_info.cold+0x20/0x20 [ 350.793458] ? find_get_pages_range_tag+0x1036/0x1540 [ 350.798653] should_fail.cold+0xa/0x15 [ 350.802547] ? add_lock_to_list.isra.0+0x450/0x450 [ 350.807475] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 350.812585] ? add_lock_to_list.isra.0+0x450/0x450 [ 350.817513] __should_failslab+0x121/0x190 [ 350.821752] should_failslab+0x9/0x14 [ 350.825552] kmem_cache_alloc+0x47/0x710 [ 350.829610] mempool_alloc_slab+0x47/0x60 [ 350.833745] mempool_alloc+0x19f/0x500 [ 350.837618] ? __might_sleep+0x95/0x190 [ 350.841598] ? mempool_destroy+0x40/0x40 [ 350.845658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.851184] ? __find_get_block+0xf20/0xf20 [ 350.855524] ? __lock_is_held+0xb6/0x140 [ 350.859641] bio_alloc_bioset+0x3c1/0x720 [ 350.863818] ? bvec_alloc+0x2f0/0x2f0 [ 350.867620] ? arch_local_save_flags+0x50/0x50 [ 350.872206] submit_bh_wbc+0x133/0x7f0 [ 350.876106] __sync_dirty_buffer+0x1ab/0x3d0 [ 350.880515] ? sync_mapping_buffers+0xe60/0xe60 [ 350.885207] ? add_lock_to_list.isra.0+0x450/0x450 [ 350.890145] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 350.895675] sync_dirty_buffer+0x1b/0x20 [ 350.899728] ext4_write_inode+0x514/0x600 [ 350.903875] ? __ext4_iget+0x4320/0x4320 [ 350.907926] ? __lock_is_held+0xb6/0x140 [ 350.911996] __writeback_single_inode+0xef1/0x1620 [ 350.916913] ? __mark_inode_dirty+0x1590/0x1590 [ 350.921575] ? kasan_check_read+0x11/0x20 [ 350.925719] ? do_raw_spin_unlock+0xa0/0x330 [ 350.930118] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 350.935375] ? do_raw_spin_trylock+0x270/0x270 [ 350.939984] ? _raw_spin_unlock+0x2d/0x50 [ 350.944149] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 350.949681] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 350.954960] ? __writeback_single_inode+0x1620/0x1620 [ 350.960162] writeback_single_inode+0x3b2/0x590 [ 350.964843] ? wb_writeback+0xf70/0xf70 [ 350.968838] sync_inode_metadata+0x11c/0x180 [ 350.973268] ? sync_inode+0x30/0x30 [ 350.976891] ext4_sync_file+0x11b5/0x14d0 [ 350.981041] ? ext4_getfsmap+0xda0/0xda0 [ 350.985105] ? up_write+0x7b/0x230 [ 350.988642] ? ext4_getfsmap+0xda0/0xda0 [ 350.992702] vfs_fsync_range+0x144/0x230 [ 350.996755] ext4_file_write_iter+0x67f/0x1410 [ 351.001335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.006905] ? ext4_file_mmap+0x410/0x410 [ 351.011054] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 351.016315] ? rcu_read_unlock_special+0x380/0x380 [ 351.021279] ? __fget+0x499/0x710 [ 351.024791] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 351.030351] ? iov_iter_init+0xea/0x220 [ 351.034321] __vfs_write+0x764/0xb40 [ 351.038018] ? check_preemption_disabled+0x48/0x290 [ 351.043038] ? kernel_read+0x120/0x120 [ 351.046928] ? rcu_read_lock_sched_held+0x110/0x130 [ 351.051927] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 351.056666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.062194] ? __sb_start_write+0x1ac/0x360 [ 351.066521] vfs_write+0x20c/0x580 [ 351.070051] ksys_pwrite64+0x183/0x1c0 [ 351.073938] ? __ia32_sys_pread64+0xf0/0xf0 [ 351.078273] ? __ia32_sys_read+0xb0/0xb0 [ 351.082366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.087725] ? trace_hardirqs_off_caller+0x300/0x300 [ 351.092831] __x64_sys_pwrite64+0x97/0xf0 [ 351.096967] do_syscall_64+0x1a3/0x800 [ 351.100872] ? syscall_return_slowpath+0x5f0/0x5f0 [ 351.105829] ? prepare_exit_to_usermode+0x232/0x3b0 [ 351.110835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.115669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.120914] RIP: 0033:0x458099 [ 351.124113] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.143015] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 351.150772] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 351.158034] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 351.165318] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 351.172594] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 351.179863] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:13 executing program 2 (fault-call:2 fault-nth:16): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:13 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x422000, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x7, 0x4) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x101510}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x4, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x0) ioctl(r1, 0x1000, &(0x7f00000002c0)="a35fb5") [ 351.319776] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 351.355540] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:13 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, &(0x7f0000000100)) [ 351.411710] FAULT_INJECTION: forcing a failure. [ 351.411710] name failslab, interval 1, probability 0, space 0, times 0 01:32:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf83f00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 351.492448] CPU: 1 PID: 12980 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 351.499691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.509044] Call Trace: [ 351.511642] dump_stack+0x1db/0x2d0 [ 351.515285] ? dump_stack_print_info.cold+0x20/0x20 [ 351.520315] ? find_get_pages_range_tag+0x1036/0x1540 [ 351.525523] should_fail.cold+0xa/0x15 [ 351.529418] ? add_lock_to_list.isra.0+0x450/0x450 [ 351.534361] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 351.539475] ? add_lock_to_list.isra.0+0x450/0x450 [ 351.544435] __should_failslab+0x121/0x190 [ 351.548686] should_failslab+0x9/0x14 [ 351.552494] kmem_cache_alloc+0x47/0x710 [ 351.556576] mempool_alloc_slab+0x47/0x60 [ 351.560736] mempool_alloc+0x19f/0x500 [ 351.564634] ? __might_sleep+0x95/0x190 [ 351.568627] ? mempool_destroy+0x40/0x40 [ 351.572702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.578281] ? __find_get_block+0xf20/0xf20 [ 351.582620] ? __lock_is_held+0xb6/0x140 [ 351.586690] bio_alloc_bioset+0x3c1/0x720 01:32:13 executing program 1: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, &(0x7f0000000100)) [ 351.590879] ? bvec_alloc+0x2f0/0x2f0 [ 351.594698] ? arch_local_save_flags+0x50/0x50 [ 351.599303] submit_bh_wbc+0x133/0x7f0 [ 351.603198] __sync_dirty_buffer+0x1ab/0x3d0 [ 351.607629] ? sync_mapping_buffers+0xe60/0xe60 [ 351.612283] ? add_lock_to_list.isra.0+0x450/0x450 [ 351.617196] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.622728] sync_dirty_buffer+0x1b/0x20 [ 351.626788] ext4_write_inode+0x514/0x600 [ 351.630947] ? __ext4_iget+0x4320/0x4320 [ 351.634994] ? __lock_is_held+0xb6/0x140 [ 351.639069] __writeback_single_inode+0xef1/0x1620 [ 351.644029] ? __mark_inode_dirty+0x1590/0x1590 [ 351.648701] ? kasan_check_read+0x11/0x20 [ 351.652845] ? do_raw_spin_unlock+0xa0/0x330 [ 351.657249] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 351.662513] ? do_raw_spin_trylock+0x270/0x270 [ 351.667088] ? _raw_spin_unlock+0x2d/0x50 [ 351.671230] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 351.676754] ? wbc_attach_and_unlock_inode+0x680/0xa90 [ 351.682031] ? __writeback_single_inode+0x1620/0x1620 [ 351.687254] writeback_single_inode+0x3b2/0x590 [ 351.691922] ? wb_writeback+0xf70/0xf70 [ 351.695887] sync_inode_metadata+0x11c/0x180 [ 351.700293] ? sync_inode+0x30/0x30 [ 351.703930] ext4_sync_file+0x11b5/0x14d0 [ 351.708080] ? ext4_getfsmap+0xda0/0xda0 [ 351.712140] ? up_write+0x7b/0x230 [ 351.715681] ? ext4_getfsmap+0xda0/0xda0 [ 351.719744] vfs_fsync_range+0x144/0x230 [ 351.723806] ext4_file_write_iter+0x67f/0x1410 [ 351.728387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.733925] ? ext4_file_mmap+0x410/0x410 [ 351.738072] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 351.743360] ? rcu_read_unlock_special+0x380/0x380 [ 351.748313] ? __fget+0x499/0x710 [ 351.751795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 351.757333] ? iov_iter_init+0xea/0x220 [ 351.761308] __vfs_write+0x764/0xb40 [ 351.765030] ? check_preemption_disabled+0x48/0x290 [ 351.770045] ? kernel_read+0x120/0x120 [ 351.773934] ? rcu_read_lock_sched_held+0x110/0x130 [ 351.778959] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 351.783729] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 351.789303] ? __sb_start_write+0x1ac/0x360 [ 351.793621] vfs_write+0x20c/0x580 [ 351.797163] ksys_pwrite64+0x183/0x1c0 [ 351.801049] ? __ia32_sys_pread64+0xf0/0xf0 [ 351.805363] ? __ia32_sys_read+0xb0/0xb0 [ 351.809425] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.814799] ? trace_hardirqs_off_caller+0x300/0x300 [ 351.819906] __x64_sys_pwrite64+0x97/0xf0 [ 351.824058] do_syscall_64+0x1a3/0x800 [ 351.827929] ? syscall_return_slowpath+0x5f0/0x5f0 [ 351.832846] ? prepare_exit_to_usermode+0x232/0x3b0 [ 351.837848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.842681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.847864] RIP: 0033:0x458099 [ 351.851036] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.869925] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 351.877639] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 351.884909] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 01:32:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000080)=""/4096) 01:32:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:14 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 351.892162] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 351.899426] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 351.906694] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:14 executing program 2 (fault-call:2 fault-nth:17): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:32:14 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@int=0x800, 0x4) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:14 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffffc4, &(0x7f0000000100)) 01:32:14 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x190f0000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:14 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000140)=0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x5, 0x280) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0xbbb, 0xffffffff00000000, 0x434, 0x1, 0x0, 0x7, 0x8, 0x3, 0x9, 0xda1, 0x1, 0x3, 0x8001, 0x0, 0xe2, 0x4, 0x1f, 0x0, 0x20, 0xfffffffffffffffd, 0x0, 0x0, 0x1, 0x3, 0xfffffffffffffe00, 0x2, 0x1000000000000, 0x0, 0x2, 0x9, 0x0, 0x95, 0xff, 0x20, 0x6fd, 0x100000001, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000080), 0xc}, 0x1000, 0x1, 0xfffffffffffffff7, 0x8, 0x80000001}, r0, 0xa, r1, 0x8) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20000) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r2, 0xffffffffffffffc2, &(0x7f0000000100)) [ 352.222674] FAULT_INJECTION: forcing a failure. [ 352.222674] name failslab, interval 1, probability 0, space 0, times 0 [ 352.283391] CPU: 1 PID: 13021 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 352.290634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.300005] Call Trace: [ 352.302703] dump_stack+0x1db/0x2d0 [ 352.306362] ? dump_stack_print_info.cold+0x20/0x20 [ 352.311393] ? autoremove_wake_function+0x360/0x360 [ 352.316420] ? add_lock_to_list.isra.0+0x450/0x450 [ 352.321363] ? remove_wait_queue+0x300/0x300 [ 352.325792] should_fail.cold+0xa/0x15 01:32:14 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffffc4, &(0x7f0000000100)) [ 352.329690] ? add_lock_to_list.isra.0+0x450/0x450 [ 352.334629] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 352.339739] ? print_usage_bug+0xd0/0xd0 [ 352.343844] __should_failslab+0x121/0x190 [ 352.348119] should_failslab+0x9/0x14 [ 352.351973] kmem_cache_alloc+0x47/0x710 [ 352.356105] mempool_alloc_slab+0x47/0x60 [ 352.360268] mempool_alloc+0x19f/0x500 [ 352.364171] ? mempool_destroy+0x40/0x40 [ 352.368282] ? __lock_acquire+0x572/0x4a30 [ 352.372527] ? add_lock_to_list.isra.0+0x450/0x450 [ 352.377480] ? __lock_is_held+0xb6/0x140 [ 352.381599] bio_alloc_bioset+0x3c1/0x720 [ 352.385769] ? bvec_alloc+0x2f0/0x2f0 [ 352.389585] ? arch_local_save_flags+0x50/0x50 [ 352.394191] ? kasan_check_read+0x11/0x20 [ 352.398386] submit_bh_wbc+0x133/0x7f0 [ 352.402285] write_dirty_buffer+0xb6/0x140 [ 352.406517] sync_mapping_buffers+0x53e/0xe60 [ 352.411020] ? dput+0x250/0x790 [ 352.414304] ? write_dirty_buffer+0x140/0x140 [ 352.418809] ? iput+0x683/0xae0 [ 352.422089] ? inode_add_lru+0x2a0/0x2a0 [ 352.426148] ? dput+0x27c/0x790 [ 352.429442] ? shrink_dcache_sb+0x340/0x340 [ 352.433768] ext4_sync_file+0x118e/0x14d0 [ 352.437933] ? ext4_getfsmap+0xda0/0xda0 [ 352.442035] ? up_write+0x7b/0x230 [ 352.445573] ? ext4_getfsmap+0xda0/0xda0 [ 352.449634] vfs_fsync_range+0x144/0x230 [ 352.453697] ext4_file_write_iter+0x67f/0x1410 [ 352.458283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.463863] ? ext4_file_mmap+0x410/0x410 [ 352.468033] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 352.473303] ? rcu_read_unlock_special+0x380/0x380 [ 352.478243] ? __fget+0x499/0x710 [ 352.481709] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.487266] ? iov_iter_init+0xea/0x220 [ 352.491251] __vfs_write+0x764/0xb40 [ 352.494963] ? check_preemption_disabled+0x48/0x290 [ 352.500059] ? kernel_read+0x120/0x120 [ 352.503956] ? rcu_read_lock_sched_held+0x110/0x130 [ 352.509019] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 352.513808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.519395] ? __sb_start_write+0x1ac/0x360 [ 352.523716] vfs_write+0x20c/0x580 [ 352.527248] ksys_pwrite64+0x183/0x1c0 [ 352.531137] ? __ia32_sys_pread64+0xf0/0xf0 [ 352.535455] ? __ia32_sys_read+0xb0/0xb0 [ 352.539618] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.545011] ? trace_hardirqs_off_caller+0x300/0x300 [ 352.550126] __x64_sys_pwrite64+0x97/0xf0 [ 352.554285] do_syscall_64+0x1a3/0x800 [ 352.558343] ? syscall_return_slowpath+0x5f0/0x5f0 [ 352.563294] ? prepare_exit_to_usermode+0x232/0x3b0 [ 352.568343] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.573605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.578789] RIP: 0033:0x458099 [ 352.581996] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.600893] RSP: 002b:00007f6a9e0b0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 352.608604] RAX: ffffffffffffffda RBX: 00007f6a9e0b0c90 RCX: 0000000000458099 [ 352.615868] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 352.623133] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 01:32:14 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:14 executing program 2 (fault-call:2 fault-nth:18): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 352.630422] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0b16d4 [ 352.637683] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 0000000000000005 01:32:15 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/unix\x00') ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000001200)) fsetxattr$security_smack_entry(r1, &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='/dev/dri/card#\x00', 0xf, 0x3) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x4aad, 0x2f0deb55, 0x2, 0x0, 0x0, [{r1, 0x0, 0xffff}, {r0, 0x0, 0x9}]}) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:15 executing program 1: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffffc4, &(0x7f0000000100)) 01:32:15 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0f9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:32:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:15 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000001c0)={0xb4e3, 0x100000001, 0xbf, 0xb7, &(0x7f0000000040)=""/183, 0x2e, &(0x7f0000000100)=""/46, 0x67, &(0x7f0000000140)=""/103}) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000240)={0x1, 0x10, [0x5, 0x7ff, 0x8, 0x8011]}) 01:32:15 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)) 01:32:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)) 01:32:15 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl(r2, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:15 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x20000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:15 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)) 01:32:15 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:15 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200c0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100), &(0x7f00000000c0)=0xffffffffffffff83) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:15 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x2, 0x0) 01:32:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:15 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000040)={0x1, 0x7, 0x9, 0xcf}) 01:32:15 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, 0x0) 01:32:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 353.662006] EXT4-fs: 14 callbacks suppressed [ 353.662017] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x4, 0x0) [ 353.755704] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:16 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x7f, 0x8, 0x40, 0x21}, {0x7fffffff, 0xfffffffffffffff9, 0x3, 0x2}, {0x8, 0x3, 0x800, 0x7}]}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) r1 = syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, 0x0) 01:32:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x5, 0x0) [ 353.933800] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:16 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffc4, 0x0) 01:32:16 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8001, 0x200400) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000080)) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) [ 354.074783] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x8, 0x0) 01:32:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='gid_map\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 354.208409] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 354.232236] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 354.282183] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:16 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0x14004) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x1000) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000100)={0x1, 0x8}) ioctl(r0, 0xffffffffffffffc2, &(0x7f0000000100)) r2 = getuid() ioctl$SIOCAX25GETUID(0xffffffffffffffff, 0x89e0, &(0x7f0000000080)={0x3, @default, r2}) 01:32:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x5000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:16 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x10, 0x0) 01:32:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000002c0)}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000004}, 0xc, 0x0}, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:32:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\a\x00\x00\xa4\xd1\x19i\x8f\x1c\x12u\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xcb\x85\xb4\xb7\xa15\x05\x88t<\x8d\x9b\xaf\x1f\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x8b\v\xd6\xdc\xaf!\xbc!\x13\x17\xff\xef3\x86|\xcc[\x8f\x149\xb5m4\x16b\xbc\x88\x80\x97\x98C\xb35R6\xbe\x93Bd\x85\xf9\x9f\x87\x99\x8fH\xad\x7f\xfa)\xbd\xa0\x80\xd7\x01\xb7\r%$\a!\x8f\xada.\aE\x83Ag\x11\xec\x10S\xba@\xf2h\t\xa9Qq\xa9') dup2(r0, r1) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x0) [ 354.590549] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 354.669014] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:17 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x11, 0x0) [ 354.728562] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x41000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:17 executing program 1: prctl$PR_SVE_GET_VL(0x33, 0x1642) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='limits\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 01:32:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:17 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x41, 0x0) 01:32:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x48000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:17 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0xf0, 0x0) 01:32:17 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000002c0)}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000004}, 0xc, 0x0}, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:32:17 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xa000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:17 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x202, 0x0) 01:32:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:18 executing program 1: prctl$PR_SVE_GET_VL(0x33, 0x1642) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='limits\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 01:32:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x203, 0x0) 01:32:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xb000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x60000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000002c0)}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000004}, 0xc, 0x0}, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:32:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x204, 0x0) 01:32:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:18 executing program 1: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0, 0x0) 01:32:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x205, 0x0) 01:32:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x68000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:18 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) write$P9_RSTAT(r1, &(0x7f00000000c0)={0x51, 0x7d, 0x1, {0x0, 0x4a, 0x5, 0x7ff, {0x10, 0x1}, 0x92000000, 0x8000, 0x5, 0x7fff, 0x1, '+', 0x8, 'lovmnet1', 0x8, 'syz_tun\x00', 0x6, 'team0\x00'}}, 0x51) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 01:32:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xe000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:18 executing program 4: prctl$PR_SVE_GET_VL(0x33, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='limits\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 01:32:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x206, 0x0) 01:32:18 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 356.629187] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:32:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x10000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:19 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x208, 0x0) 01:32:19 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e108b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:32:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x74000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x190f0000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:19 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:19 executing program 1: 01:32:19 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x209, 0x0) 01:32:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:20 executing program 4: 01:32:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x20c, 0x0) 01:32:20 executing program 1: 01:32:20 executing program 1: 01:32:20 executing program 4: 01:32:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1ef08b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:32:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x20d, 0x0) 01:32:20 executing program 4: 01:32:20 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000180)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) write$binfmt_elf32(r3, &(0x7f0000000440)=ANY=[@ANYRES64], 0x8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000001400)=0x5b60, 0x4) 01:32:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x20000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x210, 0x0) 01:32:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 01:32:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x580, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000000)=0x8, 0x4) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=""/36, 0x24}, 0x2002) sendmmsg(r0, &(0x7f00000000c0), 0x515, 0x0) 01:32:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x212, 0x0) 01:32:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b930f0c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:32:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 01:32:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="43020000000000001800120008000100767469000c00020008000400e0000002"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 01:32:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x2d000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:20 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:20 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x2c0, 0x0) 01:32:21 executing program 1: r0 = getpgrp(0x0) syz_open_procfs(r0, &(0x7f0000000000)='projid_map\x00') 01:32:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 358.719138] EXT4-fs: 33 callbacks suppressed [ 358.719151] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x2ca, 0x0) 01:32:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x7f, 0x8, 0x40, 0x21}, {0x7fffffff, 0xfffffffffffffff9, 0x3, 0x2}, {0x8, 0x3, 0x800, 0x7}]}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) r1 = syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:21 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090f1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 358.835635] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x2cc, 0x0) 01:32:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc0000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x7f, 0x8, 0x40, 0x21}, {0x7fffffff, 0xfffffffffffffff9, 0x3, 0x2}, {0x8, 0x3, 0x800, 0x7}]}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) r1 = syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:21 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 359.124123] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x2ce, 0x0) 01:32:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x40000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x7f, 0x8, 0x40, 0x21}, {0x7fffffff, 0xfffffffffffffff9, 0x3, 0x2}, {0x8, 0x3, 0x800, 0x7}]}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) r1 = syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) ioctl(r1, 0xffffffffffffffc2, &(0x7f0000000100)) [ 359.329644] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:21 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:21 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x2e0, 0x0) 01:32:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 359.438050] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x7f, 0x8, 0x40, 0x21}, {0x7fffffff, 0xfffffffffffffff9, 0x3, 0x2}, {0x8, 0x3, 0x800, 0x7}]}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) 01:32:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x41000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:21 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl(r2, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:21 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 359.632143] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x2f0, 0x0) [ 359.759258] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:22 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x7f, 0x8, 0x40, 0x21}, {0x7fffffff, 0xfffffffffffffff9, 0x3, 0x2}, {0x8, 0x3, 0x800, 0x7}]}, 0x10) syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) [ 359.818689] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:22 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl(r2, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:22 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c048d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:32:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x300, 0x0) 01:32:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x48000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:22 executing program 1: syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) 01:32:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:22 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl(r2, 0xffffffffffffffc2, &(0x7f0000000100)) 01:32:22 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x500, 0x0) 01:32:22 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) [ 360.285409] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 360.318305] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:22 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) 01:32:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:22 executing program 1: syz_open_dev$dri(0x0, 0x0, 0x800000000000083) 01:32:22 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0xa00, 0x0) 01:32:22 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:23 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) 01:32:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x60000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:23 executing program 1: syz_open_dev$dri(0x0, 0x0, 0x800000000000083) 01:32:23 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0xf00, 0x0) 01:32:23 executing program 1: syz_open_dev$dri(0x0, 0x0, 0x800000000000083) 01:32:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:23 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x68000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:23 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x0) 01:32:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x13bb, 0x0) 01:32:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:23 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:23 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x0) 01:32:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0xfdef, 0x0) 01:32:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:23 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r1, 0x2, 0x9, 0x3, 0x1, 0x2, 0x5}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:23 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x0) 01:32:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0xff0f, 0x0) 01:32:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:24 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@empty}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:24 executing program 1 (fault-call:0 fault-nth:0): syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) 01:32:24 executing program 4: creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:24 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x20000400, 0x0) 01:32:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 362.007835] FAULT_INJECTION: forcing a failure. [ 362.007835] name failslab, interval 1, probability 0, space 0, times 0 [ 362.019423] CPU: 1 PID: 13870 Comm: syz-executor1 Not tainted 5.0.0-rc3+ #39 [ 362.026628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.035984] Call Trace: [ 362.038583] dump_stack+0x1db/0x2d0 [ 362.042237] ? dump_stack_print_info.cold+0x20/0x20 [ 362.047278] ? __f_unlock_pos+0x19/0x20 [ 362.051257] should_fail.cold+0xa/0x15 [ 362.055148] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.060276] ? ___might_sleep+0x1e7/0x310 [ 362.064431] ? arch_local_save_flags+0x50/0x50 [ 362.069036] __should_failslab+0x121/0x190 [ 362.073276] should_failslab+0x9/0x14 [ 362.077078] kmem_cache_alloc+0x2be/0x710 [ 362.081244] ? check_preemption_disabled+0x48/0x290 [ 362.086274] getname_flags+0xd6/0x5b0 [ 362.090078] getname+0x1a/0x20 [ 362.093258] do_sys_open+0x3a5/0x7c0 [ 362.096964] ? filp_open+0x80/0x80 [ 362.100510] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.105873] ? trace_hardirqs_off_caller+0x300/0x300 [ 362.110968] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.115730] __x64_sys_open+0x7e/0xc0 [ 362.119557] do_syscall_64+0x1a3/0x800 [ 362.123459] ? syscall_return_slowpath+0x5f0/0x5f0 [ 362.128396] ? prepare_exit_to_usermode+0x232/0x3b0 [ 362.133430] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.138418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.143617] RIP: 0033:0x412041 [ 362.146808] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 362.165717] RSP: 002b:00007f194c3477a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 362.173437] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 362.180720] RDX: 0000000000000000 RSI: 0000000000000083 RDI: 00007f194c347850 [ 362.188003] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 362.195272] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f194c3486d4 [ 362.202547] R13: 00000000004c6a06 R14: 00000000004dbd58 R15: 0000000000000003 01:32:24 executing program 1 (fault-call:0 fault-nth:1): syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) 01:32:24 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) [ 362.425867] FAULT_INJECTION: forcing a failure. [ 362.425867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 362.437772] CPU: 0 PID: 13893 Comm: syz-executor1 Not tainted 5.0.0-rc3+ #39 [ 362.444985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.454358] Call Trace: [ 362.457005] dump_stack+0x1db/0x2d0 [ 362.460735] ? dump_stack_print_info.cold+0x20/0x20 [ 362.465769] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 362.471320] ? _kstrtoull+0x17d/0x250 [ 362.475143] should_fail.cold+0xa/0x15 [ 362.479066] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.484179] ? get_pid_task+0xd4/0x190 [ 362.488078] ? find_held_lock+0x35/0x120 [ 362.492161] ? get_pid_task+0xd4/0x190 [ 362.496077] should_fail_alloc_page+0x50/0x60 [ 362.500584] __alloc_pages_nodemask+0x323/0xdc0 [ 362.505282] ? __alloc_pages_slowpath+0x2cc0/0x2cc0 [ 362.510313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 362.515902] ? ___might_sleep+0x1e7/0x310 [ 362.520071] ? trace_hardirqs_off+0xb8/0x310 [ 362.524511] cache_grow_begin+0x9c/0x8c0 [ 362.528589] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 362.534180] ? check_preemption_disabled+0x48/0x290 [ 362.539210] kmem_cache_alloc+0x645/0x710 [ 362.543402] getname_flags+0xd6/0x5b0 [ 362.547254] getname+0x1a/0x20 [ 362.550468] do_sys_open+0x3a5/0x7c0 [ 362.554194] ? filp_open+0x80/0x80 [ 362.557776] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.563151] ? trace_hardirqs_off_caller+0x300/0x300 [ 362.568284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 362.573200] __x64_sys_open+0x7e/0xc0 [ 362.577023] do_syscall_64+0x1a3/0x800 [ 362.580927] ? syscall_return_slowpath+0x5f0/0x5f0 [ 362.585872] ? prepare_exit_to_usermode+0x232/0x3b0 [ 362.590905] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.595803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.601000] RIP: 0033:0x412041 [ 362.604198] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 01:32:24 executing program 4: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x74000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 362.623134] RSP: 002b:00007f194c3477a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 362.630854] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 362.638128] RDX: 0000000000000000 RSI: 0000000000000083 RDI: 00007f194c347850 [ 362.645401] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 362.652675] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f194c3486d4 [ 362.659949] R13: 00000000004c6a06 R14: 00000000004dbd58 R15: 0000000000000003 01:32:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:25 executing program 1 (fault-call:0 fault-nth:2): syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) 01:32:25 executing program 4: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) [ 362.922458] FAULT_INJECTION: forcing a failure. [ 362.922458] name failslab, interval 1, probability 0, space 0, times 0 [ 362.943923] CPU: 1 PID: 13910 Comm: syz-executor1 Not tainted 5.0.0-rc3+ #39 [ 362.951128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.960484] Call Trace: [ 362.963095] dump_stack+0x1db/0x2d0 [ 362.966770] ? dump_stack_print_info.cold+0x20/0x20 [ 362.971845] should_fail.cold+0xa/0x15 [ 362.975790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 362.980915] ? ___might_sleep+0x1e7/0x310 [ 362.985087] ? arch_local_save_flags+0x50/0x50 [ 362.989683] ? print_usage_bug+0xd0/0xd0 [ 362.993777] __should_failslab+0x121/0x190 [ 362.998029] should_failslab+0x9/0x14 [ 363.001841] kmem_cache_alloc+0x2be/0x710 [ 363.006022] ? __lock_acquire+0x572/0x4a30 [ 363.010294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 363.015852] __alloc_file+0x93/0x480 [ 363.019582] ? file_free_rcu+0xe0/0xe0 [ 363.023482] ? mark_held_locks+0x100/0x100 [ 363.027740] alloc_empty_file+0x72/0x170 [ 363.031823] path_openat+0x112/0x5650 [ 363.035637] ? add_lock_to_list.isra.0+0x450/0x450 [ 363.040591] ? __alloc_fd+0x549/0x700 [ 363.044402] ? find_held_lock+0x35/0x120 [ 363.048478] ? path_lookupat.isra.0+0xba0/0xba0 [ 363.053158] ? do_dup2+0x580/0x580 [ 363.056721] ? kasan_check_read+0x11/0x20 [ 363.060885] ? do_raw_spin_unlock+0xa0/0x330 [ 363.065308] ? do_raw_spin_trylock+0x270/0x270 [ 363.069905] ? __phys_addr_symbol+0x30/0x70 [ 363.074262] do_filp_open+0x26f/0x370 [ 363.078074] ? may_open_dev+0x100/0x100 [ 363.082062] ? exit_files+0xb0/0xb0 [ 363.085708] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 363.091276] ? digsig_verify.cold+0x32/0x32 [ 363.095607] ? get_unused_fd_flags+0x122/0x1a0 [ 363.100203] ? __alloc_fd+0x700/0x700 [ 363.104046] ? getname_flags+0x277/0x5b0 [ 363.108129] do_sys_open+0x59a/0x7c0 [ 363.111860] ? filp_open+0x80/0x80 [ 363.115404] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.120758] ? trace_hardirqs_off_caller+0x300/0x300 [ 363.125849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 363.130594] __x64_sys_open+0x7e/0xc0 [ 363.134406] do_syscall_64+0x1a3/0x800 [ 363.138292] ? syscall_return_slowpath+0x5f0/0x5f0 [ 363.143222] ? prepare_exit_to_usermode+0x232/0x3b0 [ 363.148263] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.153117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.158304] RIP: 0033:0x412041 [ 363.161539] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 363.180442] RSP: 002b:00007f194c3477a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 363.188144] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 0000000000412041 [ 363.195410] RDX: 0000000000000000 RSI: 0000000000000083 RDI: 00007f194c347850 [ 363.202673] RBP: 000000000073bf00 R08: 000000000000000f R09: 0000000000000000 [ 363.210037] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f194c3486d4 [ 363.217308] R13: 00000000004c6a06 R14: 00000000004dbd58 R15: 0000000000000003 01:32:25 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:25 executing program 4: r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:26 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x49420000, 0x0) 01:32:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:26 executing program 1 (fault-call:0 fault-nth:3): syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) 01:32:26 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:26 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478042ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) [ 363.899810] EXT4-fs: 18 callbacks suppressed [ 363.899822] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:26 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:26 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) 01:32:26 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 363.958523] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:26 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/.ev/dri/card#\x00', 0x0, 0x800000000000083) [ 364.145240] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:26 executing program 4: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x7, 0x0, 0x6, 0xe81b4cd], 0x4, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) [ 364.262924] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 364.421703] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:27 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:27 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, 0x0) 01:32:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:27 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='//ev/dri/card#\x00', 0x0, 0x800000000000083) 01:32:27 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x7ffff000, 0x0) 01:32:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:27 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, 0x0) 01:32:27 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/.ri/card#\x00', 0x0, 0x800000000000083) [ 365.245662] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 365.269435] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:27 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) [ 365.366475] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, [ 365.416842] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:27 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, 0x0) 01:32:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:27 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:27 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev//ri/card#\x00', 0x0, 0x800000000000083) 01:32:28 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={0x0, 0x0, 0x400, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:28 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/.ard#\x00', 0x0, 0x800000000000083) [ 365.685744] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock, 01:32:28 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x92400000, 0x0) 01:32:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02e0b145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0x200, 0x0) 01:32:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xc0000000, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:28 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri//ard#\x00', 0x0, 0x800000000000083) 01:32:28 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffff, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:28 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x8a, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:28 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/car.#\x00', 0x0, 0x800000000000083) 01:32:28 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:29 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/car/#\x00', 0x0, 0x800000000000083) 01:32:29 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:29 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0xfffffdef, 0x0) 01:32:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:29 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x02', 0x0, 0x800000000000083) 01:32:29 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:29 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:29 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x03', 0x0, 0x800000000000083) 01:32:29 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0xffffffffffffff01, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:30 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:30 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x04', 0x0, 0x800000000000083) 01:32:30 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x80, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="4ebefa1e923f1e018b6e53bf4815b78e1f2ef9212b93090c1ff6b35c208d50aef3fd759f995b53dd37c58cf8332b8a6b66575478e02ef0145bf122ba2e2c53a7ec45e375683475a6495f8d7b7a088f5e32dc266569074319bf8c8d3d8007cc92e2ba0d9082c41b63e330f353a3f675a98d2e74a08e38400f7f5eb113a0e25fd90115d57a7acdcab1128cf4f9c719f3f29d460c507f8a2a6594d259217d32eae9be93c6ed17a67ae2e7e689a31fa8449da12fd62bf423cff702b09e6ee1ff0e698b8bb517819eb712ba2b34b54b28b79d9399d920d5a5507e8a85f37060dfe3051f06f8d7cc9b068495ee5d5fcce85410bcd9f91d1f198353ce94b2e03370e43875c1a035bb88fd26fbb5b1252e2056d6b67e2b2f424051a40ad9170e76a81a6ca4f149ff643db76f8f2c1aa8024a6279952027489bbad6479e47ea5ba9e47d8136df398665f6cdfd15e93cfbf2ce1151afe9321ed63fe7100e704b232646fc1e0e936b90cceaaa70225ce71640e10316d2cc637355eddb3c4e16ff1635fa4e65a66eb5ab2cbf9d6f063e05f0e46fcc14bf31eedfb9f33c215fc14946cc6f7493924442e939f71ac4bd3e35e78857f9624c663f3669a47a7146e3249ee3eaaf681f371d515af5b934f9252c7ac2a164bf318fc2b194ee087b2b28ed5e4618c0906fc3f32c43a3b9e08a2e0d509f65a7de909e8c3c535f1d8cb9c236716e5ad709", 0xfffffffffffffdef, 0x0) 01:32:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:30 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) 01:32:30 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x0) 01:32:30 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x0, 0x800000000000083) 01:32:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0xf8f73f00, 0x0, 0x0, 0x100424, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 01:32:30 executing program 1: syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x0f', 0x0, 0x800000000000083) 01:32:30 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) pwrite64(r0, &(0x7f0000000200)="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", 0x200, 0x2) 01:32:30 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x3, 0x3, 0x6, 0x2, 0x400000000, 0x7, 0x0, 0x7f, 0x2, 0x3f3, 0x5, "25dee5e330e33609f0d7604a07400d0de298bb1ebfae7ef188b9d6cd9a5e80f0"}}) [ 368.644559] WARNING: CPU: 1 PID: 14228 at fs/ext4/inode.c:945 ext4_dio_get_block_overwrite+0xb7/0xf0 [ 368.653880] Kernel panic - not syncing: panic_on_warn set ... [ 368.659778] CPU: 1 PID: 14228 Comm: syz-executor2 Not tainted 5.0.0-rc3+ #39 [ 368.666970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.676326] Call Trace: [ 368.678983] dump_stack+0x1db/0x2d0 [ 368.682634] ? dump_stack_print_info.cold+0x20/0x20 [ 368.687681] ? ext4_block_zero_page_range+0x17f0/0x17f0 [ 368.693115] panic+0x2cb/0x65c [ 368.696301] ? add_taint.cold+0x16/0x16 [ 368.700265] ? ext4_dio_get_block_overwrite+0xb7/0xf0 [ 368.705454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.711032] ? __probe_kernel_read+0x1f4/0x250 [ 368.715643] ? __warn.cold+0x5/0x48 [ 368.719274] ? ext4_dio_get_block_overwrite+0xb7/0xf0 [ 368.724451] __warn.cold+0x20/0x48 [ 368.728053] ? ext4_dio_get_block_overwrite+0xb7/0xf0 [ 368.733264] report_bug+0x263/0x2b0 [ 368.736963] do_error_trap+0x11b/0x200 [ 368.740893] do_invalid_op+0x37/0x50 [ 368.744602] ? ext4_dio_get_block_overwrite+0xb7/0xf0 [ 368.749808] invalid_op+0x14/0x20 [ 368.753264] RIP: 0010:ext4_dio_get_block_overwrite+0xb7/0xf0 [ 368.759069] Code: 3f f5 65 ff 84 db 74 1d e8 f6 f3 65 ff 49 8b 1c 24 31 ff 48 c1 eb 0c 83 e3 01 89 de e8 22 f5 65 ff 84 db 74 07 e8 d9 f3 65 ff <0f> 0b e8 d2 f3 65 ff 44 89 e8 5b 41 5c 41 5d 41 5e 5d c3 e8 c1 f3 [ 368.777971] RSP: 0018:ffff888053f06f40 EFLAGS: 00010212 [ 368.783319] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000a426000 [ 368.790571] RDX: 00000000000006d7 RSI: ffffffff821c0cf7 RDI: 0000000000000001 [ 368.797837] RBP: ffff888053f06f60 R08: ffff88805436c580 R09: ffffed100448165a [ 368.805099] R10: ffffed1004481659 R11: ffff88802240b2cf R12: ffff888053f071c0 [ 368.812355] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000001 [ 368.819663] ? ext4_dio_get_block_overwrite+0xb7/0xf0 [ 368.824880] do_blockdev_direct_IO+0x3822/0xdc10 [ 368.829722] ? __lock_acquire+0x572/0x4a30 [ 368.833965] ? sb_init_dio_done_wq+0x90/0x90 [ 368.838369] ? __lock_is_held+0xb6/0x140 [ 368.842437] ? arch_local_save_flags+0x50/0x50 [ 368.847024] ? ext4_get_block_unwritten+0x40/0x40 [ 368.851872] ? __ext4_handle_dirty_metadata+0x1e3/0x570 [ 368.857250] ? kasan_check_write+0x14/0x20 [ 368.861472] ? ext4_mark_iloc_dirty+0x1947/0x2f00 [ 368.866307] ? ext4_chunk_trans_blocks+0x30/0x30 [ 368.871066] ? __might_sleep+0x95/0x190 [ 368.875044] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 368.880570] ? __ext4_journal_get_write_access+0x70/0xa0 [ 368.886015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.891552] ? ext4_mark_inode_dirty+0x257/0xb80 [ 368.896307] ? add_lock_to_list.isra.0+0x450/0x450 [ 368.901225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 368.906773] ? invalidate_inode_pages2_range+0x159f/0x1d10 [ 368.912384] ? add_lock_to_list.isra.0+0x450/0x450 [ 368.917300] ? ext4_direct_IO+0x1388/0x2090 [ 368.921609] ? find_held_lock+0x35/0x120 [ 368.925659] ? ext4_direct_IO+0x1388/0x2090 [ 368.929983] ? __lock_is_held+0xb6/0x140 [ 368.934049] ? lock_downgrade+0x910/0x910 [ 368.938217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.943806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.949338] ? ext4_get_block_unwritten+0x40/0x40 [ 368.954171] __blockdev_direct_IO+0xa1/0xca [ 368.958482] ? write_end_fn+0xf0/0xf0 [ 368.962302] ext4_direct_IO+0x142d/0x2090 [ 368.966458] ? ext4_iomap_end+0x7e0/0x7e0 [ 368.970596] ? generic_update_time+0x268/0x440 [ 368.975164] ? file_remove_privs+0x500/0x500 [ 368.979564] ? preempt_count_add+0xbc/0x1b0 [ 368.983870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 368.989398] ? __mnt_drop_write+0x5d/0x80 [ 368.993545] ? __mnt_drop_write_file+0x31/0x40 [ 368.998132] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 369.003668] ? filemap_check_errors+0xd8/0x110 [ 369.008249] generic_file_direct_write+0x214/0x4b0 [ 369.013206] __generic_file_write_iter+0x2ee/0x630 [ 369.018158] ext4_file_write_iter+0x37a/0x1410 [ 369.022734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.028266] ? ext4_file_mmap+0x410/0x410 [ 369.032410] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 369.037684] ? __fget+0x499/0x710 [ 369.041127] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 369.046650] ? iov_iter_init+0xea/0x220 [ 369.050638] __vfs_write+0x764/0xb40 [ 369.054370] ? check_preemption_disabled+0x48/0x290 [ 369.059401] ? kernel_read+0x120/0x120 [ 369.063294] ? rcu_read_lock_sched_held+0x110/0x130 [ 369.068314] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 369.073063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.078611] ? __sb_start_write+0x1ac/0x360 [ 369.082932] vfs_write+0x20c/0x580 [ 369.086461] ksys_pwrite64+0x183/0x1c0 [ 369.090339] ? __ia32_sys_pread64+0xf0/0xf0 [ 369.094687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 369.100249] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.105612] ? trace_hardirqs_off_caller+0x300/0x300 [ 369.110707] __x64_sys_pwrite64+0x97/0xf0 [ 369.114858] do_syscall_64+0x1a3/0x800 [ 369.118733] ? syscall_return_slowpath+0x5f0/0x5f0 [ 369.123673] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 369.128698] ? __switch_to_asm+0x34/0x70 [ 369.132805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.137638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.142826] RIP: 0033:0x458099 [ 369.146047] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.164949] RSP: 002b:00007f6a9e08fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 369.172652] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000458099 [ 369.179929] RDX: 0000000000000200 RSI: 0000000020000200 RDI: 0000000000000004 [ 369.187228] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 369.194501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6a9e0906d4 [ 369.201761] R13: 00000000004c4bf0 R14: 00000000004d8368 R15: 00000000ffffffff [ 369.210226] Kernel Offset: disabled [ 369.213978] Rebooting in 86400 seconds..