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"}, &(0x7f0000002880)=0x1008) sendmmsg$inet_sctp(r1, &(0x7f0000002900)=[{&(0x7f0000000200)=@in6={0xa, 0x4e21, 0x20, @loopback}, 0x1c, &(0x7f0000001380)=[{&(0x7f0000000240)="413361872f40220e5ca891ca567c45edf6ab4ad3be69e432dcbf3f4c5e60eb7d02e2908aeaac9f38ca010d535a5bd1e60b405fb0db", 0x35}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="ae6d4d5172c55497b92bb9f08d8d0da9d4a69e2170c15c7f10b208aa8273a41bc897f574c23b36017112cc472367741db20a2ba04fa01a846996b8fa4cc6d773121c9304bc01e56a88a55a6b4f6be47f2f030270401805a7b489b292fdef18e7b579994da1f28b8ad37665e17bdbf5ce7c46e23b9f3b895e978c1037dbc623a3c074095406c387c6fad2ac3ffc12240cb50b4667604b379d1bdc4f62cb8468465068965c933f2572753b8c810c73746213267c22bf84b959f0827c0657f7914d92a7d0169173485646edae6ca9c9855a486e599bcd4b8e16d06e72d36003d8a7", 0xe0}], 0x3, &(0x7f0000001540)=[@dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @sndrcv={0x30, 0x84, 0x1, {0x81, 0x9, 0x8, 0x4, 0x0, 0x0, 0x1, 0x1ff, r2}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x4}}, @sndinfo={0x20, 0x84, 0x2, {0xffffffffffffffff, 0x8002, 0x1, 0x8, r3}}], 0x98, 0x10}, {&(0x7f0000001600)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000001800)=[{&(0x7f0000001640)="effcc88a54913577ec29670dad6e1197198b5c88551652a1a83b5b99fdc1ee0d8be91137dcddfaa72006c1e7e19c94b674cdf3892d70b15dafbbc625f75f5ca6a95aac8e270722c35d058b2772eedef9cb0e318d84133f4148c94b8741c08112763a1d4cc6b28de04cf3607346f7b4cbc95930e564c2c9910bbbe9b03bda9ec89495da47f0914d20e091c866ad57a9c22280cc95bc1534e54ca472c11361b9ac76ce80251f44d7ab9cc3c26e6abe9052be04a509caf5dc291742c6f7ce33d6380140abee16390367eec6a5bcdf2dfef57cf67146bac8614163882f031b1eac0912545cc594d6c2747a9ce2d85181b33529", 0xf1}, {&(0x7f0000001740)="dcab8b710e4cf14c0f5067953347d9414528c5249a49ead4c6cb65a3701f00cbfb95aa3b1ea1b21a9fab5d297ece05f5d5f608de2c7cb1c17b799ce4db082ff4727b188406b792d21fbc63b75a3541fddd33343824a98e7364f37180b25e66f2f58752596078e2db8a3d7346401b77c8e9185364b3bd04d8094d33f6748a61996e853747393c76dd799def45195b0101fcf53511e751a8971de4a42323dc0433e2bddddc36b0ff3b390d", 0xaa}], 0x2, &(0x7f00000028c0)=[@sndinfo={0x20, 0x84, 0x2, {0xadd, 0x20a, 0x100000001, 0x6, r4}}], 0x20}], 0x2, 0x20000014) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x1c4) ioctl$VIDIOC_S_SELECTION(r5, 0xc040565f, &(0x7f0000000180)={0xb, 0x103, 0x1, {0x8, 0x3, 0xf8, 0x2}}) r6 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x210100) bind$can_raw(r6, &(0x7f00000000c0), 0x10) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfec0000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x400000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:35 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xffffff7f00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:35 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40, 0x101001) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) getresgid(&(0x7f0000000380)=0x0, &(0x7f00000003c0), &(0x7f0000000400)) r5 = getpid() r6 = getuid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000000600)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000180)="908ac6a74b14f206d4", 0x9}], 0x1, &(0x7f0000000540)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0xa8, 0x84}, 0x8000) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:35 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x2000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x0, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cmdline\x00') ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000080)={0x9, "7208534aca65da6ac358f03ba14968ba5647d1d4b7c18517d47c51cf6a2da177", 0x201, 0x100, 0x8, 0x0, 0x3}) exit(0x0) sendfile(r0, r0, 0x0, 0xaa6) 05:57:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3f00000000000000}, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfec0}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:35 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x6000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:36 executing program 3: r0 = socket$inet6(0xa, 0x800, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x42, 0x0, 0x42004, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80000, 0x0) mq_timedsend(r1, &(0x7f0000000180)="16214e39ba0fff363640d4482ad2ac116d864eeb802f15f39294b04f02837d4e21206d9a95022bb3bb97cce81e8c2fc1f6099d3d413ca5be6034f55147812a38ee49c0ad2b16da53c6ae5c39a726866171d4bc28a20e03329b19ec1704f7b239ec459bb97c4efe97b8448f410485d0337f022797c71bce424b5c93a2056b24ba7b627cc38daabfeb35892d8cfca794e918", 0x91, 0x80, &(0x7f00000000c0)={0x0, 0x989680}) 05:57:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x900}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:36 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") fcntl$setpipe(r0, 0x407, 0x9) sendto$inet6(r0, &(0x7f0000000080)="69ed866a8df9d627860009c96e3706545a4ba7bc2c413852714e827f410c1ddab687e291612e", 0x26, 0xc0, 0x0, 0x0) r1 = semget$private(0x0, 0x1, 0x8) semctl$IPC_INFO(r1, 0x7, 0x3, &(0x7f00000000c0)=""/71) gettid() r2 = gettid() setpgid(r2, r2) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x14f, 0x0, 0x0, 0x0) 05:57:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:36 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfeffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3f000000}, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:36 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file1\x00', 0x4, 0x4, &(0x7f0000000400)=[{&(0x7f0000000100), 0x0, 0x800}, {&(0x7f0000000180)="5205983581c2df3266e2c24a7d6b19d18c47cc76e39af334e2410fde48a1dcad7a3b6c606c6e4609b87bf1b8759cd5daabec936a07000e9748706bd33d99656c74236995943c12b40d6306dcec354a76ae482634fb126e84a85ed600052c2a4bbf382f7bb05d76f6db2536a6cc7e6615e89a8e6eb5cc2fa10980ab26730d1c5a049744dbe0d3c3f0e563f4242d6518479518508e6e191e494b5cac662db164b69fd177808d635bb3ad64a451", 0xac, 0x8c92}, {&(0x7f0000000240)="ad9b9edd1c06949f1386a0cb174d5b303288c3721371d07fc0120b633126ca97e08d42487ef2c7d5dedaa519b434e92767e51dec9139997a46893288100e19d8114c17f3655a6a94ffbb6642db4187ae8f484bd45488857b8bfb732506d016c50ae522798f329bf7489282506ab325d698f2437604308f2307e568852c0d978420", 0x81, 0x6}, {&(0x7f0000000300)="5c3b1cc05092a90e11cae48958eb429118a66068054f118b114cc5a8951df1ba1baa2e4b4dcbc32e3cc7f3bb6aa30a984e063b9bab3f3d0836e210ae6333c926faff009f8d49e4b6e6c8d32dbac538362bd19358b533a93150b7a38637430f208eef7bd471e195830bcfb6e9a53c543764c0693faf86e2bea75a6a91e689e80352ca73503d9d65eb09902c000b84a4cd8aa1553c85280b2af21d7d9c769fd8f266e7bb3fd6d8fc45d6e6cd3db7eb905755ce4f3e52f5f8001bcc256b785952809794a8", 0xc3, 0x1}], 0x44000, &(0x7f0000000540)={[{@shortname_win95='shortname=win95'}, {@utf8no='utf8=0'}, {@uni_xlate='uni_xlate=1'}, {@numtail='nonumtail=0'}, {@shortname_mixed='shortname=mixed'}, {@uni_xlate='uni_xlate=1'}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@dont_appraise='dont_appraise'}]}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffbfffc, 0x0, 0x0, 0x8000, 0x0) 05:57:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x3f00}, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xf5ffffff00000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:37 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) r1 = dup(r0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000780)=0x1, 0x2) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x200, 0x2, 0x0, 0x4, 0x3, 0x3f, 0x7b, 0x75, 0x40, 0x3bb, 0xffffffff80000000, 0xfffffffffffffffa, 0x38, 0x2, 0x40, 0x7fff}, [{0x0, 0x1, 0x1, 0xffffffffffffff80, 0x4, 0x58b9, 0x0, 0x7}], "1764888131dfebd14a59ec2d7102a0e3f580ea8e27f485431b83c2d5667abdeb9e5b791782c36306aa0c788630383aeaa8379e7892dd7c408613a06c89c8b3a95b4b83efcef50ed56d32f08a6ec3ed9ff6b7cf7afc61486ebecd351c04e420d741c1839e7c708e923e0b779be21cb225e441a08c8af37bfa36df08f76866424305c895629a340750cb20cd5ac8883434aaa1e264adc8c6f615e1af5d32b03b", [[], [], []]}, 0x417) sysfs$1(0x1, &(0x7f0000000740)='jfs\x00') ioctl$sock_proto_private(r2, 0x89eb, &(0x7f00000006c0)="3674cf150213f3305f7a09d0f2ec8ec72bc968e3f333a9eea586ab69095b9a3132edf5d48e5923013650d78ea968392bac566ae25c4f11dbd3712bbff599418f774d9b7d31a5a4f1eb15777cb07cc962a033cea7e74dda94ad18be") bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r2, &(0x7f0000000180)="d01e2bbf3865446e2bcd650b108b5dbf79405e7e3737f798bff3d8df350a36e360feed2c2d330d4d3ed00efaa5313088a0eaa132ce2e2641cc64fcc3999b956f385b090e2f06aa2dec626e8cd093bb9382ad409e4c688ab5d7c94da31b78c3ebaa79e51dd41a48063edd5172b9c45c77df02dfb865d6d510d20197fbefefc3bd230ec8bf69e388040ca273f381ea3110e831884f89c8688932b837b5af9ae1c14d4f", &(0x7f00000000c0)=""/112}, 0x18) 05:57:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:37 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xebffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:37 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x3f, 0x0, @thr={&(0x7f0000000080)="ae66d2ed91690f44c7bc17c872c6ce0cffc7516e1d0c4ff8efe41d3e96eac8", &(0x7f0000000180)="f30e10250136c2466277a42ee7bef7117ed6d2030b7fb7128a729b071a8547c1b1d3c924ff09a3d2e6936aa78d577bfe5634a66b542ba5ab4e3b29edf2465e3eb3bd7f726c8e86ced715afd083501a2b6aa6b7eed267a0f79defe5f00cfdd899cc90105e65effdeced58e1060acc06f5893b527319a1ffd222e6311d58ecfb105511a1cadcb820877f3849aeeff646913393346b684f46f72745cfcbb651abae807176010a5e9a74a6c62705c5cb8c443fc2c1bb5d5a6ad74d46194735dfd5a11ab24bcaa7f6266de6c34961cc79b9d757a5203de5a478e9f3331b8b6c3e24f644ad33839897c91070f7b74bfece30fa7dc6"}}, &(0x7f0000000100)=0x0) timer_gettime(r1, &(0x7f0000000280)) 05:57:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0x2, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:37 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x20000248, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x0, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:37 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000340)=0x0) perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x0, 0x1, 0x3, 0x7fffffff, 0x0, 0x8000, 0x10180, 0x1, 0x9a, 0x8, 0x4, 0xfff, 0x10001, 0x3f, 0x2, 0x81, 0x7, 0x1, 0x5, 0x3, 0x80000000, 0x0, 0xfac, 0x79d5, 0x7, 0x1, 0x0, 0xfb87, 0x6, 0xf3, 0x4, 0x3, 0x3, 0x4, 0x4, 0x80000000, 0x0, 0x100000000, 0x1, @perf_bp={&(0x7f0000000280), 0x2}, 0x4002, 0xe1f, 0x7, 0xb, 0x401, 0x8, 0x3f}, r2, 0x10, r1, 0x1) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x73d9, 0x2, [0xfffffffffffff51d, 0xfffffffffffff492]}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={r3, 0x20, &(0x7f0000000100)=[@in={0x2, 0x4e20, @rand_addr=0x8001}, @in={0x2, 0x4e24, @multicast2}]}, &(0x7f00000001c0)=0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000200)={{0x3293, 0x9, 0xf7a, 0x3ff}, 'syz0\x00', 0xa}) 05:57:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x20000248, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0x1b, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x0, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:37 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1200}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:37 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x406) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:37 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x20000248, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:37 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x34000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x9}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x0, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x3f00000000000000, 0x0, @loopback}, r1}}, 0x48) 05:57:37 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 05:57:37 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x206) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffff000, 0x402480) bind$netlink(r1, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfe, 0x8000}, 0xc) 05:57:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x1000000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:37 executing program 0: lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 05:57:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x3f000000, 0x0, @loopback}, r1}}, 0x48) 05:57:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xf5ffffff}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:37 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x261c}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) 05:57:38 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x80000, 0x0) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) r2 = getegid() write$FUSE_ENTRY(r0, &(0x7f0000000240)={0x90, 0x0, 0x1, {0x2, 0x1, 0x3, 0x1, 0x101, 0x7, {0x3, 0xfa, 0x0, 0xfff, 0x810, 0xbb67, 0x0, 0x6, 0xffffffff, 0xe000000000000000, 0x100, r1, r2, 0x1000, 0x7}}}, 0x90) fdatasync(r0) r3 = socket$inet6(0xa, 0x3, 0x6) r4 = msgget$private(0x0, 0x20) msgctl$MSG_INFO(r4, 0xc, &(0x7f0000000300)=""/106) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x10001, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f00000000c0)=0x8, 0x4) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000480)='jfs\x00', &(0x7f0000000440)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x10da080, 0x0) ioctl$UI_SET_MSCBIT(r5, 0x40045568, 0x26) 05:57:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x3f00, 0x0, @loopback}, r1}}, 0x48) 05:57:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xa00}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:38 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:57:38 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) write$cgroup_int(r0, &(0x7f0000000180)=0x359bad67, 0x12) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) connect$unix(r0, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 05:57:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x3f00000000000000, @loopback}, r1}}, 0x48) 05:57:38 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'icmp\x00'}, &(0x7f0000000180)=0x1e) 05:57:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfc00}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x3f000000, @loopback}, r1}}, 0x48) 05:57:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfc}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:38 executing program 0: socketpair$inet(0x2, 0x4, 0x3ff, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000580)={0x0, 0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, 0x0) r1 = getpid() openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='\x00', 0xfffffffffffffffb) keyctl$reject(0x13, 0x0, 0xfffffffffffffc00, 0x8, r2) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) openat$hwrng(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/91) flock(0xffffffffffffffff, 0x2) unshare(0x200003fe) unshare(0x28060400) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000002c0)={0x6, {{0x2, 0x4e24, @remote}}}, 0x88) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000000440)=""/167) 05:57:38 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x10001, 0x7, 0x9, 0x400, 0x9, 0x6}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x0, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:38 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x12}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x3f00, @loopback}, r1}}, 0x48) 05:57:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x9000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:38 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x0, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:38 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x2000, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x100000000, 0xca, 0x0, 0xf, 0x16, 0x0, "e2ce18a4da492a386a92d26841a114f7b0bce733b6f4cf1e97c84814fbec6bcf2bdf7dbb63a8ab753d6018774d8f4e45dd369821b134d23ff2eb1c6e92795b71", "1abbce09f7d7541e19749b8875e9ab782220fd5e12dae083b331bf20cc5e5e778283373b933eca3736cea3012b21a28e91af1555ab8acef60e063c2c21e927bb", "6b89f484ca85f4c772cc9e8e5e517fe32c2afa67904c5e2c6c8b078a1c376b33", [0x6, 0x4]}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:38 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3e80}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback={0x3f00}}, r1}}, 0x48) 05:57:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x8000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x0, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:39 executing program 0: socketpair$inet(0x2, 0x4, 0x3ff, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000580)={0x0, 0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, 0x0) r1 = getpid() openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='\x00', 0xfffffffffffffffb) keyctl$reject(0x13, 0x0, 0xfffffffffffffc00, 0x8, r2) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) openat$hwrng(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/91) flock(0xffffffffffffffff, 0x2) unshare(0x200003fe) unshare(0x28060400) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000002c0)={0x6, {{0x2, 0x4e24, @remote}}}, 0x88) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000000440)=""/167) 05:57:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback={0x3f00000000000000}}, r1}}, 0x48) 05:57:39 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x120) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) 05:57:39 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1200000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4000000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback={0x3f000000}}, r1}}, 0x48) 05:57:39 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc0000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:39 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = geteuid() syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x2, &(0x7f0000000100)=[{&(0x7f0000000180)="089bc2a056036fec88d54a551399f21b90f5b518ef8e170208de391265f65680e9c26338dbfbb5b8148ba578309505ed1fd60ea79c6514022a7e5ac1356e0cf523ea92e62963f83238d6de05c8aa4e3ca68dfa5229706146a7352905de384c974a7f050bfd22b35a1a4142b0eeb026c7e8a44466993a72786156ccf6c15c681e663732b2067a0f121679fd02c747e178d8394d3ca5790861306e9083be446f829c7a929bc6a0aeb21239e84ec45f9b78b4ac591342a89461594499265ad441a862fb6a15c070b9e5718cf3f2d4a66668e8d88dde41d7b25298c2", 0xda, 0xa5}, {&(0x7f0000000280)="f72184dcd1c14b1ced65df29c0370bf930a9496edaf05f0ad227db79e65cbb8fe6d582455d91d97da55dd873849b153a2cc25a8287ce6684fec15f8b7ccf7ceaff04", 0x42, 0x2}], 0x42000, &(0x7f0000000300)={[{@usrquota='usrquota'}], [{@fowner_eq={'fowner', 0x3d, r1}}]}) ioctl(r0, 0x1c79, &(0x7f0000000140)="0a5c2d023c126285718070") setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v3={0x3000000, [{0x4}, {0x80, 0x3}], r1}, 0x18, 0x2) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback={0x0, 0x223}}, r1}}, 0x48) 05:57:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x5000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:39 executing program 0: socketpair$inet(0x2, 0x4, 0x3ff, &(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffffff) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000580)={0x0, 0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(0xffffffffffffffff, 0x40086200, 0x0) r1 = getpid() openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='\x00', 0xfffffffffffffffb) keyctl$reject(0x13, 0x0, 0xfffffffffffffc00, 0x8, r2) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r3) openat$hwrng(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000000c0)=""/91) flock(0xffffffffffffffff, 0x2) unshare(0x200003fe) unshare(0x28060400) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000002c0)={0x6, {{0x2, 0x4e24, @remote}}}, 0x88) prctl$PR_SET_PTRACER(0x59616d61, r1) r4 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r4, 0x0, 0x2, &(0x7f0000000440)=""/167) 05:57:39 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x40000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:39 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000180)="2000000000126205000000b4fc19206bc356bbcf1ed47aba8270ab3f8d4d6759f133295799ab106228239bbdb10a6ec2bead52952f0c4402c860bfb7bc1ba9910fd5e62d32a0e36472e407131b85a2e9fb12f2b7ce9be57d04d33cc07df18f1adab33d0ca3c7ece8f7a86f50aa6d6d480b54ba9f9c468fd6b5f9e27b7b423d5b714cab157e5ccc5d042ca73495d6529a997b31c18b0cc1ed4d8f69e7e665e586362451767a7f42105db7746a0476fbf4c59a9fd777fcb5a7e11973468a") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x8001005, 0x1ff, 0x1}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x85) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f00000002c0)) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000240)) 05:57:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback={0x0, 0x300}}, r1}}, 0x48) 05:57:39 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xff01}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 790.854574] QAT: Invalid ioctl [ 790.911116] QAT: Invalid ioctl 05:57:40 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1004000000016) 05:57:40 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0xffffffffffff82a5, 0x309040) 05:57:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback, 0x3f00}, r1}}, 0x48) 05:57:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x0, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x700}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:40 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf0ffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) 05:57:40 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) 05:57:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x0, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x3f00}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:40 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3f00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback, 0x3f00000000000000}, r1}}, 0x48) 05:57:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback, 0x3f000000}, r1}}, 0x48) 05:57:40 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x48040, 0x0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000180)=0x1) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000000c0)={0x2, 0x5, 0x7, 0x8, 0x7f0000000000, 0x7ff, 0x2}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x688001, 0x0) 05:57:40 executing program 0: rt_sigqueueinfo(0x0, 0x20, &(0x7f0000000040)) unshare(0x0) semget$private(0x0, 0x4007, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x8020400) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) getpid() request_key(&(0x7f00000001c0)='dns_resolver\x00', 0x0, &(0x7f0000000280)='\x00', 0xfffffffffffffffb) keyctl$reject(0x13, 0x0, 0xfffffffffffffc00, 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) 05:57:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x7}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x0, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:40 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffdef}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfc00000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1, 0x3f00000000000000}}, 0x48) 05:57:40 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) 05:57:40 executing program 3: r0 = socket$inet6(0xa, 0x4, 0x401) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x452400, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000680)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0xd0, 0x1c8, 0x1c8, 0x1c8, 0xd0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x3e0, 0x5, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x98, 0xd0}, @SNAT0={0x38, 'SNAT\x00', 0x0, {0x1, {0x2, @local, @multicast2, @gre_key, @icmp_id=0x67}}}}, {{@uncond, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0x20}}]}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x12, @remote, @dev={0xac, 0x14, 0x14, 0xd}, @icmp_id=0x64, @icmp_id=0x67}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x10}, @broadcast, 0xffffffff, 0xff000000, 'veth0\x00', 'ip6gre0\x00', {0xff}, {0xff}, 0x7, 0x1, 0x5}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x0, @local, @rand_addr=0x8, @gre_key=0xcb2d, @icmp_id=0x68}}}}, {{@ip={@multicast1, @loopback, 0xff, 0xffffffff, 'syz_tun\x00', 'bridge_slave_0\x00', {0xff}, {}, 0x21, 0x2, 0x4}, 0x0, 0x110, 0x148, 0x0, {}, [@common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0x4, 0x1}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0xff, 0x1, 0x1, 0x1}}]}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0x0, @rand_addr=0x6, @empty, @icmp_id=0x65, @port=0x4e23}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d8) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil}) 05:57:40 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3ec0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1, 0x3f000000}}, 0x48) 05:57:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xc3ffffff}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:41 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1, 0x3f00}}, 0x48) 05:57:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) 05:57:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x7000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:41 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x80000000) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = getpgrp(0xffffffffffffffff) fcntl$lock(r0, 0x26, &(0x7f0000000080)={0x1, 0x3, 0x429, 0x7, r1}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000780)='/dev/audio\x00', 0x4080, 0x0) unlinkat(r2, &(0x7f00000007c0)='./file0\x00', 0x200) getgroups(0x1, &(0x7f0000000580)=[0x0]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000006c0)=0xe8) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x5, &(0x7f0000000500)=[{&(0x7f0000000180)="b7f9ebd7cfd998e57434274cecce17a65234ae2127f3f865177f40005b0fef1c4c55655e497c8ad3241535331da1ba3309ab50f967ae5be03b837577105d179c6103e2b4d10219c7c84fa0b7ed4db64b16362d977073291c8748eb0b2a685b24f0dc730cc4f61f04a9a90d1dccce73227a824d21cdba2f0b5ce0efcad6d41056f9fa18ade28e14ceafe9c1121a4048083e95441522c799f7581f1d83ea137cacb0c691b8d9fc2a7bf96954", 0xab, 0x9}, {&(0x7f0000000240)="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", 0xff, 0x8}, {&(0x7f00000000c0)="eaa8671935996cc6082cdff6bacacbe4f795687a9e18d210818bfd0fe5bf016752e5e3c23aa6db4543452d51a4155168428646e449687a3b4c440c3391c57d645ee12e90cacb63ccf7616dece135702e5f857b04fce389758d80444e509ec884520a0e24e6c7ddf0b2bdd2acee9793a8f86ca8a71365d029f1934f8e", 0x7c, 0x5}, {&(0x7f0000000340)="ab4898367aa31dea59fc229e92c95899cc4c0c336ff73b134c8022136195b95c9feea43b031dc696949c1d9cc0b4c385603aaf7b44b991d959e323bff342133a1c7dc4cb1ba6f115a1a76428da6b007029bb0a8c8f31c8a40af35e657aaa47ce8898499989fe3b29822a69eac1aef83cf8d81cde21756ff8613d8826965e8a333ef09dbcc566eb5ee7e25cd96c25f7c533e8a8bbe749564dadb1ead628c5e75f3f4faf6ecb0b9a38e09ef98eb15013f7fe0283ae19da875b4f193e0da988600a31f8c614", 0xc4, 0x7}, {&(0x7f0000000440)="4176cdb264668322384ccc56253c9a62df11d7841711242877a65d9295aa596b5605c98c012e165666dadfaf07d6f73a973ad8d809236f1c8df76146dcb915767b8e3c3cf81fcbaf38f55f050046a0017544881262c12793d111a307175deb8670d13c37d3683f23ed1a94f61d887bc65592a320af6eab81e6fd2afe53226cf0ab160774bcb2bf9edb5da0c9a1aaee93b6178cd50b278236ad17d9ce76ee5f9ad7b14141c52d19e46d7448c3feae3875e987fa2164d3cccba1c1daa7", 0xbc, 0x5}], 0xa48061, &(0x7f0000000700)={[{@gid={'gid', 0x3d, r3}}, {@part={'part', 0x3d, 0x100}}, {@nobarrier='nobarrier'}, {@nodecompose='nodecompose'}, {@creator={'creator', 0x3d, "365a9e5d"}}], [{@dont_appraise='dont_appraise'}, {@uid_gt={'uid>', r4}}]}) 05:57:41 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf6ffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x7) 05:57:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) 05:57:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xa000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x200002c8) 05:57:41 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:41 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x100000001, 0x0) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0)=0x2, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000100)=0x800, 0x4) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@int=0x3ff, 0x4) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x0, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfec00000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) 05:57:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000340)) getcwd(&(0x7f00000000c0)=""/68, 0x44) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x401, @loopback}, r1, 0xffffffff}}, 0x48) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x15, "f84fc14ba2b017b4a35f2a2cdebeb4d741f0127bd2"}, &(0x7f0000000140)=0x1d) arch_prctl$ARCH_GET_CPUID(0x1011) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000180)={r2, 0xec, "e0c0f7b0eb9f9d542968b2742abe39bae68d5939c1af4c4de44c7f5a6ae1e74ebdd7a4c6f0e8173ec0fe6b10947752f05fc6b65cf0f929a87512387916b215b0b0395e93f5b67f0848d17eeb186e5d545e9aafa744b2262874f46e338ed595181570daaeb21f402df2af36eeaed06399fd1b10e4feb37ba0cca8fc371a162989a72ecfb594c17e8efc376c14ad7cb8846d569b01f13e05edd22258c49cfc8b85d20133daaf53579d639531a0b167ab773cb99a46b1baa4b72bd30a3fa51f7bafe0fafdb55364688f8ff06831edc905c0d7534f3b9dedcdf86b913bb04227c6aef36e774f385fd82aba6fe234"}, &(0x7f0000000300)=0xf4) 05:57:41 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x600}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:41 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x17, 0x0, 0xfffffffffffffffd, 0x0) 05:57:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xc3ffffff00000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x0, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:42 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1c26}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:42 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:42 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffffffffff000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x0, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) futex(&(0x7f0000000000)=0x1, 0x81, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xa00000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) 05:57:42 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1100000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:42 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2400, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xef99}, &(0x7f0000000180)=0x8) r2 = getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000240)={0x101}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x1454, 0x3, 0x8203, 0x3, 0x6, 0x3f, 0x5, 0x9, r1}, 0x20) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x0, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x48) 05:57:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xff00000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:42 executing program 3: r0 = geteuid() ioprio_set$uid(0x3, r0, 0x8) r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(r1, 0x1000008916, &(0x7f0000000100)="0a5c08003c126285718070") r2 = dup(r1) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x2400, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1, 0x17, 0x1, 0x10, "93b677db0cad9795605f23e468b442bbd73196c659fecadd8e0cbe077f4d6498c244926a3a4074f70d23bbe2ab51bf830b76317b5c1aeafaf22b3acb50b418a0", "3954a92abf08a78dd4d151e5237b48867c0a8b445b220758e1153b881c5767f1", [0x3, 0x8000]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x1, 0x1) getpeername$netlink(r2, &(0x7f0000000080), &(0x7f00000000c0)=0xc) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000240)) 05:57:42 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2b5, 0x20000) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f00000000c0)={0x0, 0x6, 0x8, 'queue0\x00', 0x603}) socketpair$inet6(0xa, 0x5, 0xae4, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) 05:57:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x97d60000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:42 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x4, &(0x7f0000000280)="0a5c2d023c126285718070157a5fdc3c4e52537bfff4b241dd03cc2fd62f722556288649acfcb57be09f484b496c01177661db74522843461f421b3109dfbe94e7a88e798ed131d9ce11748e134845493a099035f9f52271ef691d31178befda850d4ae098bcc50f60020055f33dd8ccde437e5a403d5e817385418235b5423ea8c2c721181982682c918081730f9c63eb27dc5a6ed041ce63f4f4d45c12f28c32c94657963e31c11588c193a2fa0aa6fba5819e194e64ac411700518c2ae2de910a65e35bfc21373baf7a98dab2348d9132882da3d61b30b2a8328e7a00000000000000000000") getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) socketpair(0xb, 0x0, 0xfffffffffffffff7, &(0x7f0000001380)={0xffffffffffffffff}) bind$bt_sco(r1, &(0x7f00000013c0)={0x1f, {0x9592, 0x4, 0x5e, 0x0, 0x7f, 0x3}}, 0x8) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000240)={0x57, 0x6, 0xfffffffffffffffe, {0x0, 0x7fff}, {0x7fffffff, 0x40}, @ramp={0x9, 0x100000000, {0x6577, 0x6d, 0x3, 0x2}}}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0300020000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="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"], @ANYBLOB="07000600fcff0700050000008a00000008e2812c3abda9c6a7aa2ac47c13e549e679a378067437431f227fec64437b067ac2cb13cfd4ad0f6d8717209d2994b375d69717d06e8ac4affcf003c7dd3134aac114997bf8f88ab46e41c46201eede48c97c77de14e43a44cd018ed3b6c9d6d5a39641ccdf4c18ea43c03323d82d51f9ea985dedfa"]) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:42 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffff000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 793.772516] Unknown ioctl 1074022600 [ 793.824339] Unknown ioctl 1074022600 05:57:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x6c800000, 0x16, 0x0, 0x10, "83bbe3e23f241de4c386d2ed4a5bafdc955c122a9389eb42c8fff45519646d52752552bfb635a06d9bad72829ce3ba8ae9ca5c5d7b4c9fbc9e9ab9a3a760bc07", "15270d472c1cdc7b5c23a9323d04f24ec54c8455970782242ac1b3fd83553ba0", [0x9, 0xbb4e]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0xffffffff7ffffffe, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xfffffffffffffffa}}, 0x20) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000040)=0xa8, 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x80, 0x400, 0xffffffffffffbd49, 0x3, 0x2}, &(0x7f0000000440)=0x14) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r4, 0x5) 05:57:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:43 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf6ffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x10000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:43 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0x9, 0x400, 0xff}) accept$inet6(r1, &(0x7f0000000200), &(0x7f0000000240)=0x1c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x100, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000380)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000500)={{0x7, 0x6, 0xfffffffffffff87b, 0x5, 'syz1\x00', 0x6}, 0x1, 0x8, 0x7ff, r3, 0x5, 0x6, 'syz1\x00', &(0x7f00000004c0)=['jfs\x00', 'jfs\x00', 'em0bdevmime_typewlan0\x00', '!\x00', 'jfs\x00'], 0x24, [], [0x2, 0x400, 0x5, 0x20]}) socket$inet6(0xa, 0x3, 0xc) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000280)) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/93) rseq(&(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x2, 0x5e5d, 0x80000000}, 0x1}, 0x20, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000006c0)) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e23, @broadcast}}}, &(0x7f00000000c0)=0x84) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000400)={r4, @in6={{0xa, 0x4e24, 0x6, @remote, 0x9}}}, 0x84) alarm(0x4) 05:57:43 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3f000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x1002}}, 0x13) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20080, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x1, @mcast1, 0x10b}, r2}}, 0x30) accept(r1, 0x0, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$RTC_PIE_ON(r3, 0x7005) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x4e20, 0x0, @loopback}, r4}}, 0x48) r5 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x100, 0x8000) setsockopt$inet6_int(r5, 0x29, 0x10, &(0x7f0000000100)=0x4, 0x4) 05:57:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x100000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x0, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:43 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0)=0x6, &(0x7f0000000100)=0x2) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:43 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x1000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x0, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:43 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) fallocate(r0, 0x12, 0x8694, 0x9) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x8}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback, 0xfffffffffffffffe}, r1}}, 0xfffffd5d) 05:57:43 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x33fe0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x0, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:43 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0x401) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:43 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@ethernet={0x0, @dev}, &(0x7f0000000000)=0x80, 0x80000) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000140)={0xda3, 0x0, 0x8000}, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:44 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x200000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xffffffc3}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:44 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x82) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000180)={0x3, @raw_data="6bf99c06204fd26846a43fc3f66306342b4eeb42f0435ad3d8a710243cfba1d4b0b0682f557aef91580d6b16df78ec595620eba24692810f495cb3c0f61464c4dd974b926b8c0b795b7ed0fe68a2fa41aefb9bcec02c96452a46ec4fdda939d0a901cd631c618011a90a1065e9c47cf81479b90c95c1ecf8d6742a3a3a3c74444752af569e92f7291dc46101ba2926131ffdc486dea0b6ca2999d18c6d47211e1641be1668dd63b163effeafe3bbaeb8735e3546bf0d012a08cf5c878aa6f8eaca0fe23ad76508a2"}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xa}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:44 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xe03f0300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:44 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) prctl$PR_SET_FPEXC(0xc, 0x800000001fffc) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0xffffffffffffff8e, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:44 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = getpid() r3 = fcntl$dupfd(r0, 0xeccc6afa5828e726, r0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000080)={r3, r0, 0xac0}) 05:57:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x500000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)={0x2001}) 05:57:45 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x20040) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1011fffe}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x14, r2, 0x200, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x48) 05:57:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:45 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x880, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) bind$bt_hci(r1, &(0x7f0000000100)={0x1f, r2}, 0xc) 05:57:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xffffffff00000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:45 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1100}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x97d6000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x0, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:45 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0xfffffffffffffe9e) 05:57:45 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xffffffffffff8000, 0x200) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) gettid() gettid() 05:57:45 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 796.508892] XFS (loop4): unknown mount option [logbsize=]. 05:57:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000021ff4)={0x2001}) 05:57:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x500}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x0, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x31) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x200, 0x8000) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000180)={0x5, 0x0, [{0x8001, 0x1, 0x0, 0x0, @irqchip={0x80000000, 0x1000}}, {0x0, 0x3, 0x0, 0x0, @msi={0x7ff, 0x2, 0x20}}, {0x7ff, 0x0, 0x0, 0x0, @irqchip={0xff}}, {0x481, 0x1, 0x0, 0x0, @adapter={0x2, 0x40000000, 0x5, 0xffff, 0xce0}}, {0x3, 0x3, 0x0, 0x0, @irqchip={0x9, 0x8}}]}) 05:57:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@rc, &(0x7f0000000000)=0x80, 0x80000) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x8001, 0x0) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000500)=""/4096) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{}]}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:46 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfeffffff00000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000000c0)=0xfffffffeffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x5) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) fremovexattr(r0, &(0x7f0000000100)=@known='system.sockprotoname\x00') [ 797.152553] XFS (loop4): unknown mount option [logbsize=]. 05:57:46 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x0, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xd697}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = msgget$private(0x0, 0x1) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) write$P9_RREADLINK(r2, &(0x7f00000000c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) msgsnd(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0xd, 0x0) 05:57:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000021ff4)={0x2001}) 05:57:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)) 05:57:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x3}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 797.442190] XFS (loop4): unknown mount option [logbsize=]. 05:57:46 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:46 executing program 3: r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000100)) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000180)="433c7847b95811f91401d8bf10791cfe18e6db30030b846c55857ad7960770dd02cf0945c68150d63890528fdc0d2e7432fa498dab03b67a3adaa11f92fceb5cd4068d18217b829cb8ff03ee3717710be0c6f1b3bb585cca7302bfb0296f8bc2f1d9c05d755f1e9f70978bb18d501280ac61aca5c9af06279b40235294314d9001f8aec8ec8dbb83f3efddf18c381b50f6984bd7e20737a6f83f4e2f49949c6d519fa89828ad76790b") r1 = socket$inet6(0xa, 0x3, 0x6) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f00000000c0)) 05:57:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x20) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f00000000c0)={{0x7f, 0x3}, 'port1\x00', 0x90, 0x110801, 0x1c9, 0x2, 0x0, 0x5, 0x100000000, 0x0, 0x4, 0x400}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) 05:57:46 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x100000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:46 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x3f00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:46 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x72b600da29d56129, &(0x7f0000000340)={@mcast1, r1}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000400)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={'teql0\x00', {0x2, 0x4e24, @local}}) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000180)) socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="9a5e6ef9000215"], 0x6) 05:57:46 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x7, &(0x7f0000000500)=[{&(0x7f0000000100)="bcca7e540d980babe5c01d712aec2a94b4cda4f2256a8650dcdc2cb475610fb700f5008ccb68fd90d5f92df58a51939fb371b50c9e51b032fc71ca97", 0x3c, 0x3}, {&(0x7f0000000140)="ac54bfff7971b0ec3507ce87a15b9cc68a851a043552e16f9225b6de7026f2bc16aa75b5343612b4370c756df7006045778dca50637672a7a48d8a2ea6d0b4d4dfc3997b060976361d29ae1d7c2972e3c46357db2dacd7e58370c435a61442d36e9dd14ed47215760054cff147cb5a49f7c0e85c7ea50b0bdcb13a2c9a740fc6c80c9a84acd431af4b99706c071afd0f5f7f55909eeb804d4de90e8431e18b5c7e15c1918f4499be7c45e6e51be3d949acb0b24948f2116f5f6ce3dc9b7710a266866724c64971ae92ad8a8b85ac80645f211b", 0xd3, 0x278}, {&(0x7f0000000380)="1581b7494e332eaa180116a26d4d2c31f09f35cc7199f42206ae69606c22dbbe78667d784082728c18c6d04a7169871b3655bf652f3b4bf13d438eb70ebc10f86679f2dbfa966da793c92c432188414fa0009ecfe9d3e66b037bb95ca376b961457626d8ceb1ef", 0x67, 0x4}, {&(0x7f0000000400)="e48396d180e1d6c415b9fe70d31fcacdadf9fce3fb53ac38241eee7f2c21e90f799ad63e26418d23b1a89cc32cb7955f2314ab811fe9899b15ca2216ac23e1476841eba06df8273a086c5ac87a4c88e87f58d7d08921450326af4d", 0x5b, 0x1}, {&(0x7f0000000480)="e5f0566f04338b6f7cb6976aa9f038faaa8137a6f2b09116323bd07592ef8464232b2b35c88434b3d7e89092699ca075faaf1773a1e0d3e5c214f0b69ed0e90aee5c5161f33670af9fb546a858aa56591dd01c2e18e04f55acd69cd5a7a59dac9a129f1a169a9c2ddd686322c2cda6", 0x6f, 0xff}, {&(0x7f0000000240)="b15bb4b9a33951c5c50a6c174681e64983c07ea1a530404245a18c6a38e764bb65307143ad36156cd3fb83c5297fe4eb", 0x30, 0x200}, {&(0x7f0000000300), 0x0, 0x8}], 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) write(r0, &(0x7f00000005c0)="6e76ff5e1251d7c77f9f8d9255d1b74258e8bb50fb392d02562474f1f8acb4d9fe8b3dcabb3aae0fed38f6bf7f3092a34011e391e6a3faa564a9cbbb95ec782131d287326ed6dd7b22e1b2b85ef4405308fe85f2b7eb3a9a370355f378f88f4e2e36213d1882afbf8af973eaf337cf4c3009e487342a03d5a4bb73090f97c9317fbf651061d9c52301ca964adb662384c5b4485d328c8f3dc63933677ccde0622942661c3608b9844114bd3d7925813a", 0xb0) [ 797.986108] BFS-fs: bfs_fill_super(): No BFS filesystem on loop2 (magic=9683e400) 05:57:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:47 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1c260000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x6000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:47 executing program 3: r0 = socket$inet6(0xa, 0x80000000003, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x51a, 0x3f, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 05:57:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) 05:57:47 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0x800, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:47 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x8}, &(0x7f0000000240)=0x8) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000180)={r1, 0x1000}, &(0x7f00000001c0)=0xfffffffffffffd3d) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x3dc, 0xfa00, {{0xa, 0x4e23, 0x0, @mcast1, 0x7}, {0xa, 0x0, 0x0, @loopback, 0x4}, r3}}, 0x48) 05:57:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x2000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:47 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000100)={'bcsh0\x00', {0x2, 0x4e24, @loopback}}) 05:57:47 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:47 executing program 3: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={0xff, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @rand_addr=0x4}, {0x2, 0x4e24, @loopback}, 0x80, 0x0, 0x233a, 0xffffffffffffffff, 0x8, &(0x7f0000000080)='yam0\x00', 0x8, 0xb2a9, 0x9043}) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000240)={{0x0, @loopback, 0x4e20, 0x0, 'ovf\x00', 0x18, 0x8, 0x76}, {@broadcast, 0x4e24, 0x4, 0x1, 0x1c000000000, 0x7}}, 0x44) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000000c0)={0x4, 0x8}, 0xc) r2 = socket$inet6(0xa, 0x3, 0x6) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r3) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:47 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x300}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:47 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) fchmod(r0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x3f, @loopback}, {0xa, 0x4e21, 0x5, @mcast1, 0x7}, r1, 0x80000000}}, 0x48) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200001, 0x0) bind$llc(r2, &(0x7f0000000140)={0x1a, 0x118, 0x6, 0x1d4, 0x0, 0x9, @broadcast}, 0x10) 05:57:47 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xc0fe}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:47 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x4000000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:48 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x101, 0x0) recvmsg$kcm(r1, &(0x7f0000001280)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000180)=""/160, 0xa0}], 0x1, &(0x7f0000000280)=""/4096, 0x1000, 0x3}, 0x10003) 05:57:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0xbfafa409a0adeb9e, 0x0) write$evdev(r2, &(0x7f00000000c0)=[{{0x0, 0x2710}, 0x0, 0x0, 0x1}, {{0x77359400}, 0x1f, 0x4bdc, 0x1000}, {{0x0, 0x7530}, 0x14, 0x800, 0x40}, {{0x0, 0x2710}, 0x0, 0x2}, {{0x77359400}, 0x1bbb95dbae643bb0, 0x4, 0xfff}], 0x78) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfe80000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:48 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x600000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x3aa, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80000000, 0x80000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1, 0x7}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) 05:57:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x200000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x13}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={0xffffffffffffffff, 0x6, 0x1, 0x100000000, &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) syz_open_dev$dri(&(0x7f0000000400)='/dev/dri/card#\x00', 0x5, 0xa0000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x400000000000000, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300)={0x0, 0xaf, "f8beccdc299e4eb532bdc2635d594a94546a2097df44368496ceedb44f4dddcb3f2ca25c9bbdb33e1ebf9d447e34a93b268cc5f09ea29c3b5a6dd66f061c1af16c53cc6a747501d7b8c046640d40b7eb151d5371885d376f931f9806f9ed2f476e2bdd6e1760259650014236f541d6fef568fb90825a89f8d13d314e921a4764903292bf6ba368cd963381670e76c9f92616515cfbffb37f6209937f99b0c0f8db4df1c3999930ce3bc9f3eb4afa60"}, &(0x7f0000000240)=0xb7) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000003c0)={r3, 0x8000, 0x1f, 0x3}, 0x10) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000500)=""/184) r4 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f0000000100)=0xfffffffffffffffd, 0x4) 05:57:48 executing program 3: r0 = socket$inet6(0xa, 0x4, 0x7) ioctl(r0, 0x4, &(0x7f00000000c0)="0aa1b3ab74cdde217ac40100888798e3053645b1532b4bbf69e5201d6c55d953bba57e38eb648907b75ce63c7c56816505c5c11c69ce323ea1f4eaec5ba321a7f8") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x3, 0x4) 05:57:48 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:48 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x3f000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:48 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xe03f030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:48 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = semget(0x1, 0x7, 0x200) semctl$SEM_INFO(r2, 0x3, 0x13, &(0x7f00000000c0)=""/225) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:48 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d773c126285718070") 05:57:48 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x3000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:48 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:49 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:49 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x14, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {}, r1}}, 0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000140)=0x30) 05:57:49 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @mcast1, 0x1}, 0x1c) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x10001}, 0x28, 0x2) 05:57:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:49 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:49 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfe80}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:49 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xffffffeb}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:49 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x60, 0x800) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000200), &(0x7f0000000240)=0xc) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x800, 0x400) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000300)={0x1, 0x5}) getsockopt$inet_int(r2, 0x0, 0xf, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000000400)={0xb8, &(0x7f0000000340)="1c25dfda3932f840b9597e7273f91e7deb8db23c5d392cfd19f33a4c65be346f2c90a8f6a2faffa9d9a7c889d601788cfb81ea1c6086b59cf1b300255ecc3623ddf039a3b0fe7e3f6d8052742965f7b4a26f495216eb0b9a1e8ad99f82a72bc90a099d137f30b82cd7e711fa3b0c281032df5c0058c1af057cc8333dbd79cf28b059595c8744d8bdba15d559636fedcaca48016458ef9b7cbef384c144de6b74edfc4d09cd68d474c705e1fcb53875e422c91fdefe044539"}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x48) 05:57:49 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x3f00000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:49 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x10001, 0x40) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001200)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}}}, &(0x7f0000001300)=0xe8) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffff553, 0x2, &(0x7f00000011c0)=[{&(0x7f0000000180)="96af12e7fe6c7ed261a6eee7176545c0abc3c5dd8a3f19a0b1fe3487c8b4fa8990c0891ccd8a932555779d92eb85ae9ebb64d23cd099a62ab6e49cc5477ceded24c42632baea397f0a67cba7a3b670cb00bf95e0286d0f84192c6a3a9ca09409e10ffc057f8d137d0e0a495d897f1fd69c34d84959e8fc2ccc2231393386c74dc7acbc7c7146a282ed36a2f68fb3981bdf76964391170ac17ac8c2589bad82aebc7968b58704b130e8749e9365dd652e84ab4e0b442fb357038d4c566dd81237a8ab91fb5d9c5e8dbdebb4fcd26eb74b9a01bab73201d9f9038fd60807042a2382b367421ee5d580f98ddb4092a1a20427e81ac131e8c9021710d04e4d50951ceb28abfde5375631c411163577349c88bdde8a3b184b49254f7eb5edd8de20b7688f945a4ba23f5efad7aec761cd02c3097eb0259f3557e9a656453038dd4c8494bc82b95fe971743d5da5214ce05ff2246a76afb8d81b5d2a84ab6557ac0a9b16c0286c0145da645d6de80fb9d58cf992e9c658ebbb0969ff730f0f1fa6e8ee09dad6cc3345439f4d741aa95e363281942fab6ee8e38655c4c045528a5c2415a36fbce2811e8d8f43d3b5cd04ddaecae0b4d5e0c816ed617454307be5487129cf8713225086df13a5190695204b50eda6ca5d6008ca97aeb09cf8eb9b6b21bd668b2fcdb8a81acec35a150ecc14ed6ae8798360aad93e8f8a269cda013a50312229cde0265a016eb81dca57cafa19631fbc586af56041eab8fabeae6d097529f0416d8e39e7e86e265143e302610cbc19a58b7f2d4951a9c199ce9d61718c897de4ad236c02458b4d7f2e1cf9d4f4fd1c04efd6263386818fde58d112c362f6a23651741b37aa7d03186bc3cb9c6db65edb9db2ab1ae58b6292f5b0c4b35e1cb91b0594e27fe05ee09c06fb94ce44a352db17a766d96ff984e93962264b245646bb616659216291bc8f68e809fa2825d43950e44f91a2a7bcae0e516d99e68fd9dcb9546ddc94fc6bbdb1b9fb041f0d5da7d06c0a4cb2ac35d752391ce799189a6247cfa7aa4c85e45293889e33870133fccec1e4c36a949686b3b0bb4fc3a9e3512e0b645c0a270428ba01b86669d5dc71351110dab205fb0474372fdc31c20fb0b8b60654eefed66cf7911d24540f2aabf99f9013e0ebfefd5a4ae72d858e6f80e7a96503c94a369dda613f0375b37297a6df0b36055c9c1dcd7b6d8ff0df25c802d50e7d644a92a514d006ae4b20d52d7269c0655dfafcb90643a1ec54d546f336e855eb79e062115a567ec677689b6941a5c93a6887b526cd3fd9e052d860d4957691d74ead572a0b8643853e48c1bd6a1a3f757f8c1568f5bf9514963ee5fca5512a29f50014a4bec727fa937978a035a50f7645936f7bcdd15fe4f228e8347404b14eecff215080b1704e692e4846d130b22e00114629a51de5c3482b70efde4fdf7152ad684c54b88d6919a45eb831f72152bd7e7b34a49f4a2a8f385def948597efee571e0299948280cad88c6c11c0809e029e9ace5892fd3ee1bb9a5a78b148abe1a446130b265fd5976d07f2e19283a4925471d377db9c8f3498dc4078cd390da4bd796674977687f2109c7e33f7354f681d44515481da7bd73c6242bbac51a8d3834b3f9c08a5aea86d7ad1726332a6943a7a31afbbc80a50f54c498dada70fc5b606e343c613cdde6fdd50abbbaa1758de8caffb1d49a67ce17f12328652e9f283a5802bc15b02caf51a82af516c10b458930955827a86164c947e341724f0d526307676619fa4884504ffdbdbdd214871e95ab3a7fd94a5afe9a9ac2b5215bfbca0ae12ae180de81d64c0d42ee082180f5b769ec25274f9f381180c9fd3b54e293c2dee9fa36a38ede02d5c9fd24a9c242f713cb67c1c99643bd43cb96bcd23e6f12e57f7c6844015b7691b5c75b240782bf9c3c776227f7abf35fe46ee8dcb967d2bd5304205651009125188a8eb12a0c1ee9da474a74902c054353a4c234d3e8a3be371a52e8b02e75be24cbf3294d180a68a84362a3c17ee627bd766fbf1cbd75493eebe3ebdc38cf32898e4ad6b62d3d45eb15504ad0438e025b9390f61eb84a08002cb95c7510ef27cf2ebafe4ef3dacc4cdadb0d811e8506b043de5f0176aed60d349f2eeb2b6d623fe518d788a4dfdb54f42f17de81a99766cb22ccf9f9bf4e1f72d3cdd666d54c4eca0d1a1d525956da8c3ae4ccd190a12fe57d6822db4193ec5bce5ed7294b6bd1c161949bea409fe4e839693202255310eedbf49bd75b023ac04e64ae1ab0c04eee86bde6a10964b3cba0eafb00496b8facec75fa8c47fb251308fc6de33f12c1f98ac0b47cb21cb1f5ad23ec2009d98e978964331a35b8220243f80d66fd215b5d84ec2e80de2cee0b087ea255c5f0d2af7a0d6dbe58ccde959cd98430acff4fe7cf950629e4f302f7ef2d69a0305c062a6886ae5c8486cd538481449826bd75b08a12da63dd8215a7da3d22994ca9ece9bbf332f2ed9b4697b561d52e25ab49eaad1206a4819a928de99e73bfb4384cb0d17437f6d90c4c91d21615b39c55521840b0a5b4f97112b9ea91d5c799fdb16d5935547555156c9ab8da36650c85b7e0f0c2f1636099bb94cd23282f1c9cee20deb4079341b6b9df20bdb9720fe300f2f3531321828572041aa95348a57385604a8287e1823456449a32b1471d8c4997ce7d7bb1f624104c52a8347f63f9000d5e7d64774b9c16e8a92c01ef05c3c6a3315bb72a3df12ff3cbda3bbabab8c8083fc35b31664da9465f09ca28e77bc82dc371802d5a853430cd84857790816e38b4790cd8d747f7334e303dfac558d694db9292cd366ede07d824ad59eb7a5247e56dfb7e1204ac78909a5ba8476165e003091b4d6b95dea94b76e0cb55e321b999b9df7bfdb0868669b5d742f24dc687879791753cc4219cdca25993b5f7e8e31e5f78ffccf99ddc065fa2b4ff691c6c6ba8392f31a1e0479839f8cb6bccd9964ff23990497dce4ab3b85e85814c7206f86758d77ea6aae8f6ff4f531966be33cfed4cc27fa20845d1e1103884f43d928a67d4d1486cb08129571451e84d71c70ff148bd55e28fdeab29d17feb45ca6191fa67a50730745051db2e273226a2a2a7dd23022c68c17e5869f4ec7af9a74eb6166454962a194a315a1a13847728a4a3ce0dd8187fa84d2d3b67b48a628ae90978f5bef5893da4572a6037d443e05ff91ebcc885686111ffd59baa7b36d7e72413fec9ab001fa4f732e021a91a00effd70b7640a3a3b7b82cfb79dcaa5cae15eafe3c47f00a865b3d366179ef8682f1e25e4260bfa27a62e214a80413ba87305e8b35671e291781938e8ef5edc42d86faeab16ca8839a5b97d681e76b5a786a846a6bb2adc0ba7e9276812bdddfd437b305e31e3bb488cff0cb2ebb87b8efef475a24643925be2d7a7a8ba26366196d7dedd39e6b4f7696b6fcc10e7a03e6289f154b94701774d01c348ee0cc9669915a98db95bc11fa51e0b5d3e1a3319a605bb0eb5979e7cdc17bbb29a600069e1c13e07f688ec6eb38cf29137afde1ef7221f8003fc28cbfae551aadbbd9a6fe9666de0415b0c71d6c06919660baaf721abb038eac9a55c3cfc3b804653433f07aa7f45651744466ebec15bd79d6147d4618d9e01f94e6af9000847481f28de8f6a5b78cb0c7633f6a5e1de3b60759d43c1b0f32a84da01ffdadb7b260aa3739de0f156d56b1e6b220274d13050c4cc55d17afc06bc9931852c9a48bdf1986f414087c2a47ba162656dc07a6a50746584eb1cb59b060558152f489068d3a15e9d4e6d656f3fe17e62328a6c981342a2cd3f010e1edbd70c9fa3542b27edb1367e64b391ae27155c3af55048da3a7ec06ef07e810c5006aa06945d6e6694c876d983428d8e579fd44ebd27e4379ead92e449a61f4053497d980a9144897521a51ee87accd5e67c076724c6c1961177fc01d3ce12f771df6cd3a1ee904b8cae4d9f0edeb265538b13b4a6e1280b300a81f52e1ed3eb9f209e77c8c8d4e05ec615eba26f55a681918b983477bcd1aaaa11e7f8501a6e544a1a9b210629a28f50c586528e897892f5fc01c56675f65cd28a97a1dfcaf1d57ac35264f2967a5a51b4c9c698ef0630e814b444d4280353cc89bde1244c31a514171638d3d80962c8a373badf32b1952dbb763669d8e1948c145485f1c3d751d169879b2b79cb74661b027bda27c8a7157cb61d0b7291ed8547eeb51b7ecc7a22cd45626d62f6b837c24baf5ea074c798839913473916d223b76b4f3588c110b382bbf665d20a7df0446ac326d006055aa2d907d6a22c39a3842f104d2413d76db9093a7da4de5f881111ab61777ec881747aeeff2caa8ea644535a0d9459f3c0573b60598b980ba9ec533326055cd80dd41b6a5a0084ce6dbd37fb227351df4d9c60f9ef436a6c1a838855e891657ad620daf43a7c355d867271469b69432def32e83d45acd9399bea3516f744e2462be97223c0da33db9236164764aae8449be114cc8c2c473c324be41969ef58b7d91abd08070f387ef01c6524adf9c79b971d9651b18fd395081a0555dcd72ef5bcf36c0c6c6bca8040cbfc8d67e0d461d89aa95055c9743a4cd6887677bfea6dec983b05dcc7c36b1dbcad5854e9b68a1fbdb2e1b3b01cc830b105d8b4a4c8b28f15b53652fdf55d20cd836bd145bbdd01ea562d32fe9fed7021f8e2a1eb5b393398be597347df4d2fe711803c6dd775629818d84d65b173058fd795d79bebe9d81f145354911a45ae9e3609427658964595eeacbee375a6638c95a2c7f859cdd6b4b127cb7564e2581c674668e01334e7a9d2c9848608e3ab15815ff8f0ccde31a3d9d96550ecd3cb811843eae2d412d493a24b08b128f9f17dd885ad1b2c79c024158c796dd6f15e2a444433c84392c2643bc331b98e8944867ee3be268ccd87a8e2fcc7a7ecb61fafcbe520deaca9c91f686ea2d6b62c350a82956c6e11bc769cef8d88691d30b40ab7acb2a9550e84f2d10eedd62a8c1e81677c9b167ed43595f42cba954498dc9547079c8bf69a1c16a0e0a01e726b7823396d9399ecc159c7f7519fc4ec25255ed704616e658e0688fb1bcc79f0171f6b866030a13570090bab60116447e53a60df1d2ea8ac9f7c84057a355f0f1a8a09615cd9488ba3491eadb55eeb1d293a929ce2d6ebdfb786dfef3edc99c4ecf379c7c8cdd7a8a4b95288c1e63f14bf27fe7f9ee452f49d356d043364fd5c86b02ec43e4947bad1e6e00e0c4b8d7f96b739790af8feea6a16312df4dfe3c9f184d6703cd5a94319b3ad68664f6717050bc5cd0a5cf1447bf07fd628a990e188a054b6c32a0314c8933b332938d6b258625b51f73054b2bdad9b597ba9dfa55f8ca824119c1b513e19320ae81e26551aa873b6157662a215f1dbf7a5bc9e3a5cb2e1fb13debb81a39d88230d4c7aaec32764b0a14e67fbc56bf3285d1b040f28fbadc54eb44bdc4226419ec7d38fe51dc3bcc3eb59e72b552dbbfd5f103e2c78a6303983b1f75b3bb531ca68783abc2fd81d75329295259d9d9f4bd0b3eed88d4b23854ece2215135035396276bbd6f4d414f9f436955d1b3cc23ad637a7a21a3f0f94472ad04cccac49c058c47f42fb24f62806b4a1ddf077d59cccefc123e3134cdc30f352ccc12ed768e96a34d6220dec1cd92cf8ee2ab38666fcfc484ab22a8d25c60b19df861fda594b898664ad19b898a1a5fe15e96c35763bda61d0b3d63ad10f025cde72e1b327d2d980c0f379d0ec57e9dfbe239245053ca1aca", 0x1000, 0x7fffffff}, {&(0x7f0000001180)="9bed", 0x2, 0x1000}], 0x80, &(0x7f0000001340)={[], [{@audit='audit'}, {@uid_lt={'uid<', r2}}]}) 05:57:49 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x2}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 800.895503] FAT-fs (loop3): Unrecognized mount option "audit" or missing value 05:57:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:50 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:50 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa00000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x300000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:50 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") creat(&(0x7f0000002d40)='./file0\x00', 0x1) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000002bc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KVM_SET_ONE_REG(r2, 0x4010aeac, &(0x7f0000002c00)={0x400, 0x6}) r3 = memfd_create(&(0x7f0000000100)='user.,]\x00', 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000180), 0x4, {0xa, 0x4e22, 0x1000, @ipv4={[], [], @multicast2}, 0x8000}, r4}}, 0x38) r5 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x2, 0x2) sendmsg(r3, &(0x7f0000000380)={&(0x7f0000000300)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x61, &(0x7f0000001680)=[{&(0x7f0000000400)="75550afc193eebd3cd2c785462eb189eb08f12681915c1eff65636ee525bdcd9903b2c970c844c2727de20befa4c90faba160ec228985d66d2b032485c18496a31445cf21c0b12", 0x47}, {&(0x7f0000000480)="7327a76f8231cb491deba4af324eb1b1a3c30740361ea89b8f59664cdd2c65ae65eea707a4581faff0dd531e66a78da608cf14a23f5ee95d9db701de0da59b8129ff4de2", 0x44}, {&(0x7f0000000080)="4e136ea55bc535eb38cd23d8bd1422af3d49b83c75147e276372182ed3d1bd4b980392cc", 0xffffffffffffff69}, {&(0x7f0000000500)="c1ce9223c9cc58021e6c32acadf579cf837f7b79cfe6aec4885241cee45169efaf2d08708b4fc3bad4754f7ef44f0b02e0c21f9917d5a2134103ea39740450f85257e90ab416ef1a257cfbeb6417ce9a8a88c810b429cb9dbeec99", 0x5b}, {&(0x7f0000000280)="dad820592252e9a78ae18b224f3a1f6ec1f14e63b47617c098b77933", 0x1c}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="67f2b383bb82d2a96ea5dd484fb9e5e57b01a6ccba80227c15f359292c4b01c204e366970782ccc2d4bc7371795a46991764010d01daee977b070eccc1b87a7ad41983eec72f64086a24f3cfb4ec05539ed4dbe273669601ab25a70308b76215f28787807c27fe9aadbed85bbf789211621d70bb0cc1ece8b8fe0a460e2edfec6dda249a1b70574559ccb5abb474e89f3fbb649a1a9af6eaf7913ec4d0937859ef8daad3f139b1e78bc353f8512be65f3054bfb953f6a3e6e475ae4457dbe3367a25c016b5e7155dc78a17774dc3f477bafdcc73c99a9ea49586577624ed806896f7f054d1b1c90f1eb746c37de668b5f6a2a02112501efe6348c5529207", 0xfe}], 0x7, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x14b8, 0x4000000}, 0x10) ustat(0x10001, &(0x7f00000002c0)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) ioctl$sock_ifreq(r1, 0x89f7, &(0x7f0000002c80)={'bridge_slave_0\x00', @ifru_data=&(0x7f0000002c40)="3d9081f61d6d724b2f082585c49d84ee07d5b3e00e1b014e7bfb7809d5ef9abd"}) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000002d00)={0x10, 0x30, 0xfa00, {&(0x7f0000002cc0), 0x4, {0xa, 0x4e20, 0x4, @ipv4, 0xff}, r4}}, 0x38) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) 05:57:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x40000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:50 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1c26000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:50 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write(r0, &(0x7f0000000000)="4b1c2a6696c54e4f4cb142b6b5e20619b783e57be183cb650a6b31535fe3b5c076a6", 0x22) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @mcast2, 0xfffffffffffffffe}, r1}}, 0x1d3) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) sched_setparam(r2, &(0x7f0000000100)=0x1000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x1) 05:57:50 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfc000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:50 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c010085718070896330a1c1a20be0574d9d24a17713be983ab19adc126793db78f326aefd066491") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:50 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x400000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x23, "94e7686c758110f7f15841cb501dc91dcde3397a278d0db2100bebef96981e7878125a"}, &(0x7f0000000100)=0x2b) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e21, 0x7fffffff, @loopback}}, 0x6a, 0x8001, 0xffff, 0x5, 0x40}, &(0x7f0000000200)=0x98) 05:57:51 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:51 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfe800000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000000c0)={0x0, 0x4, [], @bt={0x20, 0x5, 0xff, 0x461f, 0x7, 0x19, 0x10, 0x2}}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) 05:57:51 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000000225d, 0x1c5, 0x0, 0x3, 0x0) 05:57:51 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040)=0x800, 0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001200)={0xffffffffffffffff}) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000001240)={'filter\x00', 0x50, "df20ea847ba4a3b63c6485a89bb73eb3ebb589d6769367b906425f1f8868aac478797fbd75419642f5e3b617d269145079eafb949283df92fd18016946462be2b0d95e1b0620eb49ede7b2f7ab9dc106"}, &(0x7f00000012c0)=0x74) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8000) uname(&(0x7f00000001c0)=""/4096) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20) chmod(&(0x7f0000000180)='./file0\x00', 0x20) syz_open_dev$evdev(&(0x7f00000011c0)='/dev/input/event#\x00', 0x3, 0x50000) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2e9, 0x0, 0x20000000, 0x0) 05:57:51 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:51 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xff010000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:51 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r0}}, 0x48) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x24000, 0x0) connect$vsock_stream(r1, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000000)={0x1, 0x1, [0x1, 0x0, 0x7fff, 0x79b9, 0x0, 0x1ff, 0x7452, 0x7]}) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f00000000c0)={0x1, 0x81, 0x0, 0x0, {0x1, 0x0, 0x80, 0x6913}}) 05:57:51 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x400300}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0xfffffffffffffe39, 0x0, 0x4000, 0x0) r1 = dup(r0) ioctl$KVM_SMI(r1, 0xaeb7) 05:57:52 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x802, 0x0) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f00000000c0)=""/115) 05:57:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x5}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:52 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x11}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:52 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x97d6}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:52 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffff6}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:52 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x20001ff) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x400, 0x0, 0x0, 0x0, 0x0) 05:57:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}, 0x7}, {0xa, 0x0, 0x0, @loopback, 0x9}, r1, 0x40000003}}, 0x48) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r2) 05:57:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:52 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ppoll(&(0x7f0000000240), 0x0, &(0x7f0000000300), &(0x7f0000000340)={0x2}, 0x8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000200)) sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r3, 0x5eb1dfb3d032e369, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) 05:57:52 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x11000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xff00}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:53 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x301000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f00000000c0)=0x2, 0x8) r2 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) prctl$PR_SET_PDEATHSIG(0x1, 0x24) 05:57:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:53 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e0000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:53 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x80000000, 0x202) clone(0x2102009ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresuid(0x0, r1, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, &(0x7f0000000640)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000680)={@multicast2, @loopback, 0x0, 0x1, [@empty]}, 0x14) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x10, 0x0) socketpair(0xb, 0x4, 0x0, 0x0) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f0000000140)={0x0, "42fe9edee042be5273d08831dc33b92452d997e4b0a3a8df791f4d0b03459c3d", 0x0, 0x0, 0x4}) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x4e21, 0x0, @loopback}, r5}}, 0x48) 05:57:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x600}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 804.165612] ptrace attach of "/root/syz-executor2"[6081] was attempted by "/root/syz-executor2"[20877] 05:57:53 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xeffdffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:53 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x5, 0x4) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 804.227065] ptrace attach of "/root/syz-executor2"[6081] was attempted by "/root/syz-executor2"[20877] 05:57:53 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) 05:57:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x80fe}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:53 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4), 0x0, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:53 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xebffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:53 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:53 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x253, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) sendto(r1, &(0x7f00000001c0)="6149a22ae9510b39fe7683bc7d33a9e127984cd3be0555e1e1024d0e", 0x1c, 0x8000, &(0x7f0000000200)=@ipx={0x4, 0x9, 0x0, "0e736f44564d", 0x9}, 0x80) syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x4, 0x40000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) 05:57:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x700000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:53 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xa00}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:53 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:53 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:53 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x900000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = dup3(r0, r0, 0x80000) sysfs$3(0x3) connect$pppoe(r2, &(0x7f0000000100)={0x18, 0x0, {0x4, @local, 'veth1_to_bridge\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140), 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f00000000c0)={0x4, 0x2, 0x0, 0x5, 0x1, 0x3, 0x1, 0x20, 0x5, 0x7fff, 0x2, 0x7}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:54 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:54 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xfffffffe}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xff01000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:54 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:57:54 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x40030000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xff000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:54 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:54 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x12000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x10000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:54 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x500) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x0, 0x4) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4800) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f00000000c0)={0x0, 0xfffffffffffffff8, 0x0, 0x400, 0x0, 0x2}) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8) r6 = socket$netlink(0x10, 0x3, 0xe) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r6, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b0000000d39fee3f58152e4f28271a4d8166aaf44d36e865fbd81a0be221eca4e3fa30e5fe236fe0f7000bd47bda61d9e48da91165ae84fd41788292b3cc92ca3641814999fb6d1d07e21b6eaac755d8392a41ff17445705217fd0ff1a834b7404d7c4ed0746e46f0c9f0477363b1ca911ce667b8d9610da6388f4afca5199dd292f9d5636fea5e121512fff91c744", @ANYRES16=r7, @ANYBLOB="00032abd7000fedbdf250400000030000100080004004e2400000800050000000000080008000700000008000100020000000c00070003000000040000000800060008000000bf988d92cceda3cc4a08000600010000000c00020008000b000a00000008000400040000003000010008000100020000000800060072720000080001000a0000000c000700270000000400000008000600736800000800060001000000080004000010000008000500ffffffffefe8decf1110cb7f93552d9920"], 0xb0}, 0x1, 0x0, 0x0, 0x40000}, 0x48044) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r5}}, 0x48) 05:57:54 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x2}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:54 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:55 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)={0x2001}) 05:57:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:55 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xf0ffffffffffff}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:55 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0xc03e000000000000}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x9000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:55 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @local}, r1}}, 0x48) 05:57:55 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xa) ioctl(r0, 0x1000008915, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0xffffffffffffff59, 0x0, 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, [], 0x1e}, 0x81}], 0x1c) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x200400) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f00000003c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), r2, 0x3}}, 0x18) 05:57:55 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x803e}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:55 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x10000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:56 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000440)=0xe8) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x80000000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000000180)="ef5897292388a2763db2a0278452117b2250304cc654504542ecce089debb3e85f4c0edb3173a148a8f94b6ae73c1f6d9279760ad0287612b9f3bc7b9685a350e3e0c4cd984c226aab83b8", 0x4b, 0x6}, {&(0x7f0000000100)="6f9a241a509b5e1253ea0280b0b8164500b9cf4fede682e739f8551726245fdfdf2966934149c8791e9e7a83", 0x2c, 0x9f5}, {&(0x7f0000000200)="88298329a83f618e78aae26e0c310115ccad19d88a75e0e86ffa640b64b185d6132b378084bf0202c822a6fc8d29f046cdd57c7e625c984d12b3cba3aaa89a23b44991f44f4cd489ced78146518af32d59394cf5383c73221a11c4099175af0be2b0853762002631", 0x68, 0x800}, {&(0x7f0000000280)="77167e12bc444d2e", 0x8, 0x3d7f}], 0x4000, &(0x7f0000000480)={[{@noautodefrag='noautodefrag'}, {@clear_cache='clear_cache'}, {@rescan_uuid_tree='rescan_uuid_tree'}, {@user_subvol_rm='user_subvol_rm_allowed'}, {@nodatasum='nodatasum'}, {@check_int_print_mask={'check_int_print_mask', 0x3d, 0x4}}, {@clear_cache='clear_cache'}, {@subvol={'subvol', 0x3d, 'jfs\x00'}}], [{@fowner_gt={'fowner>', r1}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcs\x00', 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000580)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 05:57:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffffffffffffffc1, 0x101000) 05:57:56 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, 0x0) 05:57:56 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x600}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1, 0xfffffffffffffffe}}, 0x48) 05:57:56 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:56 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:56 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socketpair$packet(0x11, 0x8000000000000000, 0x300, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x80002) 05:57:56 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:56 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x80, 0x4) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000140)) ioctl(r0, 0x3, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffe97, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x20300) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000280)={0x9, 0x0, [{0x976, 0x0, 0x53d}, {0x359, 0x0, 0x8001}, {0xbff, 0x0, 0x298c}, {0x32f, 0x0, 0x100000000}, {0x3a, 0x0, 0x8}, {0xbff, 0x0, 0x7}, {0xc4011b7d, 0x0, 0x101}, {0x89d, 0x0, 0x1}, {0xad4, 0x0, 0x8}]}) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000180)={0x80000000, 0x7, "c31b71293eabd8dd92a9c945a6be796db5fd6ad601f7484a6b76cbcbfd651f84", 0x0, 0x8, 0x5e1, 0x30, 0x5, 0x2, 0x5, 0x401, [0x7f, 0x2, 0x0, 0x9]}) 05:57:57 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)) 05:57:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x500}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:57 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffa, 0x200) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) dup2(r0, r0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:57 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 05:57:57 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:57 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfe80}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:57 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:57 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440)}}, 0x20) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1, 0x2}}, 0xffffffff, 0xf79}, &(0x7f00000004c0)=0x90) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0xc0200, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)=0x8b89d10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r3 = socket(0x1e, 0x805, 0x0) r4 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) r5 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000280)=@req3={0x80000000, 0x1}, 0x1c) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) sched_setscheduler(r6, 0x2, &(0x7f0000000140)=0x3ff) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0x94) sendmsg(r3, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000, &(0x7f0000000000)={0xffffffffffffffff}, 0x400013f}}, 0x236) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r8}}, 0x48) 05:57:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:57 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x1, 0x8000, 0x5}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)={r1, 0x8}, &(0x7f0000000180)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x300}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:58 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3f) pwritev(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)="996d9127d58bf633fdad39f90d70675850c9452193b7d2174304dc445fa8e8206b749a77fca94dce12f37a2db45526efa19e9328a9f5ebc2a6ada4fdc8183b0921be859db09a04da916c7a5d1566afeeb85b787c43098b2cb2401f0b10cfd64cefebd5673212cadf566226b8838da893dcf6f2b5cb5884f7f52e98c86bafcda70b7351117560ae2e1a9c14c4e5a4ee70719040006cbe08", 0x97}, {&(0x7f0000000180)="95cae84bed9727232d5fd62631ebbb5541b0a5cb4b96ad27700395cf23bcf1fab26d0a0f9ad095e7961f02232de2d44051c8bc97a081363cd4cdc0b2c2edae698745e7bf6bb6cc22c409b0418c66672bdd10045cd4e3dfd5a03382a5d1aa8879077252e6fccfd2126dd33ef5d5c9d9cf13752a81c0918efe19192c59215f108790e2806ea65dbc9fe6db9c4f2f42c8c4d1166d7467b267d68ddaf8f314f9b580f537f836971b2a1b9f62196238d42a77cd10d9c58df450b79fc1470f0ee33c0834993a7a891ff98cf9f811e62a74f63296367e822f6735e1b01cb4daf3ac7d0a9094a38ead3eafee21d5e449b10358772d", 0xf1}], 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:58 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x3, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) ioctl$VIDIOC_S_PRIORITY(r3, 0x40045644, 0xfffffefffffffffd) 05:57:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) 05:57:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xffffffc3}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:58 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:58 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x40000, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000100)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x10000014c) openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r1, 0x7, 0x3}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:58 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x101040) accept$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) sendto$packet(r0, &(0x7f00000000c0)="5c5712fe5ba252cbbf3dcb41dae23af9165f51ba44a9796d1e94eb306fd1c91a25d6cb75ba5806392ea3117dacfdb4e437b38473e3efe4c47de5c096106117400df14d20412b40f1d6b48a9d89e8b68f4ddf6009d67109d2b73bcaebc3f4ad0f75d652fa0b4238e7642b3bdcb16170f8d1f27aa4c960d7ebcc2abb8c3138e1bc5095c3b1b8c69edb3d7b4491e45bb8d1cae14a3c920390d93a8182f983406c40aaebd354883bade27edc6c9b1fab217459bec3e7db1030dc90e68dce7ffc96b602105dff08a3d99758a7391610", 0xcd, 0x4008011, &(0x7f0000000300)={0x11, 0x6, r1, 0x1, 0xdcc9, 0x6, @local}, 0x14) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x48) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="9f000000c495bc1aeb56e9abf5986459a709f5c540164f2c5553a495defc3ce3b0ec6cc6bad1d9153a1a123ddbfddeb3d03e01da0a945b4996e2ea6302f57d394371183179c735a3438abab09d355eb98a8619e51b77486e2bb98079d28c0a1dbe22e20775221dabef22568947b44f1c7e7508542d68c677452fd4c1167fbca834454e769bbf396932cb1188e45e3b2a995c4c568985c9485c3451e23d7dd50bea7111836d0b2e6dde9890415ff6e9fd24910000000000"], &(0x7f00000001c0)=0xa7) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000400)={r4, 0xada8}, &(0x7f0000000440)=0x8) 05:57:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:57:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xff000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:58 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f00000000c0)) 05:57:58 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:58 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, "6e72300000000000000000001d00", 0x2000000004}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) 05:57:58 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xa0482, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000000c0)={0x80000001, 0x9, 0xe4, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, 0x0, 0x0) 05:57:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x800000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:58 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:58 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) rmdir(0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000400)=0x7fffffff) [ 809.906814] EXT4-fs warning (device sda1): ext4_group_extend:1786: will only finish group (524288 blocks, 256 new) [ 809.948841] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted 05:57:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800, 0x0) 05:57:59 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r0}}, 0x48) 05:57:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, 0x0, 0x0) 05:57:59 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xff010000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:59 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 05:57:59 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:57:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f00000002c0)={0x6, {{0x2, 0x0, @remote}}}, 0x88) 05:57:59 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x40000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:57:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:59 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, 0x0, 0x0) 05:57:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) 05:57:59 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x8000) ioctl$VT_ACTIVATE(r1, 0x5606, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x1, 0x0, [], [{0x40, 0xfffffffffffffffc, 0x2, 0x9, 0x80000001, 0x301}, {0x57, 0x10000, 0xd331, 0x6, 0x9}], [[]]}) syz_mount_image$jfs(&(0x7f00000000c0)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:57:59 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xffffffffffffffff}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:57:59 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfec0}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4), 0xc) 05:58:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) 05:58:00 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000180)=""/39, &(0x7f00000001c0)=0x27) socketpair(0x1d, 0x7, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) write$FUSE_STATFS(r1, &(0x7f00000000c0)={0x60, 0x0, 0x3, {{0x40, 0xfffffffffffffffa, 0x7, 0x4, 0x9, 0x470, 0x5}}}, 0x60) 05:58:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00000000c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) 05:58:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:00 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4), 0xc) 05:58:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) arch_prctl$ARCH_GET_CPUID(0x1011) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:00 executing program 3: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe) 05:58:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000017c0)=[{&(0x7f0000000080)="400000000002000019000000dc0100002c000000010000000000000000000000002000000020000040000000000000003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 05:58:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4000000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:00 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x8000, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000000c0), 0x2) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4), 0xc) 05:58:00 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440)}}, 0x20) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1, 0x2}}, 0xffffffff, 0xf79}, &(0x7f00000004c0)=0x90) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0xc0200, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)=0x8b89d10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r3 = socket(0x1e, 0x805, 0x0) r4 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) r5 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000280)=@req3={0x80000000, 0x1}, 0x1c) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) sched_setscheduler(r6, 0x2, &(0x7f0000000140)=0x3ff) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0x94) sendmsg(r3, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000, &(0x7f0000000000)={0xffffffffffffffff}, 0x400013f}}, 0x236) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r8}}, 0x48) 05:58:00 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x500) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x0, 0x4) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x4800) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f00000000c0)={0x0, 0xfffffffffffffff8, 0x0, 0x400, 0x0, 0x2}) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8) r6 = socket$netlink(0x10, 0x3, 0xe) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r6, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="b0000000d39fee3f58152e4f28271a4d8166aaf44d36e865fbd81a0be221eca4e3fa30e5fe236fe0f7000bd47bda61d9e48da91165ae84fd41788292b3cc92ca3641814999fb6d1d07e21b6eaac755d8392a41ff17445705217fd0ff1a834b7404d7c4ed0746e46f0c9f0477363b1ca911ce667b8d9610da6388f4afca5199dd292f9d5636fea5e121512fff91c744", @ANYRES16=r7, @ANYBLOB="00032abd7000fedbdf250400000030000100080004004e2400000800050000000000080008000700000008000100020000000c00070003000000040000000800060008000000bf988d92cceda3cc4a08000600010000000c00020008000b000a00000008000400040000003000010008000100020000000800060072720000080001000a0000000c000700270000000400000008000600736800000800060001000000080004000010000008000500ffffffffefe8decf1110cb7f93552d9920"], 0xb0}, 0x1, 0x0, 0x0, 0x40000}, 0x48044) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r5}}, 0x48) 05:58:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xa00}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:00 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x82d, 0x80800) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000240)={0xfffffffffffff001, 0x7, 0x200, 0x6a, &(0x7f00000000c0)=""/106, 0x1000, &(0x7f0000000500)=""/4096, 0xf7, &(0x7f0000000140)=""/247}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) 05:58:00 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xff00000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:00 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:01 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000021ff4)={0x2001}) 05:58:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xff01000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:01 executing program 3: prctl$PR_SET_SECUREBITS(0x1c, 0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000440)}}, 0x20) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast1, 0x2}}, 0xffffffff, 0xf79}, &(0x7f00000004c0)=0x90) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer\x00', 0xc0200, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)=0x8b89d10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) r3 = socket(0x1e, 0x805, 0x0) r4 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) r5 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r5, 0x10f, 0x87, &(0x7f0000000280)=@req3={0x80000000, 0x1}, 0x1c) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) sched_setscheduler(r6, 0x2, &(0x7f0000000140)=0x3ff) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2, 0x3ff}, 0x94) sendmsg(r3, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000000480), 0x0, &(0x7f00006e9c68)}, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x200000000, &(0x7f0000000000)={0xffffffffffffffff}, 0x400013f}}, 0x236) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r8}}, 0x48) 05:58:01 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xc3ffffff00000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000021ff4)={0x2001}) 05:58:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13b}}, 0x20) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x300000c, 0x30, r0, 0x46) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x100000000, 0x200241) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:01 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="2e72236118b9c604a7686108500d803db893a4a5d3e41d26982c8ef641083ba0b15995e5fc31aad9a0ec1239fa36645129d6d1276eba54750067a854ba50aba74d3328c48540afc153e90e86ed85ad1ef501397259a4a9be32b38504e47931aa517b6d76b8f6b8d41b92298c0c9ef8622bc2ad5a65a30ae63e4896f647876f01e4c3fb3a4eb2cf69514476c164e8b3bd95224dc4337dc5d64d98eed1e700ed92e9558287f7ab2b514199044f6b090c258a84417c2c9a30e3dcdd421edd3eea74a42f81b007459f110b2a09df334b3b", 0xcf, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, r2, 0x7, r3) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfc00000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:01 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfe800000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x9, 0x90800) write$P9_RXATTRWALK(r1, &(0x7f0000000140)={0xf, 0x1f, 0x2, 0x5}, 0xf) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xff, 0x10000) write$P9_RFLUSH(r3, &(0x7f00000000c0)={0x7, 0x6d, 0x2}, 0x7) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)=ANY=[@ANYBLOB]) mkdirat(r3, &(0x7f0000000200)='./file0\x00', 0xc0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 05:58:02 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x6000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:02 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:02 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x6c800000, 0x16, 0x0, 0x10, "83bbe3e23f241de4c386d2ed4a5bafdc955c122a9389eb42c8fff45519646d52752552bfb635a06d9bad72829ce3ba8ae9ca5c5d7b4c9fbc9e9ab9a3a760bc07", "15270d472c1cdc7b5c23a9323d04f24ec54c8455970782242ac1b3fd83553ba0", [0x9, 0xbb4e]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0xffffffff7ffffffe, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xfffffffffffffffa}}, 0x20) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000040)=0xa8, 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x80, 0x400, 0xffffffffffffbd49, 0x3, 0x2}, &(0x7f0000000440)=0x14) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000200)=0xe8) ioprio_set$uid(0x3, r4, 0x5) 05:58:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20400, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x10001, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000100)={r2, 0x7ff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x48) 05:58:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x700}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:02 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:02 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f00000000c0)={{0x0, 0x3, 0xfffffffffffffff8, 0x0, 0x7f}, 0x1, 0x5, 'id1\x00', 'timer0\x00', 0x0, 0x53, 0x21a7, 0x9, 0x4}) 05:58:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) 05:58:02 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl(r0, 0x4, &(0x7f0000000280)="0a5c2d023c126285718070157a5fdc3c4e52537bfff4b241dd03cc2fd62f722556288649acfcb57be09f484b496c01177661db74522843461f421b3109dfbe94e7a88e798ed131d9ce11748e134845493a099035f9f52271ef691d31178befda850d4ae098bcc50f60020055f33dd8ccde437e5a403d5e817385418235b5423ea8c2c721181982682c918081730f9c63eb27dc5a6ed041ce63f4f4d45c12f28c32c94657963e31c11588c193a2fa0aa6fba5819e194e64ac411700518c2ae2de910a65e35bfc21373baf7a98dab2348d9132882da3d61b30b2a8328e7a00000000000000000000") getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) socketpair(0xb, 0x0, 0xfffffffffffffff7, &(0x7f0000001380)={0xffffffffffffffff}) bind$bt_sco(r1, &(0x7f00000013c0)={0x1f, {0x9592, 0x4, 0x5e, 0x0, 0x7f, 0x3}}, 0x8) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000240)={0x57, 0x6, 0xfffffffffffffffe, {0x0, 0x7fff}, {0x7fffffff, 0x40}, @ramp={0x9, 0x100000000, {0x6577, 0x6d, 0x3, 0x2}}}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0300020000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="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"], @ANYBLOB="07000600fcff0700050000008a00000008e2812c3abda9c6a7aa2ac47c13e549e679a378067437431f227fec64437b067ac2cb13cfd4ad0f6d8717209d2994b375d69717d06e8ac4affcf003c7dd3134aac114997bf8f88ab46e41c46201eede48c97c77de14e43a44cd018ed3b6c9d6d5a39641ccdf4c18ea43c03323d82d51f9ea985dedfa"]) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:58:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) 05:58:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3f00000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:02 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:02 executing program 2: socket$netlink(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x480000, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000100)=0x1) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r3 = dup2(r1, r1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000000)) 05:58:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0xfffffffffffffdd7) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:03 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 813.932507] Unknown ioctl 1074022600 05:58:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3f000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:03 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x7000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x5, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:03 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = getpgid(0x0) syz_open_procfs(r0, &(0x7f0000000200)='net/ipx\x00') r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) socket$inet6(0xa, 0xa, 0x7fffffff) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x2200) ioctl$BLKPG(r3, 0x1269, &(0x7f00000001c0)={0x3, 0x5, 0xe7, &(0x7f00000000c0)="3b399179f85ee1a8e6718fa0b95bd12466e7e2023207734d7ab3951a6ebf6231f8ed6d5de8f376d426c6d941f900d0b7ace8c1c51959e0ecd1267c7090689724ee0ee3cf2ccabb1dc989804b246bb6dc4ff316c30f7349749d427bf30a7b3339eb735c3d25aff898151f4642903b6fb98f52ecfcaf454b3eb2fe6da40063e9904292089e8d1dfe4a0fa5617dbf1d38d66e9bebed35f91f7ec4b2f5a62860dd7cc4ca62f048c23c96c7ff63a282c3bf62f9c807ac7ddfa0609241f86c37d85b716ea5d52755c704c7838ebbcfbd492f32abd15533dfd23f60fb55d83f3d24bf3a4920e81ebbda0c"}) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 05:58:03 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x97d60000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:03 executing program 3 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:03 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:03 executing program 4: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x1c26}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:03 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x132, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x2000000000000000}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:03 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x5, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:03 executing program 4 (fault-call:5 fault-nth:0): r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 814.757295] FAULT_INJECTION: forcing a failure. [ 814.757295] name failslab, interval 1, probability 0, space 0, times 0 [ 814.773009] CPU: 1 PID: 21841 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 814.780439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 814.789814] Call Trace: [ 814.792403] dump_stack+0x244/0x39d [ 814.796023] ? dump_stack_print_info.cold.1+0x20/0x20 [ 814.801211] ? debug_smp_processor_id+0x1c/0x20 [ 814.805872] ? perf_trace_lock+0x14d/0x7a0 [ 814.810111] should_fail.cold.4+0xa/0x17 [ 814.814164] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 814.819270] ? lock_downgrade+0x900/0x900 [ 814.823422] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 814.828968] ? proc_fail_nth_write+0x9e/0x210 [ 814.833471] ? find_held_lock+0x36/0x1c0 [ 814.837550] ? perf_trace_sched_process_exec+0x860/0x860 [ 814.842995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 814.848528] __should_failslab+0x124/0x180 [ 814.852774] should_failslab+0x9/0x14 [ 814.856571] __kmalloc+0x2e0/0x760 [ 814.860102] ? strncpy_from_user+0x5a0/0x5a0 [ 814.864512] ? fput+0x130/0x1a0 [ 814.867783] ? do_syscall_64+0x9a/0x820 [ 814.871744] ? __x64_sys_memfd_create+0x142/0x4f0 [ 814.876577] ? do_syscall_64+0x9a/0x820 [ 814.880561] __x64_sys_memfd_create+0x142/0x4f0 [ 814.885243] ? memfd_fcntl+0x1910/0x1910 [ 814.889326] do_syscall_64+0x1b9/0x820 [ 814.893206] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 814.898560] ? syscall_return_slowpath+0x5e0/0x5e0 [ 814.903478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 814.908310] ? trace_hardirqs_on_caller+0x310/0x310 [ 814.913335] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 814.918352] ? prepare_exit_to_usermode+0x291/0x3b0 [ 814.923390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 814.928228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.933407] RIP: 0033:0x457569 [ 814.936588] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:58:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x56) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) setsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000000c0)=0x1000, 0x4) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000180)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x69, 0x414000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x3, 0x0, 0x10001, 0x4}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000300)={0x4, r3}) 05:58:04 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 814.955495] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 814.963204] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 814.970470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 814.977747] RBP: 000000000072bf00 R08: 0000000000800000 R09: 00000000fbad8001 [ 814.985008] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff919e86d4 [ 814.992266] R13: 00000000004c52bd R14: 00000000004d90b8 R15: 0000000000000006 05:58:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x4000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x5, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:04 executing program 3 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 815.137798] FAULT_INJECTION: forcing a failure. [ 815.137798] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 815.163991] CPU: 0 PID: 21857 Comm: syz-executor4 Not tainted 4.20.0-rc4+ #351 [ 815.171431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 815.180890] Call Trace: [ 815.183510] dump_stack+0x244/0x39d [ 815.187158] ? dump_stack_print_info.cold.1+0x20/0x20 [ 815.192390] ? print_usage_bug+0xc0/0xc0 [ 815.196480] should_fail.cold.4+0xa/0x17 [ 815.200562] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 815.205694] ? lock_is_held_type+0x210/0x210 [ 815.210117] ? mark_held_locks+0x130/0x130 [ 815.214385] ? mark_held_locks+0x130/0x130 [ 815.214403] ? zap_class+0x640/0x640 [ 815.214429] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 815.214451] ? check_preemption_disabled+0x48/0x280 [ 815.214471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 815.238504] ? check_preemption_disabled+0x48/0x280 [ 815.238529] ? debug_smp_processor_id+0x1c/0x20 [ 815.238547] ? perf_trace_lock+0x14d/0x7a0 [ 815.238567] ? lock_is_held_type+0x210/0x210 [ 815.256890] ? lock_is_held_type+0x210/0x210 [ 815.256921] ? lock_downgrade+0x900/0x900 [ 815.256940] ? zap_class+0x640/0x640 [ 815.256971] __alloc_pages_nodemask+0x366/0xea0 [ 815.273920] ? trace_hardirqs_on+0x310/0x310 [ 815.278355] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 815.283411] ? find_held_lock+0x36/0x1c0 05:58:04 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x1, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) io_setup(0x6, &(0x7f00000000c0)=0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x200080, 0x0) io_cancel(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x9, r0, &(0x7f0000000100)="831933ad80ddde49a15af0e0d719821f4a4a5db41e253d9b0adf70065b42543c4e1126d3185d111a2aca9e3044a00df9de4d2c194958f6438ae8594d3b7886059943b55ef4e205a55d3fea76e3523cdedf8552fd6000499706f90ef596c4cb32d7fb0a31fa4debc7ed971f11923707ed873f0c649bd02709e7bd620575b0fd5d3f8b4376d647efb51ac46b1f19a78b988bb68aa812d8589273c17db80f89342b93256970f478e707d9e73a51aa66ab1e513f", 0xb2, 0xa4e, 0x0, 0x1, r3}, &(0x7f0000000240)) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000400)=0x1, 0x4) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000300)=0x502, 0x4) [ 815.287508] ? find_held_lock+0x36/0x1c0 [ 815.291604] ? ep_poll_callback+0xa5e/0x10e0 [ 815.296037] ? lock_downgrade+0x900/0x900 [ 815.300210] ? kasan_check_read+0x11/0x20 [ 815.304394] ? trace_hardirqs_off+0xb8/0x310 [ 815.308834] ? kasan_check_read+0x11/0x20 [ 815.313007] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 815.318571] alloc_pages_vma+0x11e/0x4a0 [ 815.322661] do_huge_pmd_anonymous_page+0x57e/0x2150 [ 815.323660] FAULT_INJECTION: forcing a failure. [ 815.323660] name failslab, interval 1, probability 0, space 0, times 0 05:58:04 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x900}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 815.327785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 815.327814] ? __thp_get_unmapped_area+0x180/0x180 [ 815.327836] ? reverse_path_check_proc+0x5c0/0x5c0 [ 815.327853] ? lock_is_held_type+0x210/0x210 [ 815.327881] ? print_usage_bug+0xc0/0xc0 [ 815.362975] ? check_preemption_disabled+0x48/0x280 [ 815.368011] ? print_usage_bug+0xc0/0xc0 [ 815.372085] ? check_preemption_disabled+0x48/0x280 [ 815.372108] ? debug_smp_processor_id+0x1c/0x20 [ 815.372124] ? perf_trace_lock+0x14d/0x7a0 [ 815.372153] ? __lock_acquire+0x62f/0x4c20 [ 815.372169] ? __lock_acquire+0x62f/0x4c20 [ 815.372193] ? zap_class+0x640/0x640 [ 815.398296] ? zap_class+0x640/0x640 [ 815.402029] ? print_usage_bug+0xc0/0xc0 [ 815.406120] ? mark_held_locks+0x130/0x130 [ 815.410373] ? mark_held_locks+0x130/0x130 [ 815.414633] ? find_held_lock+0x36/0x1c0 [ 815.418733] __handle_mm_fault+0x3c91/0x5be0 [ 815.423170] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 815.428036] ? lock_is_held_type+0x210/0x210 [ 815.432464] ? trace_hardirqs_off_caller+0x310/0x310 [ 815.437608] ? zap_class+0x640/0x640 [ 815.441350] ? zap_class+0x640/0x640 [ 815.445097] ? find_held_lock+0x36/0x1c0 [ 815.449226] ? handle_mm_fault+0x42a/0xc70 [ 815.453487] ? lock_downgrade+0x900/0x900 [ 815.457657] ? check_preemption_disabled+0x48/0x280 [ 815.462694] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 815.467649] ? kasan_check_read+0x11/0x20 [ 815.471814] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 815.477106] ? rcu_softirq_qs+0x20/0x20 [ 815.481095] ? trace_hardirqs_off_caller+0x310/0x310 [ 815.486218] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 815.491777] ? check_preemption_disabled+0x48/0x280 [ 815.496845] handle_mm_fault+0x54f/0xc70 [ 815.500947] ? __handle_mm_fault+0x5be0/0x5be0 [ 815.505556] ? find_vma+0x34/0x190 [ 815.509117] __do_page_fault+0x5e8/0xe60 [ 815.513210] do_page_fault+0xf2/0x7e0 [ 815.517027] ? vmalloc_sync_all+0x30/0x30 [ 815.521196] ? error_entry+0x76/0xd0 [ 815.524934] ? trace_hardirqs_off_caller+0xbb/0x310 [ 815.530126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 815.535019] ? trace_hardirqs_on_caller+0x310/0x310 [ 815.540052] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 815.545167] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 815.550326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 815.555210] page_fault+0x1e/0x30 [ 815.558677] RIP: 0010:ep_send_events_proc+0x8ed/0xed0 [ 815.563879] Code: 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 89 85 68 fd ff ff e8 d5 9d 99 ff 0f 1f 00 31 d2 48 8b b5 20 fd ff ff 8b 85 68 fd ff ff <89> 06 0f 1f 00 31 ff 89 d6 89 95 68 fd ff ff e8 bf 9e 99 ff 8b 95 [ 815.582848] RSP: 0018:ffff8881858ef298 EFLAGS: 00010246 [ 815.588244] RAX: 0000000000000001 RBX: ffff8881ce523858 RCX: ffffc90005a50000 [ 815.595526] RDX: 0000000000000000 RSI: 00000000208c9fc4 RDI: 0000000000000005 [ 815.602812] RBP: ffff8881858ef590 R08: ffff8881829d25c0 R09: 0000000000000006 [ 815.610145] R10: 0000000000000000 R11: ffff8881829d25c0 R12: dffffc0000000000 [ 815.617434] R13: ffff8881858ef568 R14: ffff8881ce523860 R15: ffff8881ce5238b0 [ 815.624779] ? ep_send_events_proc+0x8db/0xed0 [ 815.629416] ? do_epoll_wait+0x200/0x200 [ 815.633511] ? zap_class+0x640/0x640 [ 815.637247] ? print_usage_bug+0xc0/0xc0 [ 815.641340] ? finish_task_switch+0x1b4/0x910 [ 815.645858] ? find_held_lock+0x36/0x1c0 [ 815.649970] ? mark_held_locks+0xc7/0x130 [ 815.654136] ? _raw_spin_unlock_irq+0x27/0x80 [ 815.658642] ? _raw_spin_unlock_irq+0x27/0x80 [ 815.663154] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 815.667759] ? trace_hardirqs_on+0xbd/0x310 [ 815.672093] ? kasan_check_read+0x11/0x20 [ 815.676282] ? ep_scan_ready_list+0x4ab/0x1050 [ 815.680882] ? trace_hardirqs_off_caller+0x310/0x310 [ 815.686036] ? do_epoll_wait+0x200/0x200 [ 815.690119] ep_scan_ready_list+0x4bd/0x1050 [ 815.694545] ? perf_trace_lock+0x14d/0x7a0 [ 815.698810] ? ep_poll_callback+0x10e0/0x10e0 [ 815.703334] ? check_preemption_disabled+0x48/0x280 [ 815.708375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 815.713941] ? check_preemption_disabled+0x48/0x280 [ 815.718985] ? zap_class+0x640/0x640 [ 815.722729] ? schedule+0x108/0x460 [ 815.726465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 815.732010] ? check_preemption_disabled+0x48/0x280 [ 815.737046] ? __schedule+0x21d0/0x21d0 [ 815.741042] ? debug_smp_processor_id+0x1c/0x20 [ 815.745737] ? find_held_lock+0x36/0x1c0 [ 815.749830] ? ep_poll+0xffa/0x13d0 [ 815.753472] ? _raw_spin_unlock_irq+0x27/0x80 [ 815.757985] ? _raw_spin_unlock_irq+0x27/0x80 [ 815.762500] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 815.767098] ? trace_hardirqs_on+0xbd/0x310 [ 815.771433] ? kasan_check_read+0x11/0x20 [ 815.775588] ? ep_poll+0xffa/0x13d0 [ 815.779259] ? trace_hardirqs_off_caller+0x310/0x310 [ 815.784392] ep_poll+0x572/0x13d0 [ 815.787923] ? do_epoll_create+0x590/0x590 [ 815.792200] ? kasan_check_read+0x11/0x20 [ 815.796361] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 815.801661] ? rcu_softirq_qs+0x20/0x20 [ 815.805678] ? __fget+0x4d1/0x740 [ 815.809190] ? wake_up_q+0x100/0x100 [ 815.812926] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 815.818476] ? proc_fail_nth_write+0x9e/0x210 [ 815.822991] ? find_held_lock+0x36/0x1c0 [ 815.827072] ? __fget_light+0x2e9/0x430 [ 815.831075] ? fget_raw+0x20/0x20 [ 815.834540] ? wait_for_completion+0x8a0/0x8a0 [ 815.839149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 815.844716] do_epoll_wait+0x1b0/0x200 [ 815.848627] __x64_sys_epoll_pwait+0x3ea/0x4b0 [ 815.853232] ? __ia32_sys_epoll_wait+0xf0/0xf0 [ 815.857826] ? trace_hardirqs_on+0xbd/0x310 [ 815.862169] ? __ia32_sys_read+0xb0/0xb0 [ 815.866246] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.871626] ? trace_hardirqs_off_caller+0x310/0x310 [ 815.876762] do_syscall_64+0x1b9/0x820 [ 815.880657] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 815.886051] ? syscall_return_slowpath+0x5e0/0x5e0 [ 815.890996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 815.895860] ? trace_hardirqs_on_caller+0x310/0x310 [ 815.900891] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 815.905954] ? prepare_exit_to_usermode+0x291/0x3b0 [ 815.911012] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 815.915876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.921084] RIP: 0033:0x457569 05:58:05 executing program 0 (fault-call:3 fault-nth:0): r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 05:58:05 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 815.924294] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 815.943214] RSP: 002b:00007f1eeb25bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000119 [ 815.950940] RAX: ffffffffffffffda RBX: 00007f1eeb25bc90 RCX: 0000000000457569 [ 815.958232] RDX: 0000000000000001 RSI: 00000000208c9fc4 RDI: 0000000000000004 [ 815.965514] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 815.972791] R10: fffffffffffffff7 R11: 0000000000000246 R12: 00007f1eeb25c6d4 [ 815.980083] R13: 00000000004bdc74 R14: 00000000004cd160 R15: 0000000000000006 [ 816.001525] CPU: 1 PID: 21880 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 816.009385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.018756] Call Trace: [ 816.021368] dump_stack+0x244/0x39d [ 816.025015] ? dump_stack_print_info.cold.1+0x20/0x20 [ 816.030228] ? debug_smp_processor_id+0x1c/0x20 [ 816.034928] ? perf_trace_lock+0x14d/0x7a0 [ 816.039190] should_fail.cold.4+0xa/0x17 [ 816.043272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 816.048416] ? perf_trace_lock+0x14d/0x7a0 [ 816.052667] ? __lock_acquire+0x62f/0x4c20 [ 816.056938] ? lock_downgrade+0x900/0x900 [ 816.061109] ? check_preemption_disabled+0x48/0x280 [ 816.066151] ? find_held_lock+0x36/0x1c0 [ 816.070249] ? expand_files.part.8+0x571/0x9a0 [ 816.074844] ? perf_trace_sched_process_exec+0x860/0x860 [ 816.080341] ? find_held_lock+0x36/0x1c0 [ 816.084434] __should_failslab+0x124/0x180 [ 816.088699] should_failslab+0x9/0x14 [ 816.092525] kmem_cache_alloc+0x2be/0x730 [ 816.096711] ? shmem_destroy_callback+0xc0/0xc0 [ 816.101405] shmem_alloc_inode+0x1b/0x40 [ 816.105487] alloc_inode+0x63/0x190 [ 816.109137] new_inode_pseudo+0x71/0x1a0 [ 816.113210] ? prune_icache_sb+0x1c0/0x1c0 [ 816.117467] ? _raw_spin_unlock+0x2c/0x50 [ 816.121630] new_inode+0x1c/0x40 [ 816.125020] shmem_get_inode+0xf1/0x920 [ 816.129013] ? shmem_encode_fh+0x340/0x340 [ 816.133267] ? lock_downgrade+0x900/0x900 [ 816.137432] ? lock_release+0xa00/0xa00 [ 816.141422] ? perf_trace_sched_process_exec+0x860/0x860 [ 816.146890] ? usercopy_warn+0x110/0x110 05:58:05 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 05:58:05 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) signalfd(r0, &(0x7f0000000000)={0x539}, 0x8) fcntl$setlease(r0, 0x400, 0xfffffffffffffffc) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x98201) dup2(r1, r0) prctl$PR_GET_SECCOMP(0x15) [ 816.150983] __shmem_file_setup.part.50+0x83/0x2a0 [ 816.151007] shmem_file_setup+0x65/0x90 [ 816.151026] __x64_sys_memfd_create+0x2af/0x4f0 [ 816.151043] ? memfd_fcntl+0x1910/0x1910 [ 816.168728] do_syscall_64+0x1b9/0x820 [ 816.172642] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 816.178039] ? syscall_return_slowpath+0x5e0/0x5e0 [ 816.182989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 816.187848] ? trace_hardirqs_on_caller+0x310/0x310 [ 816.192858] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 816.197866] ? prepare_exit_to_usermode+0x291/0x3b0 [ 816.202875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 816.207717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.212892] RIP: 0033:0x457569 [ 816.216083] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 816.234985] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 816.242694] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 05:58:05 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:05 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000180)={0x5, @win={{0x9, 0x6, 0x3, 0x4}, 0x0, 0x1, &(0x7f00000000c0)={{0x8, 0x5, 0x4, 0xea}, &(0x7f0000000080)={{0x6, 0x80000001, 0x6, 0x3}, &(0x7f0000000000)={{0x1ca537de, 0xfffffffffffeffff, 0x1, 0x9}}}}, 0x6dc9535, &(0x7f0000000100)="01f1aa5486f2c418d52da28abc1ec78a97fd382d162590f16db188759d141d71d94db0846599bdaa8c52ba2b724002ae7908de5290cf515c98443224358bfdb987d5fb9978c548398ae1cb8a1710c9aac1b996", 0x7}}) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r1) 05:58:05 executing program 3 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 816.249957] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 816.257218] RBP: 000000000072bf00 R08: 0000000000800000 R09: 00000000fbad8001 [ 816.264495] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff919e86d4 [ 816.271757] R13: 00000000004c52bd R14: 00000000004d90b8 R15: 0000000000000006 05:58:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x5}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:05 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0xb) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x800, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000080)={0x0, "0ac5d7766b51757379de40e9b3419742c802e34b4c51d57c056517abf012fb7a", 0x2, 0x1}) [ 816.394521] FAULT_INJECTION: forcing a failure. [ 816.394521] name failslab, interval 1, probability 0, space 0, times 0 [ 816.489876] CPU: 0 PID: 21917 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 816.497349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.506707] Call Trace: [ 816.506739] dump_stack+0x244/0x39d [ 816.506762] ? dump_stack_print_info.cold.1+0x20/0x20 [ 816.506786] ? debug_smp_processor_id+0x1c/0x20 [ 816.506805] ? perf_trace_lock+0x14d/0x7a0 [ 816.506832] should_fail.cold.4+0xa/0x17 [ 816.531240] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 816.536393] ? check_preemption_disabled+0x48/0x280 [ 816.541440] ? perf_trace_lock+0x14d/0x7a0 [ 816.545692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 816.551249] ? check_preemption_disabled+0x48/0x280 [ 816.556276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 816.556300] ? lock_is_held_type+0x210/0x210 [ 816.556321] ? debug_smp_processor_id+0x1c/0x20 [ 816.570979] ? perf_trace_lock+0x14d/0x7a0 [ 816.575248] ? find_held_lock+0x36/0x1c0 [ 816.579343] ? perf_trace_sched_process_exec+0x860/0x860 [ 816.579375] __should_failslab+0x124/0x180 [ 816.589064] should_failslab+0x9/0x14 [ 816.592882] kmem_cache_alloc+0x2be/0x730 [ 816.597590] ? mpol_shared_policy_init+0x235/0x650 [ 816.597627] ? current_time+0x72/0x1b0 [ 816.597650] __d_alloc+0xc8/0xb90 [ 816.597672] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 816.614971] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 816.614993] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 816.615011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 816.615034] ? timespec64_trunc+0xea/0x180 [ 816.635006] ? inode_init_owner+0x340/0x340 [ 816.639369] ? _raw_spin_unlock+0x2c/0x50 [ 816.643575] ? current_time+0x131/0x1b0 [ 816.647588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 816.653162] ? __lockdep_init_map+0x105/0x590 [ 816.657695] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 816.663256] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 816.668823] d_alloc_pseudo+0x1d/0x30 [ 816.672640] alloc_file_pseudo+0x158/0x3f0 [ 816.676890] ? alloc_file+0x4d0/0x4d0 [ 816.680722] ? usercopy_warn+0x110/0x110 [ 816.684844] __shmem_file_setup.part.50+0x110/0x2a0 05:58:05 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x4, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:05 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xd697}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 816.689892] shmem_file_setup+0x65/0x90 [ 816.693930] __x64_sys_memfd_create+0x2af/0x4f0 [ 816.698615] ? memfd_fcntl+0x1910/0x1910 [ 816.702707] do_syscall_64+0x1b9/0x820 [ 816.706612] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 816.712002] ? syscall_return_slowpath+0x5e0/0x5e0 [ 816.716966] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 816.721836] ? trace_hardirqs_on_caller+0x310/0x310 [ 816.726870] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 816.731927] ? prepare_exit_to_usermode+0x291/0x3b0 05:58:05 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0xf, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 816.736967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 816.741851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.747069] RIP: 0033:0x457569 [ 816.750275] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 816.769378] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 816.777127] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 05:58:05 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:05 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x2) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 05:58:05 executing program 3 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 816.777138] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 816.777149] RBP: 000000000072bf00 R08: 0000000000800000 R09: 00000000fbad8001 [ 816.777160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff919e86d4 [ 816.777170] R13: 00000000004c52bd R14: 00000000004d90b8 R15: 0000000000000006 05:58:05 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0xfffffdf5, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13b, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:06 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000080)={r2, &(0x7f0000000340)=""/4096}) dup2(r1, r0) 05:58:06 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x2, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x400000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 817.011326] FAULT_INJECTION: forcing a failure. [ 817.011326] name failslab, interval 1, probability 0, space 0, times 0 [ 817.082472] CPU: 1 PID: 21965 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 817.089926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.099306] Call Trace: [ 817.101934] dump_stack+0x244/0x39d [ 817.105588] ? dump_stack_print_info.cold.1+0x20/0x20 [ 817.110808] ? debug_smp_processor_id+0x1c/0x20 [ 817.115496] ? perf_trace_lock+0x14d/0x7a0 [ 817.119752] should_fail.cold.4+0xa/0x17 [ 817.123865] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 817.129001] ? save_stack+0x43/0xd0 [ 817.132648] ? kasan_kmalloc+0xc7/0xe0 [ 817.136576] ? lock_is_held_type+0x210/0x210 [ 817.136607] ? zap_class+0x640/0x640 [ 817.136628] ? find_held_lock+0x36/0x1c0 [ 817.144763] ? nf_nat_ipv6_secure_port+0x8/0x30 [ 817.144806] ? perf_trace_sched_process_exec+0x860/0x860 [ 817.158980] ? lock_downgrade+0x900/0x900 [ 817.163161] __should_failslab+0x124/0x180 [ 817.167414] should_failslab+0x9/0x14 [ 817.171229] kmem_cache_alloc+0x2be/0x730 [ 817.175393] ? d_set_d_op+0x31d/0x410 [ 817.179223] __alloc_file+0xa8/0x470 05:58:06 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x900000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:06 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x3, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 817.182966] ? file_free_rcu+0xd0/0xd0 [ 817.186868] ? d_instantiate+0x79/0xa0 [ 817.190790] ? lock_downgrade+0x900/0x900 [ 817.194981] ? kasan_check_read+0x11/0x20 [ 817.199151] ? do_raw_spin_unlock+0xa7/0x330 [ 817.203589] ? do_raw_spin_trylock+0x270/0x270 [ 817.208196] alloc_empty_file+0x72/0x170 [ 817.212272] alloc_file+0x5e/0x4d0 [ 817.215830] ? _raw_spin_unlock+0x2c/0x50 [ 817.220011] alloc_file_pseudo+0x261/0x3f0 [ 817.220035] ? alloc_file+0x4d0/0x4d0 [ 817.220059] ? usercopy_warn+0x110/0x110 05:58:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 817.220089] __shmem_file_setup.part.50+0x110/0x2a0 [ 817.228158] shmem_file_setup+0x65/0x90 [ 817.228177] __x64_sys_memfd_create+0x2af/0x4f0 [ 817.228194] ? memfd_fcntl+0x1910/0x1910 [ 817.228228] do_syscall_64+0x1b9/0x820 [ 817.253888] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 817.259306] ? syscall_return_slowpath+0x5e0/0x5e0 [ 817.264265] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 817.269128] ? trace_hardirqs_on_caller+0x310/0x310 [ 817.274160] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 817.279206] ? prepare_exit_to_usermode+0x291/0x3b0 [ 817.284249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 817.289113] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.294305] RIP: 0033:0x457569 [ 817.294323] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 817.294333] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 817.294348] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 05:58:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:06 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$notify(r0, 0x402, 0x0) fcntl$setlease(r0, 0x400, 0x0) dup2(0xffffffffffffffff, r0) [ 817.294358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 817.294373] RBP: 000000000072bf00 R08: 0000000000800000 R09: 00000000fbad8001 [ 817.345983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff919e86d4 [ 817.353293] R13: 00000000004c52bd R14: 00000000004d90b8 R15: 0000000000000006 05:58:06 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0xfffffffffffffffd) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 05:58:06 executing program 3 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:06 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0xc9, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:06 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x5000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:06 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.opaque\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x1, @loopback}, r1, 0xffffffffffffffff}}, 0x48) 05:58:06 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x1ab4) clock_gettime(0x0, &(0x7f0000000000)) clock_nanosleep(0x1, 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000100)) [ 817.685114] FAULT_INJECTION: forcing a failure. [ 817.685114] name failslab, interval 1, probability 0, space 0, times 0 [ 817.708129] CPU: 1 PID: 22027 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 817.715544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.724930] Call Trace: [ 817.728073] dump_stack+0x244/0x39d [ 817.731737] ? dump_stack_print_info.cold.1+0x20/0x20 [ 817.731774] ? debug_smp_processor_id+0x1c/0x20 [ 817.741617] ? perf_trace_lock+0x14d/0x7a0 [ 817.741645] should_fail.cold.4+0xa/0x17 [ 817.741667] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 817.741703] ? is_bpf_text_address+0xd3/0x170 [ 817.759593] ? kernel_text_address+0x79/0xf0 [ 817.764053] ? __kernel_text_address+0xd/0x40 [ 817.768593] ? unwind_get_return_address+0x61/0xa0 [ 817.773586] ? __save_stack_trace+0x8d/0xf0 [ 817.777940] ? find_held_lock+0x36/0x1c0 [ 817.782044] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 817.786919] ? perf_trace_sched_process_exec+0x860/0x860 [ 817.792442] __should_failslab+0x124/0x180 [ 817.796729] should_failslab+0x9/0x14 [ 817.800552] kmem_cache_alloc_trace+0x2d7/0x750 [ 817.805245] ? __might_sleep+0x95/0x190 [ 817.809254] apparmor_file_alloc_security+0x17b/0xac0 [ 817.814474] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 817.820047] ? apparmor_path_rename+0xcd0/0xcd0 [ 817.824766] ? rcu_read_lock_sched_held+0x14f/0x180 [ 817.829805] ? kmem_cache_alloc+0x33a/0x730 [ 817.829821] ? d_set_d_op+0x31d/0x410 [ 817.829853] security_file_alloc+0x4c/0xa0 [ 817.838016] __alloc_file+0x12a/0x470 [ 817.846062] ? file_free_rcu+0xd0/0xd0 [ 817.849962] ? d_instantiate+0x79/0xa0 [ 817.853882] ? lock_downgrade+0x900/0x900 [ 817.858084] ? kasan_check_read+0x11/0x20 [ 817.862247] ? do_raw_spin_unlock+0xa7/0x330 [ 817.866709] ? do_raw_spin_trylock+0x270/0x270 [ 817.871306] alloc_empty_file+0x72/0x170 [ 817.875405] alloc_file+0x5e/0x4d0 [ 817.878975] ? _raw_spin_unlock+0x2c/0x50 [ 817.883155] alloc_file_pseudo+0x261/0x3f0 [ 817.887413] ? alloc_file+0x4d0/0x4d0 [ 817.891235] ? usercopy_warn+0x110/0x110 [ 817.895336] __shmem_file_setup.part.50+0x110/0x2a0 [ 817.900374] shmem_file_setup+0x65/0x90 [ 817.904372] __x64_sys_memfd_create+0x2af/0x4f0 [ 817.909072] ? memfd_fcntl+0x1910/0x1910 [ 817.913164] do_syscall_64+0x1b9/0x820 [ 817.917062] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 817.922450] ? syscall_return_slowpath+0x5e0/0x5e0 [ 817.927399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 817.932266] ? trace_hardirqs_on_caller+0x310/0x310 [ 817.937296] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 817.942321] ? prepare_exit_to_usermode+0x291/0x3b0 [ 817.947336] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 817.952176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.957367] RIP: 0033:0x457569 [ 817.960569] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:58:07 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:07 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="05000200000000000000008000000000000000000000000600000032fdffff0100000000000000050000000000000007000000000000000200007a9390030e00000000000000000000000000000000000000000000000000"]) fcntl$setlease(r0, 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000100)={{0x8, 0x2}, 'port0\x00', 0x80, 0x40004, 0x5, 0x1000000, 0x101, 0x8, 0x80000000, 0x0, 0x2, 0x80000001}) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) dup2(r1, r0) 05:58:07 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x1000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) 05:58:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfc00}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 817.979463] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 817.987157] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457569 [ 817.994412] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc787 [ 818.001664] RBP: 000000000072bf00 R08: 0000000000800000 R09: 00000000fbad8001 [ 818.008960] R10: 0000000000000000 R11: 0000000000000246 R12: 00007eff919e86d4 [ 818.016229] R13: 00000000004c52bd R14: 00000000004d90b8 R15: 0000000000000006 05:58:07 executing program 3 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r1, 0xef, 0x0, 0x0, 0x0, @ib={0x1b, 0x846, 0x8000, {"bb498b43b32b6eb2907a7b370a34de4a"}, 0x480000000, 0x0, 0xd4}, @in6={0xa, 0x4e23, 0x1, @remote, 0x8}}}, 0x118) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) 05:58:07 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0xa9aaaa0a00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:07 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$void(r2, 0xc0045878) 05:58:07 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xf5ffffff}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:07 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 818.231582] FAULT_INJECTION: forcing a failure. [ 818.231582] name failslab, interval 1, probability 0, space 0, times 0 05:58:07 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x509ad184e33f82be, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000240)={0x1, &(0x7f00000000c0)=""/180, &(0x7f0000000200)=[{0x7, 0x72, 0x6, &(0x7f0000000180)=""/114}]}) dup2(r1, r0) ioctl$UFFDIO_WAKE(r2, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 818.297446] CPU: 1 PID: 22070 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 818.304894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.314304] Call Trace: [ 818.316937] dump_stack+0x244/0x39d [ 818.320590] ? dump_stack_print_info.cold.1+0x20/0x20 [ 818.325819] ? debug_smp_processor_id+0x1c/0x20 [ 818.330501] ? perf_trace_lock+0x14d/0x7a0 [ 818.334762] should_fail.cold.4+0xa/0x17 [ 818.338849] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 818.343988] ? lock_downgrade+0x900/0x900 [ 818.348169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.353726] ? check_preemption_disabled+0x48/0x280 [ 818.358771] ? debug_smp_processor_id+0x1c/0x20 [ 818.363454] ? perf_trace_lock+0x14d/0x7a0 [ 818.367705] ? find_held_lock+0x36/0x1c0 [ 818.371811] ? ipv6_gso_pull_exthdrs+0x438/0x5f0 [ 818.376595] ? perf_trace_sched_process_exec+0x860/0x860 [ 818.382063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.387625] __should_failslab+0x124/0x180 [ 818.391885] should_failslab+0x9/0x14 [ 818.395718] kmem_cache_alloc+0x2be/0x730 [ 818.399857] ? do_sys_ftruncate+0x428/0x550 [ 818.404169] ? lock_downgrade+0x900/0x900 [ 818.408322] getname_flags+0xd0/0x590 [ 818.412116] getname+0x19/0x20 [ 818.415297] do_sys_open+0x383/0x700 [ 818.419003] ? filp_open+0x80/0x80 [ 818.422534] ? trace_hardirqs_off_caller+0x310/0x310 [ 818.427624] ? do_sys_ftruncate+0x449/0x550 [ 818.431962] __x64_sys_open+0x7e/0xc0 [ 818.435770] do_syscall_64+0x1b9/0x820 [ 818.439656] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 818.445027] ? syscall_return_slowpath+0x5e0/0x5e0 [ 818.449952] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 818.454789] ? trace_hardirqs_on_caller+0x310/0x310 [ 818.459796] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 818.464830] ? prepare_exit_to_usermode+0x291/0x3b0 [ 818.469854] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 818.474711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.479892] RIP: 0033:0x4111a1 [ 818.483095] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 818.502044] RSP: 002b:00007eff919e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 818.509767] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004111a1 [ 818.517044] RDX: 00007eff919e7afa RSI: 0000000000000002 RDI: 00007eff919e7af0 [ 818.524322] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 818.531600] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 818.538854] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 05:58:07 executing program 3 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:07 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3c, 0x4101) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000040)={0x0, 0x0, 0x7fff, 0x5650, '\x00', 0x100000001}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) 05:58:07 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000080)={0x2, 0x2e}) fcntl$setlease(r0, 0x400, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000340)=""/4096) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup2(r1, r0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) [ 818.660750] FAULT_INJECTION: forcing a failure. [ 818.660750] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 818.672617] CPU: 1 PID: 22104 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 818.680007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.689373] Call Trace: [ 818.691977] dump_stack+0x244/0x39d [ 818.692004] ? dump_stack_print_info.cold.1+0x20/0x20 [ 818.692027] ? lock_is_held_type+0x210/0x210 [ 818.705263] should_fail.cold.4+0xa/0x17 [ 818.709340] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 818.714470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.720025] ? check_preemption_disabled+0x48/0x280 [ 818.725045] ? debug_smp_processor_id+0x1c/0x20 [ 818.729724] ? mark_held_locks+0x130/0x130 [ 818.733972] ? lock_is_held_type+0x210/0x210 [ 818.738384] ? zap_class+0x640/0x640 [ 818.742131] ? print_usage_bug+0xc0/0xc0 [ 818.746208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.751755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.757298] ? check_preemption_disabled+0x48/0x280 [ 818.762340] ? debug_smp_processor_id+0x1c/0x20 [ 818.767031] ? perf_trace_lock+0x14d/0x7a0 [ 818.771280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.776833] ? should_fail+0x22d/0xd01 [ 818.780741] ? lock_is_held_type+0x210/0x210 [ 818.785162] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 818.790311] __alloc_pages_nodemask+0x366/0xea0 [ 818.795002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 818.800547] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 818.805570] ? debug_smp_processor_id+0x1c/0x20 [ 818.810242] ? perf_trace_lock+0x14d/0x7a0 [ 818.814485] ? find_held_lock+0x36/0x1c0 [ 818.818592] ? trace_hardirqs_off+0xb8/0x310 [ 818.823053] cache_grow_begin+0xa5/0x8c0 [ 818.827136] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 818.832693] kmem_cache_alloc+0x66b/0x730 [ 818.836845] ? do_sys_ftruncate+0x428/0x550 [ 818.841182] getname_flags+0xd0/0x590 [ 818.844995] getname+0x19/0x20 [ 818.848207] do_sys_open+0x383/0x700 [ 818.851937] ? filp_open+0x80/0x80 [ 818.855483] ? trace_hardirqs_off_caller+0x310/0x310 [ 818.860582] ? do_sys_ftruncate+0x449/0x550 [ 818.864901] __x64_sys_open+0x7e/0xc0 [ 818.868724] do_syscall_64+0x1b9/0x820 [ 818.872624] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 818.877991] ? syscall_return_slowpath+0x5e0/0x5e0 [ 818.882931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 818.887777] ? trace_hardirqs_on_caller+0x310/0x310 [ 818.892796] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 818.897841] ? prepare_exit_to_usermode+0x291/0x3b0 [ 818.902859] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 818.907714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.912909] RIP: 0033:0x4111a1 [ 818.916163] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 818.935122] RSP: 002b:00007eff919e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 818.942823] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004111a1 [ 818.950087] RDX: 00007eff919e7afa RSI: 0000000000000002 RDI: 00007eff919e7af0 05:58:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x80fe}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:08 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x3f000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:08 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 818.957354] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 818.964639] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 818.971917] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 05:58:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x0, 0x40000) recvfrom$inet(r1, &(0x7f0000000200)=""/11, 0xb, 0x20, &(0x7f0000000240)={0x2, 0x4e22, @loopback}, 0x10) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)=""/6, &(0x7f0000000180)=0x6) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback, 0xfffffffffffffffd}, r2}}, 0x48) 05:58:08 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200000000000803e, 0xfffffffffffffffe) fcntl$setlease(r0, 0x400, 0x0) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000240)=[{&(0x7f0000000100)="e5f2e0218312cb72743bee58f52b5ceeb069cb9107d610249a433e8aa774717428ac76ae917a21ca5b1b42dc9d59907b90b9a8de719b93293a4b898ed4df69ee6a39eebb", 0x44, 0x2}, {&(0x7f0000000180)="0ccac4cac7908afc9332c4b8a3464d8bcc175dd1b48df35422b232aaca86b21688f44a8f974deb9d005a552071455c6b6b6a9494f6cfbf06825647a21fa0c34115413c4831689ac7e86cc077732ab9", 0x4f, 0x1}, {&(0x7f0000000200)="7b8adbf93568f13b1b25c70f00ada67c5cd9146d29ab5f72f795e657115203fa793cef1e578c16", 0x27, 0x1f}], 0x40000, &(0x7f00000002c0)='nodev)+\x00') r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 05:58:08 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x200000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xa}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:08 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:08 executing program 3 (fault-call:3 fault-nth:7): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:08 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x4000000000000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:08 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4000000000, 0x0, @dev, 0x3}, {0xa, 0x0, 0x0, @loopback, 0x2}, r1, 0x6}}, 0x48) r2 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x9, 0x4000) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000200)={0x5, 0x78c6b6bf, 0x0, 0x7, 0xea}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r3 = dup3(r0, r0, 0x80000) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000000)={'nat\x00', 0x7b, "4268ce2a467082d265566d50de3e6ebf9d40845c953c57710f1e7f46b38c991416b5dfac661efd5222b0d86c59d03a5c7e7743f56d28a7e9d06c94f0d427011b29443f5393b990ef29a5f29478341bef5e6aa700d0f1c0222f38b5c595b86049f6e931283f5388222013596a3a71412af37976697ca534a8f83b9b"}, &(0x7f00000000c0)=0x9f) 05:58:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfc}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:08 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x100, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x7fff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={r2, 0xe2, "93b9143974e6de15d1c917ec217f9ec46397c8a7614320c35c609cbff5b7e1ccef8becd88fe69b5220fd34143beac2bb18d0a0c55f593112988ca99f297d566c7d6150ced4de1bd89f5dde3d750de8e075f708175048e2c72b610f4e927b7131c455564388b0c0bead89b85f79b771e9dc4f9deb2be552bb7a2d673f4438c4e78c4d396cbed03d8babd1020b76d39f474329bf2e5280e9ec731fb64cad476f06a16c32a5f196535a08c04b71f43e51f0ada7ca2a711de4efd70214352ccf91d0e4ddd11fe8ba0d1218850990a7663c96b2e29371c1a52bf6d037e43dd763d7628128"}, &(0x7f0000000200)=0xea) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) dup2(r1, r0) 05:58:08 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 819.443486] FAULT_INJECTION: forcing a failure. [ 819.443486] name failslab, interval 1, probability 0, space 0, times 0 [ 819.464824] CPU: 1 PID: 22169 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 819.472211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.481558] Call Trace: [ 819.484184] dump_stack+0x244/0x39d [ 819.487818] ? dump_stack_print_info.cold.1+0x20/0x20 [ 819.493019] ? debug_smp_processor_id+0x1c/0x20 [ 819.497710] ? perf_trace_lock+0x14d/0x7a0 [ 819.501968] should_fail.cold.4+0xa/0x17 [ 819.506043] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 819.511184] ? lock_downgrade+0x900/0x900 [ 819.515346] ? check_preemption_disabled+0x48/0x280 [ 819.520392] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 819.525341] ? kasan_check_read+0x11/0x20 [ 819.529524] ? find_held_lock+0x36/0x1c0 [ 819.533618] ? debug_smp_processor_id+0x1c/0x20 [ 819.538294] ? perf_trace_sched_process_exec+0x860/0x860 [ 819.543764] __should_failslab+0x124/0x180 [ 819.548031] should_failslab+0x9/0x14 [ 819.551860] kmem_cache_alloc+0x2be/0x730 [ 819.556015] ? zap_class+0x640/0x640 [ 819.559764] ? print_usage_bug+0xc0/0xc0 [ 819.563851] ? mark_held_locks+0x130/0x130 [ 819.568109] __alloc_file+0xa8/0x470 [ 819.571839] ? file_free_rcu+0xd0/0xd0 [ 819.571859] ? find_held_lock+0x36/0x1c0 [ 819.571885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 819.585372] ? check_preemption_disabled+0x48/0x280 [ 819.585396] alloc_empty_file+0x72/0x170 [ 819.585419] path_openat+0x170/0x5150 [ 819.598264] ? lock_is_held_type+0x210/0x210 [ 819.602697] ? unwind_dump+0x190/0x190 [ 819.606612] ? zap_class+0x640/0x640 [ 819.606635] ? path_lookupat.isra.43+0xc00/0xc00 [ 819.606654] ? unwind_get_return_address+0x61/0xa0 [ 819.615124] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 819.615140] ? expand_files.part.8+0x571/0x9a0 [ 819.615161] ? find_held_lock+0x36/0x1c0 [ 819.615181] ? __alloc_fd+0x347/0x6e0 [ 819.637527] ? lock_downgrade+0x900/0x900 [ 819.641719] ? getname+0x19/0x20 [ 819.645108] ? kasan_check_read+0x11/0x20 [ 819.649286] ? do_raw_spin_unlock+0xa7/0x330 [ 819.653715] ? do_raw_spin_trylock+0x270/0x270 [ 819.658299] ? __lock_is_held+0xb5/0x140 [ 819.662357] ? __check_object_size+0xb1/0x782 [ 819.666881] ? _raw_spin_unlock+0x2c/0x50 [ 819.671023] ? __alloc_fd+0x347/0x6e0 [ 819.674819] do_filp_open+0x255/0x380 [ 819.678629] ? may_open_dev+0x100/0x100 [ 819.682626] ? get_unused_fd_flags+0x122/0x1a0 [ 819.687227] ? __alloc_fd+0x6e0/0x6e0 [ 819.691048] do_sys_open+0x568/0x700 [ 819.691069] ? filp_open+0x80/0x80 [ 819.691091] ? trace_hardirqs_off_caller+0x310/0x310 [ 819.691109] ? do_sys_ftruncate+0x449/0x550 [ 819.707771] __x64_sys_open+0x7e/0xc0 [ 819.711586] do_syscall_64+0x1b9/0x820 [ 819.715495] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 819.720891] ? syscall_return_slowpath+0x5e0/0x5e0 [ 819.725838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 819.731194] ? trace_hardirqs_on_caller+0x310/0x310 [ 819.736239] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 819.741263] ? prepare_exit_to_usermode+0x291/0x3b0 [ 819.741287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 819.741312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.741329] RIP: 0033:0x4111a1 [ 819.751177] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 819.751187] RSP: 002b:00007eff919e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 819.751217] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004111a1 05:58:08 executing program 0: getsockname(0xffffffffffffff9c, &(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000000)=0x80) writev(r0, &(0x7f0000000740)=[{&(0x7f0000000500)="9fa2984a3174aeeb555608b3ad1b6d4ef15de80e5245b4d7689b45097dda8f06395d6d1f3d542aa653ba19abd65da8596cc91a45c35b04e0d4221832b00d04405103db8ef2e4b93a114de28ae738519fc681d9b5fd4b37f97faa5639a8ce2afc9ff3019409c84115d469a589b85f6bec", 0x70}, {&(0x7f0000000580)="56d03d857d710b3d3e414b9016a1410b8c2676465ba8be2fee3e6373b73317705736f3bb09390f0ec1de3be64d4153a49a9fa7fd71c25dee4040b072595155cf98dc2eb30b0acf52db9c0036b987be1232f6", 0x52}, {&(0x7f0000000600)="f3c28de40f", 0x5}, {&(0x7f0000000640)="195e1ab9ed74725f2ed138cbc0b49a9959b912e1402a020020cabc868f6ab2bfccd5bc66679a638c09ab7c77289a23a40b47ea8dcce20e4987235e33d6a64142e697aab09a7a567616b6665745288d9e1247b32b9702067384f254a482344b79e288fb594b22a7e620812258ef0f218fe6ba0287049499908ca62424a983ac4c837ac309e072cea6ae31042e382fa8574132b37ea6939f920240f5c72de7201aaa47be2c0526ac31ecd77ddab688f03bd16414723e8a4b9895f615cde5a88726c984d47d4ecca13c2ce0a26dc6a13ad6395bfe47797cfae4c61d2efee0167d04ea34ac67bcab41bc33bb6623cd748219555b786d", 0xf4}], 0x4) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x1000000000000) fcntl$setlease(r1, 0x400, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r2, r1) r3 = semget$private(0x0, 0x2, 0x20) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000780)={{0x7, r4, r5, r6, r7, 0xca, 0x20}, 0x0, 0x2, 0xfffffffffffffeff}) 05:58:08 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000100)) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x100000000) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x4, 0xfffffffffffffff8, @loopback}, r2}}, 0x27) 05:58:08 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x8}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:08 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x3f00000000000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:08 executing program 3 (fault-call:3 fault-nth:8): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 819.751226] RDX: 00007eff919e7afa RSI: 0000000000000002 RDI: 00007eff919e7af0 [ 819.751235] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 819.751244] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 819.751252] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 05:58:08 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x100000000000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 819.892735] FAULT_INJECTION: forcing a failure. [ 819.892735] name failslab, interval 1, probability 0, space 0, times 0 [ 819.905931] CPU: 1 PID: 22208 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 819.913337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.922697] Call Trace: [ 819.925316] dump_stack+0x244/0x39d [ 819.928975] ? dump_stack_print_info.cold.1+0x20/0x20 [ 819.934199] ? debug_smp_processor_id+0x1c/0x20 [ 819.938887] ? perf_trace_lock+0x14d/0x7a0 [ 819.943150] should_fail.cold.4+0xa/0x17 [ 819.943174] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 819.943217] ? is_bpf_text_address+0xd3/0x170 [ 819.952416] ? kernel_text_address+0x79/0xf0 [ 819.952435] ? __kernel_text_address+0xd/0x40 [ 819.952452] ? unwind_get_return_address+0x61/0xa0 [ 819.952471] ? __save_stack_trace+0x8d/0xf0 [ 819.952492] ? find_held_lock+0x36/0x1c0 [ 819.961399] ? do_syscall_64+0x1b9/0x820 [ 819.961418] ? perf_trace_sched_process_exec+0x860/0x860 [ 819.961447] __should_failslab+0x124/0x180 [ 819.970855] should_failslab+0x9/0x14 [ 819.970874] kmem_cache_alloc_trace+0x2d7/0x750 [ 819.970894] ? __might_sleep+0x95/0x190 [ 819.970927] apparmor_file_alloc_security+0x17b/0xac0 [ 819.970952] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 819.979343] ? apparmor_path_rename+0xcd0/0xcd0 [ 819.988845] ? rcu_read_lock_sched_held+0x14f/0x180 [ 819.988874] ? kmem_cache_alloc+0x33a/0x730 [ 819.988893] ? zap_class+0x640/0x640 [ 820.034001] security_file_alloc+0x4c/0xa0 [ 820.038270] __alloc_file+0x12a/0x470 05:58:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x3f350c00) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 820.042107] ? file_free_rcu+0xd0/0xd0 [ 820.046019] ? find_held_lock+0x36/0x1c0 [ 820.050111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 820.055717] ? check_preemption_disabled+0x48/0x280 [ 820.060775] alloc_empty_file+0x72/0x170 [ 820.064852] path_openat+0x170/0x5150 [ 820.068674] ? lock_is_held_type+0x210/0x210 [ 820.073098] ? unwind_dump+0x190/0x190 [ 820.077012] ? zap_class+0x640/0x640 [ 820.080756] ? path_lookupat.isra.43+0xc00/0xc00 [ 820.085532] ? unwind_get_return_address+0x61/0xa0 [ 820.090524] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 820.095551] ? expand_files.part.8+0x571/0x9a0 [ 820.100155] ? find_held_lock+0x36/0x1c0 [ 820.100194] ? __alloc_fd+0x347/0x6e0 [ 820.108064] ? lock_downgrade+0x900/0x900 [ 820.112224] ? getname+0x19/0x20 [ 820.115618] ? kasan_check_read+0x11/0x20 [ 820.119792] ? do_raw_spin_unlock+0xa7/0x330 [ 820.124208] ? do_raw_spin_trylock+0x270/0x270 [ 820.128801] ? __lock_is_held+0xb5/0x140 [ 820.132883] ? __check_object_size+0xb1/0x782 [ 820.137436] ? _raw_spin_unlock+0x2c/0x50 [ 820.141598] ? __alloc_fd+0x347/0x6e0 [ 820.145443] do_filp_open+0x255/0x380 [ 820.149261] ? may_open_dev+0x100/0x100 [ 820.153269] ? get_unused_fd_flags+0x122/0x1a0 [ 820.157880] ? __alloc_fd+0x6e0/0x6e0 [ 820.161704] do_sys_open+0x568/0x700 [ 820.165424] ? filp_open+0x80/0x80 [ 820.168956] ? trace_hardirqs_off_caller+0x310/0x310 [ 820.174043] ? do_sys_ftruncate+0x449/0x550 [ 820.178360] __x64_sys_open+0x7e/0xc0 [ 820.182173] do_syscall_64+0x1b9/0x820 [ 820.186058] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 05:58:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x4000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 820.191442] ? syscall_return_slowpath+0x5e0/0x5e0 [ 820.196386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 820.201245] ? trace_hardirqs_on_caller+0x310/0x310 [ 820.206289] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 820.211315] ? prepare_exit_to_usermode+0x291/0x3b0 [ 820.216348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 820.221214] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.226418] RIP: 0033:0x4111a1 05:58:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) getsockname(0xffffffffffffff9c, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x80) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000140)=0x6409, 0x2) 05:58:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfe80000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:09 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0xea89cc7f606d3cc8, 0x102) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) write$P9_RRENAME(r0, &(0x7f0000000040)={0x7, 0x15, 0x1}, 0x7) dup2(r1, r0) [ 820.229625] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 820.248515] RSP: 002b:00007eff919e7a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 820.256227] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004111a1 [ 820.263501] RDX: 00007eff919e7afa RSI: 0000000000000002 RDI: 00007eff919e7af0 [ 820.270755] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 820.278036] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000007 [ 820.285312] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 05:58:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x13051de) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:09 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f00000000c0)) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000080)=0x8) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) dup2(r0, r0) fsync(r1) 05:58:09 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:09 executing program 2: r0 = semget(0x3, 0x1, 0x1c0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/7) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) 05:58:09 executing program 3 (fault-call:3 fault-nth:9): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:09 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x100000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:09 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:09 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8, 0x400, 0x40) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000000)={0xf, 0x8, 0xfa00, {r1, 0x3}}, 0x10) r2 = getegid() setfsgid(r2) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x2000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:09 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) io_setup(0x6, &(0x7f00000000c0)=0x0) io_submit(r1, 0x3, &(0x7f00000013c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000100)="c8b62ffec11626d9451f823860095ca7b149ab372a0f506dc133f930c0cbfd168da9d37bde859faf942cf65157cf1be7d07d71f029eed4f570b95556f68df18ef5b0182b7dc25436ad658fbd8e705b525494af79153dee97f2459b75b716e7b435c007bec1f7c94c6420926efa7567afb01051749579994aed4118ababec73d6fd39219445239eb87cd53e4747b52550e8f8d7ef519d72376fa8d848cba75014327ee888bd02826eb5dd64bf4edae499cc606fd40474da620e2adad74391e16855d908caceeff982eccca7ed36d0e27371b11e2817ee810e5e736359efc8170772ae6b66d3f7c6dfd2d349", 0xeb, 0x3, 0x0, 0x1, r0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x7, r0, &(0x7f0000000240)="8f324378b984e384bfed25bd64b618cedcdc2fadeea4b3fba77373316d701af0d3f7cfc005653aa7db8157894fd194db7575b80a66421c5bcd3128902b192e4af96bd4ef0b03f451cfd35be0c19df6b15c5ae8b17dba597ada12d7e4ccd4c006414dbe46c1e04692efc532c3176a116a43e49f409db7df42c12e7270eeaf2de63005397c2873655de96548944784482a45208b8d8fc398c70a5d4dca71ddd1af010a0e96b41cd2aea767716daa1a19e83aec8f7c829327", 0xb7, 0x8001, 0x0, 0x1, r0}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x3, 0x3d, r0, &(0x7f0000000380)="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", 0x1000, 0x80000001, 0x0, 0x2, r0}]) fcntl$setlease(r0, 0x400, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) read(r2, &(0x7f0000001400)=""/203, 0xcb) sched_rr_get_interval(r3, &(0x7f0000000080)) r4 = dup2(r2, r0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) 05:58:09 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 820.700402] FAULT_INJECTION: forcing a failure. [ 820.700402] name failslab, interval 1, probability 0, space 0, times 0 [ 820.725763] CPU: 1 PID: 22284 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 820.733146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.742504] Call Trace: [ 820.745111] dump_stack+0x244/0x39d 05:58:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0xffffffff00000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 820.748759] ? dump_stack_print_info.cold.1+0x20/0x20 [ 820.753973] ? debug_smp_processor_id+0x1c/0x20 [ 820.758653] ? perf_trace_lock+0x14d/0x7a0 [ 820.762933] should_fail.cold.4+0xa/0x17 [ 820.767011] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 820.772141] ? lock_is_held_type+0x210/0x210 [ 820.776564] ? check_preemption_disabled+0x48/0x280 [ 820.781597] ? zap_class+0x640/0x640 [ 820.785316] ? debug_smp_processor_id+0x1c/0x20 [ 820.789997] ? perf_trace_lock+0x14d/0x7a0 [ 820.794247] ? find_held_lock+0x36/0x1c0 [ 820.798335] ? __lock_is_held+0xb5/0x140 [ 820.802411] ? mwifiex_update_uap_custom_ie+0xa28/0x13c0 [ 820.802449] ? perf_trace_sched_process_exec+0x860/0x860 [ 820.813347] __should_failslab+0x124/0x180 [ 820.813367] should_failslab+0x9/0x14 [ 820.813389] kmem_cache_alloc_trace+0x2d7/0x750 [ 820.826057] ? check_preemption_disabled+0x48/0x280 [ 820.831109] __kthread_create_on_node+0x137/0x540 [ 820.835993] ? loop_get_status64+0x140/0x140 [ 820.840413] ? kthread_parkme+0xb0/0xb0 [ 820.844413] ? __lockdep_init_map+0x105/0x590 05:58:09 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x20000000000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 820.848929] ? __lockdep_init_map+0x105/0x590 [ 820.853431] ? loop_get_status64+0x140/0x140 [ 820.857850] kthread_create_on_node+0xb1/0xe0 [ 820.862382] ? __kthread_create_on_node+0x540/0x540 [ 820.867473] ? kasan_check_read+0x11/0x20 [ 820.871629] lo_ioctl+0x7f6/0x1d60 [ 820.871673] ? lo_rw_aio+0x1ef0/0x1ef0 [ 820.879128] blkdev_ioctl+0x98e/0x21b0 [ 820.883057] ? blkpg_ioctl+0xc10/0xc10 [ 820.886965] ? lock_downgrade+0x900/0x900 [ 820.891121] ? check_preemption_disabled+0x48/0x280 [ 820.896139] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 820.901073] ? kasan_check_read+0x11/0x20 [ 820.905222] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 820.910520] ? rcu_softirq_qs+0x20/0x20 [ 820.914532] ? __fget+0x4d1/0x740 [ 820.918000] ? ksys_dup3+0x680/0x680 [ 820.921742] block_ioctl+0xee/0x130 [ 820.925365] ? blkdev_fallocate+0x400/0x400 [ 820.929696] do_vfs_ioctl+0x1de/0x1790 [ 820.933577] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 820.939123] ? ioctl_preallocate+0x300/0x300 [ 820.943547] ? __fget_light+0x2e9/0x430 [ 820.947524] ? fget_raw+0x20/0x20 05:58:10 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0xaaaaaa9) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 820.950981] ? rcu_read_lock_sched_held+0x14f/0x180 [ 820.956016] ? kmem_cache_free+0x24f/0x290 [ 820.960265] ? putname+0xf7/0x130 [ 820.963730] ? do_syscall_64+0x9a/0x820 [ 820.967727] ? do_syscall_64+0x9a/0x820 [ 820.971735] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 820.976336] ? security_file_ioctl+0x94/0xc0 [ 820.980764] ksys_ioctl+0xa9/0xd0 [ 820.980786] __x64_sys_ioctl+0x73/0xb0 [ 820.980805] do_syscall_64+0x1b9/0x820 [ 820.988154] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 820.997389] ? syscall_return_slowpath+0x5e0/0x5e0 [ 821.002332] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.007231] ? trace_hardirqs_on_caller+0x310/0x310 [ 821.012288] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 821.017337] ? prepare_exit_to_usermode+0x291/0x3b0 [ 821.022392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.027259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.032463] RIP: 0033:0x4573d7 05:58:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xffffffffffffffc0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xff01}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 821.035675] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 821.054599] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 821.062293] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 821.069560] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 821.076827] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 821.084093] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 821.091371] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 05:58:10 executing program 3 (fault-call:3 fault-nth:10): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:10 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0xc353f) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:10 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x101) dup2(r1, r0) 05:58:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xfffffffffffffe08, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) [ 821.259151] FAULT_INJECTION: forcing a failure. [ 821.259151] name failslab, interval 1, probability 0, space 0, times 0 [ 821.299405] CPU: 1 PID: 22320 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 821.306821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.316176] Call Trace: [ 821.318779] dump_stack+0x244/0x39d [ 821.322442] ? dump_stack_print_info.cold.1+0x20/0x20 [ 821.327647] ? debug_smp_processor_id+0x1c/0x20 [ 821.332319] ? perf_trace_lock+0x14d/0x7a0 [ 821.336562] should_fail.cold.4+0xa/0x17 [ 821.340628] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 821.345771] ? pick_next_task_fair+0xa05/0x1b30 [ 821.350449] ? rcu_read_lock_sched_held+0x14f/0x180 [ 821.355474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.361014] ? check_preemption_disabled+0x48/0x280 [ 821.366031] ? zap_class+0x640/0x640 [ 821.369744] ? print_usage_bug+0xc0/0xc0 [ 821.373819] ? perf_trace_lock+0x14d/0x7a0 [ 821.378057] ? find_held_lock+0x36/0x1c0 [ 821.382130] ? __lock_is_held+0xb5/0x140 [ 821.386217] ? reweight_entity+0x10f0/0x10f0 [ 821.390652] ? perf_trace_sched_process_exec+0x860/0x860 [ 821.396137] __should_failslab+0x124/0x180 [ 821.400389] should_failslab+0x9/0x14 [ 821.404195] kmem_cache_alloc+0x2be/0x730 [ 821.408368] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 821.413398] __kernfs_new_node+0x127/0x8d0 [ 821.417645] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 821.422409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 821.427954] ? lock_is_held_type+0x210/0x210 [ 821.432373] ? debug_smp_processor_id+0x1c/0x20 [ 821.437057] ? perf_trace_lock+0x14d/0x7a0 [ 821.441310] ? __schedule+0x168a/0x21d0 [ 821.445300] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 821.450442] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 821.455551] ? zap_class+0x640/0x640 [ 821.459304] ? lock_is_held_type+0x210/0x210 [ 821.463726] ? zap_class+0x640/0x640 [ 821.467447] ? enqueue_task_fair+0x24d/0xa50 [ 821.471871] ? find_held_lock+0x36/0x1c0 [ 821.475950] kernfs_new_node+0x95/0x120 [ 821.479969] kernfs_create_dir_ns+0x4d/0x160 [ 821.484393] internal_create_group+0x5fc/0xd80 [ 821.488994] ? remove_files.isra.1+0x190/0x190 [ 821.493578] ? up_write+0x7b/0x220 [ 821.497131] ? down_write_nested+0x130/0x130 [ 821.501575] ? down_read+0x120/0x120 [ 821.505305] sysfs_create_group+0x1f/0x30 [ 821.509475] lo_ioctl+0x1307/0x1d60 [ 821.513134] ? lo_rw_aio+0x1ef0/0x1ef0 [ 821.517032] blkdev_ioctl+0x98e/0x21b0 [ 821.520951] ? blkpg_ioctl+0xc10/0xc10 [ 821.524844] ? lock_downgrade+0x900/0x900 [ 821.528998] ? check_preemption_disabled+0x48/0x280 [ 821.534023] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 821.538975] ? kasan_check_read+0x11/0x20 [ 821.543156] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 821.548441] ? rcu_softirq_qs+0x20/0x20 [ 821.552434] ? __fget+0x4d1/0x740 [ 821.555904] ? ksys_dup3+0x680/0x680 [ 821.559646] block_ioctl+0xee/0x130 [ 821.563312] ? blkdev_fallocate+0x400/0x400 [ 821.567652] do_vfs_ioctl+0x1de/0x1790 [ 821.571571] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 821.577112] ? ioctl_preallocate+0x300/0x300 [ 821.581554] ? __fget_light+0x2e9/0x430 [ 821.585529] ? fget_raw+0x20/0x20 [ 821.589015] ? rcu_read_lock_sched_held+0x14f/0x180 [ 821.594048] ? kmem_cache_free+0x24f/0x290 [ 821.598290] ? putname+0xf7/0x130 [ 821.601783] ? do_syscall_64+0x9a/0x820 [ 821.605801] ? do_syscall_64+0x9a/0x820 [ 821.609780] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 821.614365] ? security_file_ioctl+0x94/0xc0 [ 821.618783] ksys_ioctl+0xa9/0xd0 [ 821.622237] __x64_sys_ioctl+0x73/0xb0 [ 821.626155] do_syscall_64+0x1b9/0x820 [ 821.630058] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 821.635418] ? syscall_return_slowpath+0x5e0/0x5e0 [ 821.640445] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.645295] ? trace_hardirqs_on_caller+0x310/0x310 [ 821.650345] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 821.655363] ? prepare_exit_to_usermode+0x291/0x3b0 [ 821.660385] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 821.665237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.670438] RIP: 0033:0x4573d7 [ 821.673647] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 821.692550] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:58:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x9}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:10 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:10 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0xde51300100000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 821.700259] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 821.707539] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 821.714818] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 821.722081] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 821.729869] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 05:58:10 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000180)=0x9) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000140)=0x14) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000001c0)={@local, @multicast1}, &(0x7f0000000200)=0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) 05:58:10 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) bind$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x2, @remote}}, 0x1e) dup2(r1, r0) 05:58:10 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0xfffffffffffffda7) r2 = gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r4, 0x4004556d, &(0x7f0000000300)={{}, 'syz1\x00'}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000700)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r1, 0x1}}, 0x18) rt_tgsigqueueinfo(r2, r3, 0x34, &(0x7f00000000c0)={0x0, 0x1, 0x2, 0xfffffffffffffffd}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x10000, 0x0) openat$cgroup_ro(r5, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r5, 0xc1205531, &(0x7f0000000300)={0x6, 0x5, 0x3, 0x3, [], [], [], 0xff, 0x2, 0x5, 0x3, "24108502c8665a57d34d1203f34e6f7c"}) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x7}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r5, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={r6, 0x948, 0xffffffff}, 0xc) sendmsg$IPVS_CMD_GET_DAEMON(r5, &(0x7f0000000180)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10200542}, 0xc, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x40801}, 0x10) fcntl$F_GET_RW_HINT(r5, 0x40b, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:10 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfec0000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:11 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:11 executing program 3 (fault-call:3 fault-nth:11): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:11 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x40000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:11 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x620500, 0x0) fcntl$setlease(r0, 0x400, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000100)={{0xff, @broadcast, 0x4e23, 0x2, 'lc\x00', 0x20, 0x8, 0x4a}, {@broadcast, 0x4e21, 0x0, 0x8001, 0xfffffffffffffffc, 0x800}}, 0x44) dup2(r1, r0) 05:58:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8400, 0x0) clock_gettime(0x7, &(0x7f0000000100)) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f00000000c0)={0x2, "3b2fe79454fe80a92c7ac1d4e34a82764078c5f9f4fc24607134366202035598", 0x1, 0x1}) 05:58:11 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xa000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 822.210493] FAULT_INJECTION: forcing a failure. [ 822.210493] name failslab, interval 1, probability 0, space 0, times 0 [ 822.222539] CPU: 0 PID: 22407 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 822.229915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.229993] Call Trace: [ 822.230022] dump_stack+0x244/0x39d [ 822.230055] ? dump_stack_print_info.cold.1+0x20/0x20 [ 822.241992] should_fail.cold.4+0xa/0x17 [ 822.242011] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.242030] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 822.242052] ? debug_smp_processor_id+0x1c/0x20 [ 822.270254] ? perf_trace_lock+0x14d/0x7a0 [ 822.274488] ? print_usage_bug+0xc0/0xc0 [ 822.278553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.284123] ? check_preemption_disabled+0x48/0x280 [ 822.289159] ? debug_smp_processor_id+0x1c/0x20 [ 822.293828] ? perf_trace_lock+0x14d/0x7a0 [ 822.298059] ? __update_load_avg_se+0xae0/0xae0 [ 822.302731] ? lock_is_held_type+0x210/0x210 [ 822.307139] ? find_held_lock+0x36/0x1c0 [ 822.311222] ? zap_class+0x640/0x640 [ 822.314968] ? find_held_lock+0x36/0x1c0 [ 822.319054] ? print_usage_bug+0xc0/0xc0 [ 822.323149] __should_failslab+0x124/0x180 [ 822.327408] should_failslab+0x9/0x14 [ 822.331218] kmem_cache_alloc+0x47/0x730 [ 822.335282] ? lock_downgrade+0x900/0x900 [ 822.339473] radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 822.345195] idr_get_free+0x7a4/0xf70 [ 822.349015] ? radix_tree_iter_tag_clear+0x90/0x90 [ 822.353951] ? __save_stack_trace+0x8d/0xf0 [ 822.358326] ? save_stack+0xa9/0xd0 [ 822.361956] ? save_stack+0x43/0xd0 [ 822.365580] ? kasan_kmalloc+0xc7/0xe0 [ 822.369488] ? kasan_slab_alloc+0x12/0x20 [ 822.373653] ? kmem_cache_alloc+0x12e/0x730 [ 822.377973] ? __kernfs_new_node+0x127/0x8d0 [ 822.382395] ? kernfs_new_node+0x95/0x120 [ 822.386559] ? internal_create_group+0x5fc/0xd80 [ 822.391311] ? sysfs_create_group+0x1f/0x30 [ 822.395650] ? lo_ioctl+0x1307/0x1d60 [ 822.399453] ? blkdev_ioctl+0x98e/0x21b0 [ 822.403517] ? block_ioctl+0xee/0x130 [ 822.407319] ? do_vfs_ioctl+0x1de/0x1790 [ 822.411381] ? ksys_ioctl+0xa9/0xd0 [ 822.415009] ? __x64_sys_ioctl+0x73/0xb0 [ 822.419104] ? do_syscall_64+0x1b9/0x820 [ 822.423170] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.428562] ? find_held_lock+0x36/0x1c0 [ 822.432666] idr_alloc_u32+0x1d4/0x3a0 [ 822.436590] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 822.441457] ? lock_acquire+0x1ed/0x520 [ 822.445459] ? __kernfs_new_node+0x14e/0x8d0 [ 822.449877] ? __lock_is_held+0xb5/0x140 [ 822.453969] idr_alloc_cyclic+0x166/0x350 [ 822.458144] ? idr_alloc+0x1b0/0x1b0 [ 822.461891] ? __radix_tree_preload+0x1f7/0x280 [ 822.466589] __kernfs_new_node+0x1ee/0x8d0 [ 822.470861] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 822.475640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 822.481200] ? lock_is_held_type+0x210/0x210 [ 822.485634] ? debug_smp_processor_id+0x1c/0x20 [ 822.490314] ? perf_trace_lock+0x14d/0x7a0 [ 822.494579] ? __schedule+0x168a/0x21d0 [ 822.498578] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 822.503698] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 822.508833] ? zap_class+0x640/0x640 [ 822.512560] ? lock_is_held_type+0x210/0x210 [ 822.516994] ? zap_class+0x640/0x640 [ 822.520725] ? enqueue_task_fair+0x24d/0xa50 [ 822.525174] ? find_held_lock+0x36/0x1c0 [ 822.529267] kernfs_new_node+0x95/0x120 [ 822.533257] kernfs_create_dir_ns+0x4d/0x160 [ 822.537693] internal_create_group+0x5fc/0xd80 [ 822.542298] ? remove_files.isra.1+0x190/0x190 [ 822.546884] ? up_write+0x7b/0x220 [ 822.550440] ? down_write_nested+0x130/0x130 [ 822.554853] ? down_read+0x120/0x120 [ 822.558585] sysfs_create_group+0x1f/0x30 [ 822.562755] lo_ioctl+0x1307/0x1d60 [ 822.566411] ? lo_rw_aio+0x1ef0/0x1ef0 [ 822.570354] blkdev_ioctl+0x98e/0x21b0 [ 822.574252] ? blkpg_ioctl+0xc10/0xc10 [ 822.578154] ? lock_downgrade+0x900/0x900 [ 822.582305] ? check_preemption_disabled+0x48/0x280 [ 822.587341] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 822.592269] ? kasan_check_read+0x11/0x20 [ 822.596535] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 822.601812] ? rcu_softirq_qs+0x20/0x20 [ 822.605791] ? __fget+0x4d1/0x740 [ 822.609261] ? ksys_dup3+0x680/0x680 [ 822.612982] block_ioctl+0xee/0x130 [ 822.616604] ? blkdev_fallocate+0x400/0x400 [ 822.620944] do_vfs_ioctl+0x1de/0x1790 [ 822.624834] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 822.630397] ? ioctl_preallocate+0x300/0x300 [ 822.634802] ? __fget_light+0x2e9/0x430 [ 822.638806] ? fget_raw+0x20/0x20 [ 822.642288] ? rcu_read_lock_sched_held+0x14f/0x180 [ 822.647348] ? kmem_cache_free+0x24f/0x290 [ 822.651602] ? putname+0xf7/0x130 [ 822.655059] ? do_syscall_64+0x9a/0x820 [ 822.659038] ? do_syscall_64+0x9a/0x820 [ 822.663031] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 822.667624] ? security_file_ioctl+0x94/0xc0 [ 822.672042] ksys_ioctl+0xa9/0xd0 [ 822.675507] __x64_sys_ioctl+0x73/0xb0 [ 822.679426] do_syscall_64+0x1b9/0x820 [ 822.683337] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 822.688703] ? syscall_return_slowpath+0x5e0/0x5e0 [ 822.693634] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 822.698489] ? trace_hardirqs_on_caller+0x310/0x310 [ 822.703514] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 822.708534] ? prepare_exit_to_usermode+0x291/0x3b0 [ 822.713560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 822.718415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.723613] RIP: 0033:0x4573d7 [ 822.726808] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 822.745719] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 822.753438] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 05:58:11 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000100)={0x9, 0x108, 0xfa00, {r1, 0x7, "1cede1", "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"}}, 0x110) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) 05:58:11 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:11 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x14, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x18, @mcast2}, 0x80, &(0x7f0000000140)}, 0x0) modify_ldt$read_default(0x2, &(0x7f00000005c0)=""/246, 0xf6) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f00000006c0)) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000540)='./file0\x00') accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) sendmsg$xdp(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x2c, 0x1, r2, 0x39}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000180)="01786aa0ed19e81dfbc43da0a44eb3cf6aa9f104723fd6668a15a0aefd86f053ff1c19d1ce4dffcb0868d01e9327c60a4ff2377a2107098f7513d98a7416a15de756d5ca14bcd4879f1b7f1b2f15f330113d440f0de8d2bc5811407fb5e5528b611f038221ef86168529338fa000ee4cace528fa33d3b20d679d6cbf0b1ca3a39e5129af", 0x84}, {&(0x7f0000000340)="a5b51629ec86f8aeb49eeb3896e249e0fa4fba1f3043a6fbd807a0046d9fba4f48fdb50766a9b1cae3249f7c7c34790b4303d58acaad3a70345dffc7f1bea67b0e95703a542d9c6babf017a69078e171671e1218de35eb4f80efae5d8a3ac536d217a9edd6792e8b3ea41dac0f052251c54558316a3b3f9f053d9db2bb072349e9878c550125dd4afaa85062fccc210eede019f9dadf70d306445050e794fff68426a80469bf3b650cd5245e4a1eb683fe789733068b3addf4f24b23bbf3c85885c60685e382f88c3dd21277339f6b6cbbac9f52786c", 0xd6}, {&(0x7f0000000440)="000b195059ecdd136d6be9b28e3f6ad7dcd756ede02d90f349e7c455fe80de1c0f70106721310db3b1307f9df6391ba79100166488d1e2f65034d6774b56acbaf14427dbd4f51f820a4f0d113fb18dd29b2e0644617078d6d9793891ef26c24791b78a19714f009847d085e8c76d9a06eb8634c30ad46958f01087951f0359b669cf829ceb92e8d67759cfeb0f007cb5d4aac414593fb9e2f347f4797b66679c89482cadf334e9a469e14b9fc8b032743892a702a90a2841dea22b41ffa4f7daffe58054fc292c7fb44dfaa10dc4d92f65167b4cdbcf27f455fc2cd7a0c4533593a90101319ee8af74ac4d15ad", 0xed}], 0x3, 0x0, 0x0, 0x4000000}, 0x800) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000000)={0x1, 0x7, 0x7}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x12000, 0x20) fcntl$setlease(r3, 0x400, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x9, 0x200) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r4, r3) [ 822.760703] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 822.767969] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 822.775250] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 822.782534] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 05:58:11 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x8000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:12 executing program 3 (fault-call:3 fault-nth:12): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:12 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0xa9aaaa0a) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x80007}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0xffffffffffffffcb) 05:58:12 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 823.003392] FAULT_INJECTION: forcing a failure. [ 823.003392] name failslab, interval 1, probability 0, space 0, times 0 [ 823.015006] CPU: 1 PID: 22442 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 823.022397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.031773] Call Trace: [ 823.034383] dump_stack+0x244/0x39d [ 823.038053] ? dump_stack_print_info.cold.1+0x20/0x20 [ 823.043256] ? __kernel_text_address+0xd/0x40 [ 823.047765] ? unwind_get_return_address+0x61/0xa0 05:58:12 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x3f00) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 823.052736] should_fail.cold.4+0xa/0x17 [ 823.056812] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 823.061936] ? save_stack+0xa9/0xd0 [ 823.065576] ? kasan_kmalloc+0xc7/0xe0 [ 823.069501] ? kasan_slab_alloc+0x12/0x20 [ 823.073653] ? kmem_cache_alloc+0x12e/0x730 [ 823.073674] ? radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 823.083855] ? idr_get_free+0x7a4/0xf70 [ 823.083869] ? idr_alloc_u32+0x1d4/0x3a0 [ 823.083883] ? idr_alloc_cyclic+0x166/0x350 [ 823.083897] ? kernfs_new_node+0x95/0x120 [ 823.083925] ? kernfs_create_dir_ns+0x4d/0x160 [ 823.104962] ? internal_create_group+0x5fc/0xd80 [ 823.109725] ? sysfs_create_group+0x1f/0x30 [ 823.114059] ? lo_ioctl+0x1307/0x1d60 [ 823.117869] ? blkdev_ioctl+0x98e/0x21b0 [ 823.121948] ? block_ioctl+0xee/0x130 [ 823.125790] ? do_vfs_ioctl+0x1de/0x1790 [ 823.129862] ? ksys_ioctl+0xa9/0xd0 [ 823.133490] ? __x64_sys_ioctl+0x73/0xb0 [ 823.137552] ? do_syscall_64+0x1b9/0x820 [ 823.141651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.147026] ? lock_is_held_type+0x210/0x210 05:58:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x7de8237d) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) [ 823.151442] ? find_held_lock+0x36/0x1c0 [ 823.155519] ? zap_class+0x640/0x640 [ 823.159251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.164800] ? check_preemption_disabled+0x48/0x280 [ 823.164829] ? __lock_is_held+0xb5/0x140 [ 823.164867] __should_failslab+0x124/0x180 [ 823.178199] should_failslab+0x9/0x14 [ 823.182012] kmem_cache_alloc+0x47/0x730 [ 823.186094] ? lock_downgrade+0x900/0x900 [ 823.190272] ? radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 823.196213] radix_tree_node_alloc.constprop.19+0x1f7/0x370 05:58:12 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x8000000000000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 823.201945] idr_get_free+0x7a4/0xf70 [ 823.205777] ? radix_tree_iter_tag_clear+0x90/0x90 [ 823.210726] ? __save_stack_trace+0x8d/0xf0 [ 823.215070] ? save_stack+0xa9/0xd0 [ 823.218718] ? save_stack+0x43/0xd0 [ 823.222381] ? kasan_slab_alloc+0x12/0x20 [ 823.226547] ? kmem_cache_alloc+0x12e/0x730 [ 823.230885] ? __kernfs_new_node+0x127/0x8d0 [ 823.230897] ? kernfs_new_node+0x95/0x120 [ 823.230936] ? internal_create_group+0x5fc/0xd80 [ 823.230950] ? sysfs_create_group+0x1f/0x30 [ 823.230967] ? lo_ioctl+0x1307/0x1d60 05:58:12 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x6) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'bridge0\x00', {0x2, 0x4e24, @remote}}) setrlimit(0xf, &(0x7f0000000100)={0x1, 0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = memfd_create(&(0x7f0000000240)='/dev/infiniband/rdma_cm\x00', 0x6) write$apparmor_current(r1, &(0x7f0000000300)=@hat={'permhat ', 0x3, 0x5e, ['s\x00', '/dev/infiniband/rdma_cm\x00', 'gre0\x00', 'GPL\x00']}, 0x3e) r2 = socket(0x848000000015, 0x805, 0x0) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f00000001c0)={0xfa79, {0x2, 0x4e23, @rand_addr}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, {0x2, 0x4e23, @broadcast}, 0x1, 0xfffffffffffffff8, 0x100000000, 0x1, 0x1000, &(0x7f0000000180)='gre0\x00', 0xfffffffffffffffb, 0x41, 0x2}) dup3(r0, r2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000000)={0xffffffffffff1a74, 0x7f, 0xffffffffffffffff, 0x7, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r4}}, 0x48) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x8, 0x110, r0, 0x0) [ 823.252398] ? blkdev_ioctl+0x98e/0x21b0 [ 823.256466] ? block_ioctl+0xee/0x130 [ 823.260278] ? do_vfs_ioctl+0x1de/0x1790 [ 823.264346] ? ksys_ioctl+0xa9/0xd0 [ 823.268027] ? __x64_sys_ioctl+0x73/0xb0 [ 823.272127] ? do_syscall_64+0x1b9/0x820 [ 823.276223] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.281612] ? find_held_lock+0x36/0x1c0 [ 823.285705] idr_alloc_u32+0x1d4/0x3a0 [ 823.289604] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 823.294479] ? lock_acquire+0x1ed/0x520 [ 823.298489] ? __kernfs_new_node+0x14e/0x8d0 [ 823.298505] ? __lock_is_held+0xb5/0x140 [ 823.298525] idr_alloc_cyclic+0x166/0x350 [ 823.307003] ? idr_alloc+0x1b0/0x1b0 [ 823.307019] ? __radix_tree_preload+0x1f7/0x280 [ 823.307043] __kernfs_new_node+0x1ee/0x8d0 [ 823.323856] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 823.328624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.334191] ? lock_is_held_type+0x210/0x210 [ 823.338679] ? debug_smp_processor_id+0x1c/0x20 [ 823.343389] ? perf_trace_lock+0x14d/0x7a0 [ 823.347629] ? __schedule+0x168a/0x21d0 05:58:12 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x3f350c0000000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f0000000500), r1}}, 0x18) [ 823.351614] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 823.356723] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 823.361835] ? zap_class+0x640/0x640 [ 823.365559] ? lock_is_held_type+0x210/0x210 [ 823.369980] ? zap_class+0x640/0x640 [ 823.373726] ? enqueue_task_fair+0x24d/0xa50 [ 823.378168] ? find_held_lock+0x36/0x1c0 [ 823.382266] kernfs_new_node+0x95/0x120 [ 823.386275] kernfs_create_dir_ns+0x4d/0x160 [ 823.390708] internal_create_group+0x5fc/0xd80 [ 823.395311] ? remove_files.isra.1+0x190/0x190 [ 823.399929] ? up_write+0x7b/0x220 [ 823.403482] ? down_write_nested+0x130/0x130 [ 823.407902] ? down_read+0x120/0x120 [ 823.411647] sysfs_create_group+0x1f/0x30 [ 823.411664] lo_ioctl+0x1307/0x1d60 [ 823.411705] ? lo_rw_aio+0x1ef0/0x1ef0 [ 823.419474] blkdev_ioctl+0x98e/0x21b0 [ 823.427251] ? blkpg_ioctl+0xc10/0xc10 [ 823.431166] ? lock_downgrade+0x900/0x900 [ 823.435366] ? check_preemption_disabled+0x48/0x280 [ 823.440410] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 823.445348] ? kasan_check_read+0x11/0x20 [ 823.449505] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 823.454791] ? rcu_softirq_qs+0x20/0x20 [ 823.458799] ? __fget+0x4d1/0x740 [ 823.462286] ? ksys_dup3+0x680/0x680 [ 823.466050] block_ioctl+0xee/0x130 [ 823.469691] ? blkdev_fallocate+0x400/0x400 [ 823.474045] do_vfs_ioctl+0x1de/0x1790 [ 823.477957] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 823.483537] ? ioctl_preallocate+0x300/0x300 [ 823.487950] ? __fget_light+0x2e9/0x430 [ 823.491938] ? fget_raw+0x20/0x20 [ 823.495412] ? rcu_read_lock_sched_held+0x14f/0x180 [ 823.500434] ? kmem_cache_free+0x24f/0x290 [ 823.504703] ? putname+0xf7/0x130 [ 823.508197] ? do_syscall_64+0x9a/0x820 [ 823.512180] ? do_syscall_64+0x9a/0x820 [ 823.516188] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 823.520787] ? security_file_ioctl+0x94/0xc0 [ 823.525209] ksys_ioctl+0xa9/0xd0 [ 823.528674] __x64_sys_ioctl+0x73/0xb0 [ 823.532575] do_syscall_64+0x1b9/0x820 [ 823.536500] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 823.541936] ? syscall_return_slowpath+0x5e0/0x5e0 [ 823.546877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 823.551730] ? trace_hardirqs_on_caller+0x310/0x310 [ 823.556748] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 823.561759] ? prepare_exit_to_usermode+0x291/0x3b0 [ 823.566793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 823.571629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.576800] RIP: 0033:0x4573d7 [ 823.579992] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 823.598904] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 823.606614] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 823.613861] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 823.621127] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 823.628377] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 823.635636] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 05:58:12 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 05:58:12 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0xde513001) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:12 executing program 3 (fault-call:3 fault-nth:13): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:12 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x26e, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0xffffffffffffffb1) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000000)={0xa, 0x4, 0xfa00, {r1}}, 0xc) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 05:58:12 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfec00000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:12 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:12 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f00000000c0)) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000000)=0x1f, &(0x7f0000000080)=0x4) r3 = getegid() ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) setfsgid(r3) 05:58:12 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000480)={0x6, 0x0, [{0x100000, 0xf1, &(0x7f0000000100)=""/241}, {0x4, 0xcd, &(0x7f0000000200)=""/205}, {0x10000, 0x69, &(0x7f0000000040)=""/105}, {0x1000, 0x38, &(0x7f0000000300)=""/56}, {0x1, 0x63, &(0x7f0000000340)=""/99}, {0x4, 0x98, &(0x7f00000003c0)=""/152}]}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 823.858464] FAULT_INJECTION: forcing a failure. [ 823.858464] name failslab, interval 1, probability 0, space 0, times 0 [ 823.870170] CPU: 1 PID: 22509 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 823.877541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.886907] Call Trace: [ 823.889524] dump_stack+0x244/0x39d [ 823.893174] ? dump_stack_print_info.cold.1+0x20/0x20 [ 823.898386] ? debug_smp_processor_id+0x1c/0x20 [ 823.903069] ? perf_trace_lock+0x14d/0x7a0 05:58:13 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) fcntl$setlease(r0, 0x400, 0x0) r1 = memfd_create(&(0x7f0000000080)='$vmnet1cgroup\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000440)={0x1, {0x77359400}, 0x100010000, 0x400000000000}) open_by_handle_at(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="150000001005e968770d2f883db3ca0000000040000000"], 0x80000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) dup3(r2, r3, 0x0) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r4, r0) [ 823.907321] should_fail.cold.4+0xa/0x17 [ 823.911427] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 823.916545] ? perf_trace_lock+0x14d/0x7a0 [ 823.920800] ? lock_release+0xa00/0xa00 [ 823.924783] ? perf_trace_sched_process_exec+0x860/0x860 [ 823.930247] ? lock_is_held_type+0x210/0x210 [ 823.934669] ? check_preemption_disabled+0x48/0x280 [ 823.939724] ? zap_class+0x640/0x640 [ 823.943468] ? find_held_lock+0x36/0x1c0 [ 823.943490] ? __lock_is_held+0xb5/0x140 [ 823.943518] ? perf_trace_sched_process_exec+0x860/0x860 [ 823.957055] ? kernfs_activate+0x21a/0x2c0 [ 823.957085] __should_failslab+0x124/0x180 [ 823.957110] should_failslab+0x9/0x14 [ 823.969340] kmem_cache_alloc+0x2be/0x730 [ 823.973496] ? lock_downgrade+0x900/0x900 [ 823.977659] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 823.982704] __kernfs_new_node+0x127/0x8d0 [ 823.987024] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 823.991803] ? zap_class+0x640/0x640 [ 823.995536] ? __lock_is_held+0xb5/0x140 [ 823.999627] ? wait_for_completion+0x8a0/0x8a0 [ 824.004240] ? mutex_unlock+0xd/0x10 [ 824.007960] ? kernfs_activate+0x21a/0x2c0 [ 824.012210] ? kernfs_walk_and_get_ns+0x340/0x340 [ 824.017063] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 824.022624] ? kernfs_link_sibling+0x1d2/0x3b0 [ 824.027251] kernfs_new_node+0x95/0x120 [ 824.031265] __kernfs_create_file+0x5a/0x340 [ 824.035701] sysfs_add_file_mode_ns+0x222/0x530 [ 824.040386] internal_create_group+0x3df/0xd80 [ 824.045014] ? remove_files.isra.1+0x190/0x190 [ 824.049615] ? up_write+0x7b/0x220 [ 824.053165] ? down_write_nested+0x130/0x130 05:58:13 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) [ 824.057580] ? down_read+0x120/0x120 [ 824.061332] sysfs_create_group+0x1f/0x30 [ 824.065545] lo_ioctl+0x1307/0x1d60 [ 824.069193] ? lo_rw_aio+0x1ef0/0x1ef0 [ 824.073098] blkdev_ioctl+0x98e/0x21b0 [ 824.076996] ? blkpg_ioctl+0xc10/0xc10 [ 824.080892] ? lock_downgrade+0x900/0x900 [ 824.085068] ? check_preemption_disabled+0x48/0x280 [ 824.090100] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 824.090119] ? kasan_check_read+0x11/0x20 [ 824.090135] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 824.090151] ? rcu_softirq_qs+0x20/0x20 [ 824.090180] ? __fget+0x4d1/0x740 [ 824.090207] ? ksys_dup3+0x680/0x680 [ 824.099323] block_ioctl+0xee/0x130 [ 824.099340] ? blkdev_fallocate+0x400/0x400 [ 824.099359] do_vfs_ioctl+0x1de/0x1790 [ 824.099385] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 824.133146] ? ioctl_preallocate+0x300/0x300 [ 824.137578] ? __fget_light+0x2e9/0x430 [ 824.141587] ? fget_raw+0x20/0x20 [ 824.145064] ? rcu_read_lock_sched_held+0x14f/0x180 [ 824.150099] ? kmem_cache_free+0x24f/0x290 [ 824.154353] ? putname+0xf7/0x130 05:58:13 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', "766d6e6574302c2b76626f786e657430656d317d6c6fe75b5b296d643573756d626465762c5b736563757269747900"}, &(0x7f00000000c0)='\x00', 0x1, 0x1) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) [ 824.157843] ? do_syscall_64+0x9a/0x820 [ 824.161844] ? do_syscall_64+0x9a/0x820 [ 824.165828] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 824.170427] ? security_file_ioctl+0x94/0xc0 [ 824.174856] ksys_ioctl+0xa9/0xd0 [ 824.178330] __x64_sys_ioctl+0x73/0xb0 [ 824.182234] do_syscall_64+0x1b9/0x820 [ 824.186131] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 824.191594] ? syscall_return_slowpath+0x5e0/0x5e0 [ 824.196533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 824.201389] ? trace_hardirqs_on_caller+0x310/0x310 [ 824.206437] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 824.211486] ? prepare_exit_to_usermode+0x291/0x3b0 [ 824.216526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 824.221386] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.226588] RIP: 0033:0x4573d7 [ 824.229795] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 824.248718] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:58:13 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r0, r1) 05:58:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfffffff5}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 824.256435] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 824.263714] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 824.270987] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 824.270998] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 824.271008] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 05:58:13 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = msgget(0x1, 0x8) msgctl$MSG_STAT(r1, 0xb, &(0x7f00000000c0)=""/208) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r2}}, 0x48) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) 05:58:13 executing program 3 (fault-call:3 fault-nth:14): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 05:58:13 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x6}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 05:58:13 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x682180, 0x0) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f0000000100)={[], 0x0, 0x8001, 0x0, 0x0, 0x8, 0xd000, 0x5000, [], 0x4}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 05:58:13 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 05:58:13 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x0, @tick=0x80000000, 0x800, {0x9, 0x8000}, 0x0, 0x0, 0x2}) 05:58:13 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x2}}, 0xffffffffffffff64) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) [ 824.556714] FAULT_INJECTION: forcing a failure. [ 824.556714] name failslab, interval 1, probability 0, space 0, times 0 [ 824.618764] CPU: 1 PID: 22563 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 824.626163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.635510] Call Trace: [ 824.638105] dump_stack+0x244/0x39d [ 824.641740] ? dump_stack_print_info.cold.1+0x20/0x20 [ 824.646955] ? debug_smp_processor_id+0x1c/0x20 [ 824.651623] ? perf_trace_lock+0x14d/0x7a0 [ 824.655875] should_fail.cold.4+0xa/0x17 [ 824.659974] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 824.665078] ? perf_trace_lock+0x14d/0x7a0 [ 824.669312] ? lock_release+0xa00/0xa00 [ 824.673333] ? perf_trace_sched_process_exec+0x860/0x860 [ 824.678821] ? lock_is_held_type+0x210/0x210 [ 824.683232] ? check_preemption_disabled+0x48/0x280 [ 824.688262] ? zap_class+0x640/0x640 [ 824.692021] ? find_held_lock+0x36/0x1c0 [ 824.696089] ? __lock_is_held+0xb5/0x140 [ 824.700180] ? perf_trace_sched_process_exec+0x860/0x860 [ 824.705624] ? kernfs_activate+0x21a/0x2c0 [ 824.709865] __should_failslab+0x124/0x180 [ 824.714112] should_failslab+0x9/0x14 [ 824.717917] kmem_cache_alloc+0x2be/0x730 [ 824.722077] ? lock_downgrade+0x900/0x900 [ 824.726242] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 824.731261] __kernfs_new_node+0x127/0x8d0 [ 824.735500] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 824.740268] ? zap_class+0x640/0x640 [ 824.744024] ? __lock_is_held+0xb5/0x140 [ 824.748085] ? wait_for_completion+0x8a0/0x8a0 [ 824.752691] ? mutex_unlock+0xd/0x10 [ 824.756421] ? kernfs_activate+0x21a/0x2c0 [ 824.760661] ? kernfs_walk_and_get_ns+0x340/0x340 [ 824.765512] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 824.771058] ? kernfs_link_sibling+0x1d2/0x3b0 [ 824.775652] kernfs_new_node+0x95/0x120 [ 824.779638] __kernfs_create_file+0x5a/0x340 [ 824.784060] sysfs_add_file_mode_ns+0x222/0x530 [ 824.788743] internal_create_group+0x3df/0xd80 [ 824.793362] ? remove_files.isra.1+0x190/0x190 [ 824.797965] ? up_write+0x7b/0x220 [ 824.801509] ? down_write_nested+0x130/0x130 [ 824.805926] ? down_read+0x120/0x120 [ 824.809656] sysfs_create_group+0x1f/0x30 [ 824.813810] lo_ioctl+0x1307/0x1d60 [ 824.817478] ? lo_rw_aio+0x1ef0/0x1ef0 [ 824.821376] blkdev_ioctl+0x98e/0x21b0 [ 824.825270] ? blkpg_ioctl+0xc10/0xc10 [ 824.829157] ? lock_downgrade+0x900/0x900 [ 824.833307] ? check_preemption_disabled+0x48/0x280 [ 824.838329] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 824.843257] ? kasan_check_read+0x11/0x20 [ 824.847406] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 824.852688] ? rcu_softirq_qs+0x20/0x20 [ 824.856671] ? __fget+0x4d1/0x740 [ 824.860133] ? ksys_dup3+0x680/0x680 [ 824.863977] block_ioctl+0xee/0x130 [ 824.867643] ? blkdev_fallocate+0x400/0x400 [ 824.871974] do_vfs_ioctl+0x1de/0x1790 [ 824.875896] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 824.881442] ? ioctl_preallocate+0x300/0x300 [ 824.885864] ? __fget_light+0x2e9/0x430 [ 824.889859] ? fget_raw+0x20/0x20 [ 824.893316] ? rcu_read_lock_sched_held+0x14f/0x180 [ 824.898330] ? kmem_cache_free+0x24f/0x290 [ 824.902567] ? putname+0xf7/0x130 [ 824.906021] ? do_syscall_64+0x9a/0x820 [ 824.910019] ? do_syscall_64+0x9a/0x820 [ 824.914023] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 824.918616] ? security_file_ioctl+0x94/0xc0 [ 824.923040] ksys_ioctl+0xa9/0xd0 [ 824.926512] __x64_sys_ioctl+0x73/0xb0 [ 824.930398] do_syscall_64+0x1b9/0x820 [ 824.934283] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 824.939646] ? syscall_return_slowpath+0x5e0/0x5e0 [ 824.944589] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 824.949435] ? trace_hardirqs_on_caller+0x310/0x310 [ 824.954466] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 824.959484] ? prepare_exit_to_usermode+0x291/0x3b0 [ 824.964525] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 824.969378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.974567] RIP: 0033:0x4573d7 [ 824.977789] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 824.996691] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 825.004423] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 825.011706] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 03:33:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 825.018987] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 825.026249] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 825.033514] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:20 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0x3, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:20 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:20 executing program 2: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) getpriority(0x0, r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xfffffffffffffe14, 0xfa00, {0x0, &(0x7f0000000040), 0x13f}}, 0x20) 03:33:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xffffffff00000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:20 executing program 3 (fault-call:3 fault-nth:15): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:20 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) pread64(r0, &(0x7f0000000140)=""/230, 0xe6, 0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x68, &(0x7f0000000040)="e138b3028b9b882095ca52c6b25185115bf8743685387c27937ec2089f53acdb63895d27a32d966f9aa53c7b8e17f179bc0d1d42acff546e3511595b8dd4b15ea513b1ab66ee40e550b15db471d1416900283ab82ad1ba6cd2b3be012a55e73d574faad64e25362e"}) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000240)={0xbf51, {0x2, 0x4e23, @loopback}, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e22, @rand_addr=0x779e}, 0x0, 0x0, 0x2, 0x8, 0x100000001, 0x0, 0x80000000, 0x1, 0x2a}) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x200000, 0x0) ioctl$TCGETA(r4, 0x5405, &(0x7f0000000340)) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r5 = dup3(r2, r2, 0x80000) ioctl$TUNGETFEATURES(r5, 0x800454cf, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:20 executing program 2: eventfd(0xfffffffffffffff7) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) 03:33:20 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 825.283200] FAULT_INJECTION: forcing a failure. [ 825.283200] name failslab, interval 1, probability 0, space 0, times 0 [ 825.355074] CPU: 1 PID: 22609 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 825.362485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.371844] Call Trace: [ 825.371875] dump_stack+0x244/0x39d [ 825.371903] ? dump_stack_print_info.cold.1+0x20/0x20 [ 825.371945] ? debug_smp_processor_id+0x1c/0x20 [ 825.371970] ? perf_trace_lock+0x14d/0x7a0 [ 825.383407] should_fail.cold.4+0xa/0x17 [ 825.383445] ? fault_create_debugfs_attr+0x1f0/0x1f0 03:33:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x10000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 825.383459] ? perf_trace_lock+0x14d/0x7a0 [ 825.383496] ? lock_release+0xa00/0xa00 [ 825.409742] ? perf_trace_sched_process_exec+0x860/0x860 [ 825.415218] ? lock_is_held_type+0x210/0x210 [ 825.419643] ? check_preemption_disabled+0x48/0x280 [ 825.424676] ? zap_class+0x640/0x640 [ 825.428422] ? find_held_lock+0x36/0x1c0 [ 825.432504] ? __lock_is_held+0xb5/0x140 [ 825.436601] ? perf_trace_sched_process_exec+0x860/0x860 [ 825.442070] ? kernfs_activate+0x21a/0x2c0 [ 825.446336] __should_failslab+0x124/0x180 [ 825.450584] should_failslab+0x9/0x14 [ 825.450604] kmem_cache_alloc+0x2be/0x730 [ 825.450623] ? lock_downgrade+0x900/0x900 [ 825.450645] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 825.450667] __kernfs_new_node+0x127/0x8d0 [ 825.458607] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 825.476725] ? zap_class+0x640/0x640 [ 825.480463] ? __lock_is_held+0xb5/0x140 [ 825.484543] ? wait_for_completion+0x8a0/0x8a0 [ 825.489159] ? mutex_unlock+0xd/0x10 [ 825.492888] ? kernfs_activate+0x21a/0x2c0 [ 825.497149] ? kernfs_walk_and_get_ns+0x340/0x340 [ 825.502018] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 825.507575] ? kernfs_link_sibling+0x1d2/0x3b0 [ 825.512180] kernfs_new_node+0x95/0x120 [ 825.516184] __kernfs_create_file+0x5a/0x340 [ 825.520628] sysfs_add_file_mode_ns+0x222/0x530 [ 825.525327] internal_create_group+0x3df/0xd80 [ 825.529944] ? remove_files.isra.1+0x190/0x190 [ 825.534538] ? up_write+0x7b/0x220 [ 825.538089] ? down_write_nested+0x130/0x130 [ 825.542513] ? down_read+0x120/0x120 [ 825.546236] sysfs_create_group+0x1f/0x30 [ 825.550392] lo_ioctl+0x1307/0x1d60 [ 825.554033] ? lo_rw_aio+0x1ef0/0x1ef0 [ 825.557920] blkdev_ioctl+0x98e/0x21b0 [ 825.561800] ? blkpg_ioctl+0xc10/0xc10 [ 825.565700] ? lock_downgrade+0x900/0x900 [ 825.569850] ? check_preemption_disabled+0x48/0x280 [ 825.574868] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 825.579806] ? kasan_check_read+0x11/0x20 [ 825.583954] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 825.589232] ? rcu_softirq_qs+0x20/0x20 [ 825.593221] ? __fget+0x4d1/0x740 [ 825.596721] ? ksys_dup3+0x680/0x680 [ 825.600441] block_ioctl+0xee/0x130 [ 825.604057] ? blkdev_fallocate+0x400/0x400 [ 825.608384] do_vfs_ioctl+0x1de/0x1790 [ 825.612282] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 825.617828] ? ioctl_preallocate+0x300/0x300 [ 825.622231] ? __fget_light+0x2e9/0x430 [ 825.626214] ? fget_raw+0x20/0x20 [ 825.629702] ? rcu_read_lock_sched_held+0x14f/0x180 [ 825.634730] ? kmem_cache_free+0x24f/0x290 [ 825.638976] ? putname+0xf7/0x130 [ 825.642433] ? do_syscall_64+0x9a/0x820 [ 825.646407] ? do_syscall_64+0x9a/0x820 [ 825.650440] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 825.655019] ? security_file_ioctl+0x94/0xc0 [ 825.659425] ksys_ioctl+0xa9/0xd0 [ 825.662877] __x64_sys_ioctl+0x73/0xb0 [ 825.666761] do_syscall_64+0x1b9/0x820 [ 825.670655] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 825.676036] ? syscall_return_slowpath+0x5e0/0x5e0 [ 825.680981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 825.685838] ? trace_hardirqs_on_caller+0x310/0x310 [ 825.690852] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 825.695879] ? prepare_exit_to_usermode+0x291/0x3b0 [ 825.700943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 825.705789] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.710972] RIP: 0033:0x4573d7 [ 825.714176] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 825.733397] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 825.741118] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 825.748381] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 825.755652] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 825.762949] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 825.770213] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:20 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000000), 0x2) dup2(r1, r0) 03:33:20 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:20 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x7}, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x48) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) 03:33:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x700000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:20 executing program 3 (fault-call:3 fault-nth:16): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:20 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) r3 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x20080) r4 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x8000, 0x200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000200)=0xe8) r6 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000340)=0xe8) write$P9_RSTATu(r4, &(0x7f0000000380)={0x77, 0x7d, 0x1, {{0x0, 0x5b, 0xffffffffffffffc1, 0x100000001, {0x1, 0x1, 0x7}, 0x8000000, 0x0, 0x7, 0x8, 0x1, ',', 0xc, '/dev/video#\x00', 0x7, '!(*\'A}]', 0x14, 'posix_acl_access##:@'}, 0x7, "fa26657468317b", r5, r6, r7}}, 0x77) ioctl$VIDIOC_SUBDEV_S_CROP(r3, 0xc038563c, &(0x7f0000000040)={0x1, 0x9, {0x1ba, 0x6, 0xfa9, 0x4}}) 03:33:20 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xff00}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:20 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:20 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) fcntl$setlease(r0, 0x400, 0x0) r1 = memfd_create(&(0x7f0000000080)='$vmnet1cgroup\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000440)={0x1, {0x77359400}, 0x100010000, 0x400000000000}) open_by_handle_at(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="150000001005e968770d2f883db3ca0000000040000000"], 0x80000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) dup3(r2, r3, 0x0) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r4, r0) [ 826.022461] FAULT_INJECTION: forcing a failure. [ 826.022461] name failslab, interval 1, probability 0, space 0, times 0 [ 826.038961] CPU: 1 PID: 22668 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 826.046354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.055745] Call Trace: [ 826.058368] dump_stack+0x244/0x39d [ 826.062030] ? dump_stack_print_info.cold.1+0x20/0x20 [ 826.067250] ? debug_smp_processor_id+0x1c/0x20 [ 826.067271] ? perf_trace_lock+0x14d/0x7a0 [ 826.067297] should_fail.cold.4+0xa/0x17 [ 826.067321] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 826.067336] ? perf_trace_lock+0x14d/0x7a0 [ 826.067356] ? lock_release+0xa00/0xa00 [ 826.085435] ? perf_trace_sched_process_exec+0x860/0x860 [ 826.085457] ? lock_is_held_type+0x210/0x210 [ 826.085475] ? check_preemption_disabled+0x48/0x280 [ 826.085496] ? zap_class+0x640/0x640 [ 826.085525] ? find_held_lock+0x36/0x1c0 [ 826.085547] ? __lock_is_held+0xb5/0x140 [ 826.093773] ? perf_trace_sched_process_exec+0x860/0x860 [ 826.093790] ? kernfs_activate+0x21a/0x2c0 [ 826.093821] __should_failslab+0x124/0x180 [ 826.093844] should_failslab+0x9/0x14 [ 826.093862] kmem_cache_alloc+0x2be/0x730 [ 826.093882] ? lock_downgrade+0x900/0x900 [ 826.116538] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 826.116564] __kernfs_new_node+0x127/0x8d0 [ 826.116590] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 826.116607] ? zap_class+0x640/0x640 [ 826.116635] ? __lock_is_held+0xb5/0x140 [ 826.130378] ? wait_for_completion+0x8a0/0x8a0 03:33:20 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 826.130412] ? mutex_unlock+0xd/0x10 [ 826.130427] ? kernfs_activate+0x21a/0x2c0 [ 826.130447] ? kernfs_walk_and_get_ns+0x340/0x340 [ 826.130467] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 826.130481] ? kernfs_link_sibling+0x1d2/0x3b0 [ 826.130506] kernfs_new_node+0x95/0x120 [ 826.130527] __kernfs_create_file+0x5a/0x340 [ 826.204536] sysfs_add_file_mode_ns+0x222/0x530 [ 826.209408] internal_create_group+0x3df/0xd80 [ 826.214117] ? remove_files.isra.1+0x190/0x190 [ 826.218724] ? up_write+0x7b/0x220 [ 826.222279] ? down_write_nested+0x130/0x130 [ 826.226718] ? down_read+0x120/0x120 [ 826.230455] sysfs_create_group+0x1f/0x30 [ 826.234602] lo_ioctl+0x1307/0x1d60 [ 826.238258] ? lo_rw_aio+0x1ef0/0x1ef0 [ 826.242159] blkdev_ioctl+0x98e/0x21b0 [ 826.246047] ? blkpg_ioctl+0xc10/0xc10 [ 826.249945] ? lock_downgrade+0x900/0x900 [ 826.254093] ? check_preemption_disabled+0x48/0x280 [ 826.259121] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 826.264063] ? kasan_check_read+0x11/0x20 [ 826.268217] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 826.273504] ? rcu_softirq_qs+0x20/0x20 [ 826.277493] ? __fget+0x4d1/0x740 [ 826.280975] ? ksys_dup3+0x680/0x680 [ 826.284759] block_ioctl+0xee/0x130 [ 826.288383] ? blkdev_fallocate+0x400/0x400 [ 826.292717] do_vfs_ioctl+0x1de/0x1790 [ 826.296613] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 826.302149] ? ioctl_preallocate+0x300/0x300 [ 826.306564] ? __fget_light+0x2e9/0x430 [ 826.310549] ? fget_raw+0x20/0x20 [ 826.314007] ? rcu_read_lock_sched_held+0x14f/0x180 [ 826.319022] ? kmem_cache_free+0x24f/0x290 [ 826.323270] ? putname+0xf7/0x130 [ 826.326750] ? do_syscall_64+0x9a/0x820 [ 826.330735] ? do_syscall_64+0x9a/0x820 [ 826.334711] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 826.339322] ? security_file_ioctl+0x94/0xc0 [ 826.343749] ksys_ioctl+0xa9/0xd0 [ 826.347217] __x64_sys_ioctl+0x73/0xb0 [ 826.351111] do_syscall_64+0x1b9/0x820 [ 826.354997] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 826.360356] ? syscall_return_slowpath+0x5e0/0x5e0 [ 826.365279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.370120] ? trace_hardirqs_on_caller+0x310/0x310 [ 826.375150] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 826.380176] ? prepare_exit_to_usermode+0x291/0x3b0 [ 826.385225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.390083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.395266] RIP: 0033:0x4573d7 [ 826.398466] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:20 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) fcntl$setlease(r0, 0x400, 0x0) r1 = memfd_create(&(0x7f0000000080)='$vmnet1cgroup\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000440)={0x1, {0x77359400}, 0x100010000, 0x400000000000}) open_by_handle_at(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="150000001005e968770d2f883db3ca0000000040000000"], 0x80000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) dup3(r2, r3, 0x0) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r4, r0) [ 826.417391] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 826.425105] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 826.432377] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 826.439662] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 826.446951] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 826.454216] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:20 executing program 3 (fault-call:3 fault-nth:17): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:20 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xc0fe}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:20 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) getgroups(0xcf, &(0x7f0000000100)) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x100) dup2(r1, r0) [ 826.635222] FAULT_INJECTION: forcing a failure. [ 826.635222] name failslab, interval 1, probability 0, space 0, times 0 [ 826.647003] CPU: 1 PID: 22699 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 826.654394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.663767] Call Trace: [ 826.666384] dump_stack+0x244/0x39d [ 826.670046] ? dump_stack_print_info.cold.1+0x20/0x20 [ 826.675375] ? debug_smp_processor_id+0x1c/0x20 [ 826.680069] ? perf_trace_lock+0x14d/0x7a0 [ 826.684342] should_fail.cold.4+0xa/0x17 [ 826.688431] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 826.693555] ? perf_trace_lock+0x14d/0x7a0 [ 826.697812] ? lock_release+0xa00/0xa00 [ 826.701804] ? perf_trace_sched_process_exec+0x860/0x860 [ 826.707282] ? lock_is_held_type+0x210/0x210 [ 826.711716] ? check_preemption_disabled+0x48/0x280 [ 826.716753] ? zap_class+0x640/0x640 [ 826.720510] ? find_held_lock+0x36/0x1c0 [ 826.724609] ? __lock_is_held+0xb5/0x140 [ 826.728715] ? perf_trace_sched_process_exec+0x860/0x860 03:33:20 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = msgget$private(0x0, 0x0) r2 = geteuid() r3 = getgid() r4 = getuid() fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) r7 = fcntl$getown(r0, 0x9) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000100)={{0xfff, r2, r3, r4, r5, 0x2, 0x32}, 0x80000001, 0x5, 0x7, 0x6f49, 0x6, 0x4, r6, r7}) r8 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r8, r0) 03:33:20 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 826.734185] ? kernfs_activate+0x21a/0x2c0 [ 826.738454] __should_failslab+0x124/0x180 [ 826.742723] should_failslab+0x9/0x14 [ 826.746535] kmem_cache_alloc+0x2be/0x730 [ 826.750700] ? lock_downgrade+0x900/0x900 [ 826.754882] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 826.759971] __kernfs_new_node+0x127/0x8d0 [ 826.764239] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 826.769025] ? zap_class+0x640/0x640 [ 826.772782] ? __lock_is_held+0xb5/0x140 [ 826.776868] ? wait_for_completion+0x8a0/0x8a0 [ 826.781484] ? mutex_unlock+0xd/0x10 [ 826.785213] ? kernfs_activate+0x21a/0x2c0 [ 826.789469] ? kernfs_walk_and_get_ns+0x340/0x340 [ 826.794336] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 826.799890] ? kernfs_link_sibling+0x1d2/0x3b0 [ 826.804493] kernfs_new_node+0x95/0x120 [ 826.808491] __kernfs_create_file+0x5a/0x340 [ 826.812934] sysfs_add_file_mode_ns+0x222/0x530 [ 826.817626] internal_create_group+0x3df/0xd80 [ 826.822229] ? remove_files.isra.1+0x190/0x190 [ 826.826829] ? up_write+0x7b/0x220 [ 826.830391] ? down_write_nested+0x130/0x130 [ 826.834816] ? down_read+0x120/0x120 [ 826.838565] sysfs_create_group+0x1f/0x30 [ 826.842735] lo_ioctl+0x1307/0x1d60 [ 826.846384] ? lo_rw_aio+0x1ef0/0x1ef0 [ 826.850294] blkdev_ioctl+0x98e/0x21b0 [ 826.854197] ? blkpg_ioctl+0xc10/0xc10 [ 826.858084] ? lock_downgrade+0x900/0x900 [ 826.862241] ? check_preemption_disabled+0x48/0x280 [ 826.867286] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 826.872237] ? kasan_check_read+0x11/0x20 [ 826.876412] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 826.881706] ? rcu_softirq_qs+0x20/0x20 [ 826.885692] ? __fget+0x4d1/0x740 [ 826.889148] ? ksys_dup3+0x680/0x680 [ 826.892883] block_ioctl+0xee/0x130 [ 826.896522] ? blkdev_fallocate+0x400/0x400 [ 826.900851] do_vfs_ioctl+0x1de/0x1790 [ 826.904743] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 826.910277] ? ioctl_preallocate+0x300/0x300 [ 826.914682] ? __fget_light+0x2e9/0x430 [ 826.918659] ? fget_raw+0x20/0x20 [ 826.922114] ? rcu_read_lock_sched_held+0x14f/0x180 [ 826.927130] ? kmem_cache_free+0x24f/0x290 [ 826.931365] ? putname+0xf7/0x130 [ 826.934820] ? do_syscall_64+0x9a/0x820 [ 826.938789] ? do_syscall_64+0x9a/0x820 [ 826.942763] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 826.947343] ? security_file_ioctl+0x94/0xc0 [ 826.951749] ksys_ioctl+0xa9/0xd0 [ 826.955202] __x64_sys_ioctl+0x73/0xb0 [ 826.959088] do_syscall_64+0x1b9/0x820 [ 826.962973] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 826.968336] ? syscall_return_slowpath+0x5e0/0x5e0 [ 826.973261] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.978103] ? trace_hardirqs_on_caller+0x310/0x310 [ 826.983118] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 826.988134] ? prepare_exit_to_usermode+0x291/0x3b0 [ 826.993157] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 826.998005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.003194] RIP: 0033:0x4573d7 [ 827.006385] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.025283] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 827.032994] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 827.040292] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 827.047555] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 827.054819] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 827.062081] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:21 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x103) write$P9_RFSYNC(r3, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:21 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) dup2(r1, r0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)=0x7ff) 03:33:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x200000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:21 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) fcntl$setlease(r0, 0x400, 0x0) r1 = memfd_create(&(0x7f0000000080)='$vmnet1cgroup\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000440)={0x1, {0x77359400}, 0x100010000, 0x400000000000}) open_by_handle_at(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="150000001005e968770d2f883db3ca0000000040000000"], 0x80000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) dup3(r2, r3, 0x0) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r4, r0) 03:33:21 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:21 executing program 3 (fault-call:3 fault-nth:18): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:21 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x600000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:21 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000080)='^mime_type\x00', 0xffffffffffffffff], &(0x7f00000002c0)=[&(0x7f0000000100)='lovmnet0\x00', &(0x7f0000000140)='cgroup', &(0x7f0000000180)='-GPL\x00', &(0x7f00000001c0)="e17b2500", &(0x7f0000000200)='\x00', &(0x7f0000000240)='%\x00', &(0x7f0000000280)='vmnet0@lo\\\x00'], 0x1000) dup2(r1, r0) [ 827.290456] FAULT_INJECTION: forcing a failure. [ 827.290456] name failslab, interval 1, probability 0, space 0, times 0 03:33:21 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) fcntl$setsig(r0, 0xa, 0x21) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x0, 0x5, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 827.339320] CPU: 1 PID: 22746 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 827.346732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.356102] Call Trace: [ 827.358726] dump_stack+0x244/0x39d [ 827.362394] ? dump_stack_print_info.cold.1+0x20/0x20 [ 827.367627] ? debug_smp_processor_id+0x1c/0x20 [ 827.372329] ? perf_trace_lock+0x14d/0x7a0 [ 827.376592] should_fail.cold.4+0xa/0x17 [ 827.376616] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 827.376636] ? perf_trace_lock+0x14d/0x7a0 [ 827.385817] ? lock_release+0xa00/0xa00 [ 827.385834] ? perf_trace_sched_process_exec+0x860/0x860 [ 827.385854] ? lock_is_held_type+0x210/0x210 [ 827.403936] ? check_preemption_disabled+0x48/0x280 [ 827.408981] ? zap_class+0x640/0x640 [ 827.412734] ? find_held_lock+0x36/0x1c0 [ 827.416826] ? __lock_is_held+0xb5/0x140 [ 827.420945] ? perf_trace_sched_process_exec+0x860/0x860 [ 827.426415] ? kernfs_activate+0x21a/0x2c0 [ 827.430694] __should_failslab+0x124/0x180 [ 827.434969] should_failslab+0x9/0x14 03:33:21 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x636, 0xa, &(0x7f0000001680)=[{&(0x7f00000000c0)="56d59f2c734a46088e68f18b06a6a37c808c903430e79558", 0x18, 0xd9}, {&(0x7f0000000100)="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", 0xfa, 0xe2}, {&(0x7f0000000200)="d3f5d423343cccb13c913a4171b89f9c30b29559ed30de4e07e1b5a7", 0x1c, 0x1}, {&(0x7f0000000240)="acceceeef1e2e3c0e842a1cfb01edcb241407c4c2643b90fbcac79ab0b98f17a0c2cafa74a77d0871b9701c83e154081dcbd0c2feb834001fa2b8095fae9690c035d9a0a0f16ef141f9440f22b856202738e0949db08f2dd149e645919be74fcaa830fe903c39c0ef4a1dc0a6bd858678f8381c93adbbc", 0x77, 0x3}, {&(0x7f0000000340)="dd01127d7401638c624f1acc0cc0a7ef3c9f2b75ec9930791d94f0815b5fc3188cf9c9222946846865277075151263ae0be92c8286076849c42785cfb77a2bc8f1bd230224ec9ff628729c301a2a7dd39b966ced9ffe8d1c3941ad5f9332d5e551377af28fa4495f683631a24ae7063a4f2e31deca3151bd979fc80de5052f7d0e2a44f1d27d76ec7797e893926ec7ff0fb2a7702aebc91a10fb17bde1ce42fb64e441aa320853cce63690483caedcf32d497411beb5875d228282bc58be145f2f5e99124884d68dada6d5434093d439747e247d0c1b61b1ba2812", 0xdb, 0x2}, {&(0x7f0000000440)="0c1cde520d20d009d02dedae3d2602156bd2e1db7f7cb866016a9a111165f38a7f7e76febe253febbbfbbfaa306d583291bd205548c5cfccd891ddc04069983f01651e3f175a14b1820c9401354aeff2f723d27a7dcfeeb4e6fd3c208c14e7914c43bf53b1d3a171618db9c20cc20de48b5c89c85ccf1c5c8ffd7cfb8a4c574e092c80033dad02d56f", 0x89, 0x80000001}, {&(0x7f0000000500)="0830992373a6625ae718260ac8c6ea6cd782f8c7c5c9bcef8fa9d98a7dff442cf72f8acf49bf186ec5488272747c7114fe0442fd4a8dacf43128c47a668860826f400e2eba081340a45881d1c8507db0", 0x50, 0x8c2}, {&(0x7f0000000580)="eec7f5884bc9f0968bb843551578c404bd71b0204cf26cfdfe4572a36ab45b3d417b86f7ca89690495c72f8cb64ad9f8462fa10f421a792b524f04d4fd0333d92751e6d0478bad6181ff263a173b91b994997a5c902cc72f6c38d9ef6019840946a26b0cce0aaff9480a38294fe765adbfaa479975070cd53e19dee356c208a8f8e57c7615cd0cfa2e6d29ee984318499de9c41f61ff5dec54bf1e36299cbe24ebc7ec82c4f6c6b07d5b42f256ca6e828e7034af3979968d98ff4ae41b786c4ac632f3f449717340cbbdee4a99736aba72cb48a10169199725b341e6ef3298421b1d08e06a10138b217b3ff7ec3f26060e16b1e07a", 0xf5, 0xffffffff}, {&(0x7f0000000680)="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", 0x1000, 0x3}, {&(0x7f00000002c0)="17", 0x1, 0x8}], 0x4043, &(0x7f0000001780)={[{@data_ordered='data=ordered'}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@noquota='noquota'}, {@data_err_ignore='data_err=ignore'}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x7e, 0x0, 0x34, 0x7f, 0x7a, 0x61], 0x2d, [0x31, 0x7b, 0x64], 0x2d, [0x34, 0x61, 0x35, 0x30], 0x2d, [0x75, 0x31, 0x66, 0x33], 0x2d, [0x0, 0x7f, 0x30, 0x34, 0x36, 0x37, 0x61]}}}, {@obj_type={'obj_type', 0x3d, 'trusted(-['}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@permit_directio='permit_directio'}]}) dup2(r1, r0) 03:33:21 executing program 4: r0 = epoll_create1(0x7fffc) r1 = timerfd_create(0x4001, 0x2000000000000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x1ffffffe}) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000040)={{0x77359400}, {r2, r3+30000000}}, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000021ff4)={0x2001}) [ 827.438794] kmem_cache_alloc+0x2be/0x730 [ 827.442977] ? lock_downgrade+0x900/0x900 [ 827.447157] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 827.452202] __kernfs_new_node+0x127/0x8d0 [ 827.456484] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 827.461265] ? zap_class+0x640/0x640 [ 827.465014] ? __lock_is_held+0xb5/0x140 [ 827.469099] ? wait_for_completion+0x8a0/0x8a0 [ 827.473730] ? mutex_unlock+0xd/0x10 [ 827.477471] ? kernfs_activate+0x21a/0x2c0 [ 827.481737] ? kernfs_walk_and_get_ns+0x340/0x340 [ 827.486609] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 827.492168] ? kernfs_link_sibling+0x1d2/0x3b0 [ 827.492193] kernfs_new_node+0x95/0x120 [ 827.492218] __kernfs_create_file+0x5a/0x340 [ 827.505197] sysfs_add_file_mode_ns+0x222/0x530 [ 827.509911] internal_create_group+0x3df/0xd80 [ 827.514555] ? remove_files.isra.1+0x190/0x190 [ 827.519159] ? up_write+0x7b/0x220 [ 827.522727] ? down_write_nested+0x130/0x130 [ 827.527157] ? down_read+0x120/0x120 [ 827.530907] sysfs_create_group+0x1f/0x30 [ 827.535099] lo_ioctl+0x1307/0x1d60 03:33:21 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r0, r0) 03:33:21 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x7, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 827.538760] ? lo_rw_aio+0x1ef0/0x1ef0 [ 827.542673] blkdev_ioctl+0x98e/0x21b0 [ 827.546591] ? blkpg_ioctl+0xc10/0xc10 [ 827.550500] ? lock_downgrade+0x900/0x900 [ 827.554673] ? check_preemption_disabled+0x48/0x280 [ 827.559732] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 827.564681] ? kasan_check_read+0x11/0x20 [ 827.568869] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 827.574171] ? rcu_softirq_qs+0x20/0x20 [ 827.578185] ? __fget+0x4d1/0x740 [ 827.581682] ? ksys_dup3+0x680/0x680 [ 827.585440] block_ioctl+0xee/0x130 [ 827.589088] ? blkdev_fallocate+0x400/0x400 [ 827.593433] do_vfs_ioctl+0x1de/0x1790 [ 827.597339] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 827.597361] ? ioctl_preallocate+0x300/0x300 [ 827.597379] ? __fget_light+0x2e9/0x430 [ 827.611340] ? fget_raw+0x20/0x20 [ 827.614825] ? rcu_read_lock_sched_held+0x14f/0x180 [ 827.619868] ? kmem_cache_free+0x24f/0x290 [ 827.624130] ? putname+0xf7/0x130 [ 827.627611] ? do_syscall_64+0x9a/0x820 [ 827.631610] ? do_syscall_64+0x9a/0x820 [ 827.635610] ? lockdep_hardirqs_on+0x3bb/0x5b0 03:33:21 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x4000000) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) [ 827.640349] ? security_file_ioctl+0x94/0xc0 [ 827.644786] ksys_ioctl+0xa9/0xd0 [ 827.648263] __x64_sys_ioctl+0x73/0xb0 [ 827.652178] do_syscall_64+0x1b9/0x820 [ 827.656086] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 827.661502] ? syscall_return_slowpath+0x5e0/0x5e0 [ 827.666540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 827.671410] ? trace_hardirqs_on_caller+0x310/0x310 [ 827.676451] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 827.681498] ? prepare_exit_to_usermode+0x291/0x3b0 03:33:21 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000180)=0x6) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x1, 0x180) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r2, r1) write$P9_RWALK(r1, &(0x7f0000000100)={0x7e, 0x6f, 0x1, {0x9, [{0x0, 0x4, 0x2}, {0x44, 0x0, 0x5}, {0x0, 0x4, 0x6}, {0x81, 0x0, 0x4}, {0x40, 0x0, 0x4}, {0x70, 0x3, 0x7}, {0x0, 0x4, 0x8}, {0xc4, 0x0, 0x2}, {0x90, 0x2, 0x1f}]}}, 0x7e) [ 827.686561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 827.691434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.696644] RIP: 0033:0x4573d7 [ 827.699854] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.718768] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 827.726981] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 03:33:21 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) fcntl$setlease(r0, 0x400, 0x0) r1 = memfd_create(&(0x7f0000000080)='$vmnet1cgroup\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000440)={0x1, {0x77359400}, 0x100010000, 0x400000000000}) open_by_handle_at(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="150000001005e968770d2f883db3ca0000000040000000"], 0x80000) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) dup3(r2, r3, 0x0) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r4, r0) 03:33:21 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 827.734266] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 827.734276] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 827.734286] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 827.734295] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:22 executing program 3 (fault-call:3 fault-nth:19): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:22 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = dup(r1) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000000)={0x6, 0xc6}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x2000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:22 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x1, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r2, r1) 03:33:22 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x14, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x18, @mcast2}, 0x80, &(0x7f0000000140)}, 0x0) modify_ldt$read_default(0x2, &(0x7f00000005c0)=""/246, 0xf6) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f00000006c0)) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000540)='./file0\x00') accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) sendmsg$xdp(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x2c, 0x1, r2, 0x39}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000180)="01786aa0ed19e81dfbc43da0a44eb3cf6aa9f104723fd6668a15a0aefd86f053ff1c19d1ce4dffcb0868d01e9327c60a4ff2377a2107098f7513d98a7416a15de756d5ca14bcd4879f1b7f1b2f15f330113d440f0de8d2bc5811407fb5e5528b611f038221ef86168529338fa000ee4cace528fa33d3b20d679d6cbf0b1ca3a39e5129af", 0x84}, {&(0x7f0000000340)="a5b51629ec86f8aeb49eeb3896e249e0fa4fba1f3043a6fbd807a0046d9fba4f48fdb50766a9b1cae3249f7c7c34790b4303d58acaad3a70345dffc7f1bea67b0e95703a542d9c6babf017a69078e171671e1218de35eb4f80efae5d8a3ac536d217a9edd6792e8b3ea41dac0f052251c54558316a3b3f9f053d9db2bb072349e9878c550125dd4afaa85062fccc210eede019f9dadf70d306445050e794fff68426a80469bf3b650cd5245e4a1eb683fe789733068b3addf4f24b23bbf3c85885c60685e382f88c3dd21277339f6b6cbbac9f52786c", 0xd6}, {&(0x7f0000000440)="000b195059ecdd136d6be9b28e3f6ad7dcd756ede02d90f349e7c455fe80de1c0f70106721310db3b1307f9df6391ba79100166488d1e2f65034d6774b56acbaf14427dbd4f51f820a4f0d113fb18dd29b2e0644617078d6d9793891ef26c24791b78a19714f009847d085e8c76d9a06eb8634c30ad46958f01087951f0359b669cf829ceb92e8d67759cfeb0f007cb5d4aac414593fb9e2f347f4797b66679c89482cadf334e9a469e14b9fc8b032743892a702a90a2841dea22b41ffa4f7daffe58054fc292c7fb44dfaa10dc4d92f65167b4cdbcf27f455fc2cd7a0c4533593a90101319ee8af74ac4d15ad", 0xed}], 0x3, 0x0, 0x0, 0x4000000}, 0x800) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000000)={0x1, 0x7, 0x7}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x12000, 0x20) fcntl$setlease(r3, 0x400, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x9, 0x200) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r4, r3) 03:33:22 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:22 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) [ 827.994740] FAULT_INJECTION: forcing a failure. [ 827.994740] name failslab, interval 1, probability 0, space 0, times 0 [ 828.015862] CPU: 0 PID: 22804 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 828.023274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.032639] Call Trace: [ 828.032671] dump_stack+0x244/0x39d [ 828.032702] ? dump_stack_print_info.cold.1+0x20/0x20 [ 828.032732] ? debug_smp_processor_id+0x1c/0x20 [ 828.032758] ? perf_trace_lock+0x14d/0x7a0 [ 828.044184] should_fail.cold.4+0xa/0x17 [ 828.044216] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 828.044235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 828.044250] ? wake_up_klogd+0x11a/0x180 [ 828.044266] ? console_device+0xc0/0xc0 [ 828.044285] ? __down_trylock_console_sem+0x151/0x1f0 [ 828.044305] ? zap_class+0x640/0x640 [ 828.084891] ? vprintk_emit+0x293/0x990 [ 828.088939] ? find_held_lock+0x36/0x1c0 03:33:22 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0xd, &(0x7f00000001c0)={0xff0f}, &(0x7f0000000200)=0x10) fcntl$setlease(r0, 0x400, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r2, r0) [ 828.093029] ? __lock_is_held+0xb5/0x140 [ 828.097134] ? perf_trace_sched_process_exec+0x860/0x860 [ 828.102612] ? vprintk_default+0x28/0x30 [ 828.106703] __should_failslab+0x124/0x180 [ 828.110982] should_failslab+0x9/0x14 [ 828.114809] kmem_cache_alloc_trace+0x2d7/0x750 [ 828.114840] kobject_uevent_env+0x2f3/0x101e [ 828.114870] kobject_uevent+0x1f/0x24 [ 828.114890] lo_ioctl+0x1385/0x1d60 [ 828.124025] ? lo_rw_aio+0x1ef0/0x1ef0 [ 828.124047] blkdev_ioctl+0x98e/0x21b0 [ 828.124067] ? blkpg_ioctl+0xc10/0xc10 03:33:22 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = dup2(r1, r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$9p_xen(&(0x7f0000000080)='eth0\\em0-\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x8, &(0x7f0000000340)={'trans=xen,', {[{@fscache='fscache'}, {@aname={'aname', 0x3d, 'ppp0-,cpuset(wlan1\''}}, {@access_user='access=user'}, {@access_user='access=user'}, {@version_9p2000='version=9p2000'}, {@cache_mmap='cache=mmap'}, {@dfltuid={'dfltuid', 0x3d, r3}}], [{@measure='measure'}, {@context={'context', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_gt={'uid>', r4}}, {@subj_role={'subj_role', 0x3d, 'systemeth0[-@selinuxbdevuserwlan0em0}nodev%'}}, {@appraise_type='appraise_type=imasig'}, {@fsname={'fsname', 0x3d, '@wlan0cpuset'}}, {@seclabel='seclabel'}, {@audit='audit'}, {@audit='audit'}]}}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000000)=0x5) [ 828.124088] ? lock_downgrade+0x900/0x900 [ 828.147466] ? check_preemption_disabled+0x48/0x280 [ 828.152520] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 828.157470] ? kasan_check_read+0x11/0x20 [ 828.161635] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 828.166954] ? rcu_softirq_qs+0x20/0x20 [ 828.170982] ? __fget+0x4d1/0x740 [ 828.174464] ? ksys_dup3+0x680/0x680 [ 828.178228] block_ioctl+0xee/0x130 [ 828.181877] ? blkdev_fallocate+0x400/0x400 [ 828.186235] do_vfs_ioctl+0x1de/0x1790 [ 828.190146] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 828.195715] ? ioctl_preallocate+0x300/0x300 [ 828.200146] ? __fget_light+0x2e9/0x430 [ 828.204153] ? fget_raw+0x20/0x20 [ 828.207636] ? rcu_read_lock_sched_held+0x14f/0x180 [ 828.208865] 9pnet: Could not find request transport: xen [ 828.212673] ? kmem_cache_free+0x24f/0x290 [ 828.212697] ? putname+0xf7/0x130 [ 828.212719] ? do_syscall_64+0x9a/0x820 [ 828.212735] ? do_syscall_64+0x9a/0x820 [ 828.212753] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 828.212775] ? security_file_ioctl+0x94/0xc0 [ 828.212795] ksys_ioctl+0xa9/0xd0 [ 828.223127] 9pnet: Could not find request transport: xen [ 828.225962] __x64_sys_ioctl+0x73/0xb0 [ 828.225984] do_syscall_64+0x1b9/0x820 [ 828.226000] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 828.226024] ? syscall_return_slowpath+0x5e0/0x5e0 [ 828.269944] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 828.274811] ? trace_hardirqs_on_caller+0x310/0x310 [ 828.279848] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 828.279868] ? prepare_exit_to_usermode+0x291/0x3b0 [ 828.279892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 828.279937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.279958] RIP: 0033:0x4573d7 [ 828.303281] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.322206] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 828.329953] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 828.337244] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 03:33:22 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x280000, 0x3ffffffffffc) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:22 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f0000000000)) 03:33:22 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000021ff4)={0x2001}) [ 828.344527] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 828.351815] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 828.359102] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:22 executing program 3 (fault-call:3 fault-nth:20): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:22 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x14, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x18, @mcast2}, 0x80, &(0x7f0000000140)}, 0x0) modify_ldt$read_default(0x2, &(0x7f00000005c0)=""/246, 0xf6) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f00000006c0)) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000540)='./file0\x00') accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) sendmsg$xdp(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x2c, 0x1, r2, 0x39}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000180)="01786aa0ed19e81dfbc43da0a44eb3cf6aa9f104723fd6668a15a0aefd86f053ff1c19d1ce4dffcb0868d01e9327c60a4ff2377a2107098f7513d98a7416a15de756d5ca14bcd4879f1b7f1b2f15f330113d440f0de8d2bc5811407fb5e5528b611f038221ef86168529338fa000ee4cace528fa33d3b20d679d6cbf0b1ca3a39e5129af", 0x84}, {&(0x7f0000000340)="a5b51629ec86f8aeb49eeb3896e249e0fa4fba1f3043a6fbd807a0046d9fba4f48fdb50766a9b1cae3249f7c7c34790b4303d58acaad3a70345dffc7f1bea67b0e95703a542d9c6babf017a69078e171671e1218de35eb4f80efae5d8a3ac536d217a9edd6792e8b3ea41dac0f052251c54558316a3b3f9f053d9db2bb072349e9878c550125dd4afaa85062fccc210eede019f9dadf70d306445050e794fff68426a80469bf3b650cd5245e4a1eb683fe789733068b3addf4f24b23bbf3c85885c60685e382f88c3dd21277339f6b6cbbac9f52786c", 0xd6}, {&(0x7f0000000440)="000b195059ecdd136d6be9b28e3f6ad7dcd756ede02d90f349e7c455fe80de1c0f70106721310db3b1307f9df6391ba79100166488d1e2f65034d6774b56acbaf14427dbd4f51f820a4f0d113fb18dd29b2e0644617078d6d9793891ef26c24791b78a19714f009847d085e8c76d9a06eb8634c30ad46958f01087951f0359b669cf829ceb92e8d67759cfeb0f007cb5d4aac414593fb9e2f347f4797b66679c89482cadf334e9a469e14b9fc8b032743892a702a90a2841dea22b41ffa4f7daffe58054fc292c7fb44dfaa10dc4d92f65167b4cdbcf27f455fc2cd7a0c4533593a90101319ee8af74ac4d15ad", 0xed}], 0x3, 0x0, 0x0, 0x4000000}, 0x800) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000000)={0x1, 0x7, 0x7}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x12000, 0x20) fcntl$setlease(r3, 0x400, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x9, 0x200) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r4, r3) 03:33:22 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xc3ffffff}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:22 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) unshare(0x28000000) r1 = semget(0x1, 0x7, 0x100) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="780000003e51ab579157573c4ebb8592cd98f7efe3a14f74cfdff70f3d9c371c32134ebc4a3179bd89375ebb39045d7510c7ff3fa90eb73baf116ee47442a9a48fcb222eadccbe88d5112c0de95bf11c425aa49207000000000606e4109d63c69751f33e2bac274078bc311e1d5f047f029caac83e2da50fca1a1b13"], &(0x7f0000000000)=0x80) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r2, 0xe00000000000000}, 0x8) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000240)) semctl$GETNCNT(r1, 0x5, 0xe, &(0x7f0000000080)=""/233) dup2(r0, r0) 03:33:22 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 828.573258] FAULT_INJECTION: forcing a failure. [ 828.573258] name failslab, interval 1, probability 0, space 0, times 0 [ 828.585789] CPU: 1 PID: 22858 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 828.593177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.602814] Call Trace: [ 828.605433] dump_stack+0x244/0x39d [ 828.609094] ? dump_stack_print_info.cold.1+0x20/0x20 [ 828.614316] ? debug_smp_processor_id+0x1c/0x20 [ 828.619001] ? perf_trace_lock+0x14d/0x7a0 [ 828.623240] should_fail.cold.4+0xa/0x17 [ 828.627303] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 828.632413] ? zap_class+0x640/0x640 [ 828.636136] ? kasan_kmalloc+0xc7/0xe0 [ 828.640039] ? kmem_cache_alloc_trace+0x152/0x750 [ 828.644876] ? kobject_uevent_env+0x2f3/0x101e [ 828.649452] ? kobject_uevent+0x1f/0x24 [ 828.653423] ? lo_ioctl+0x1385/0x1d60 [ 828.657236] ? find_held_lock+0x36/0x1c0 [ 828.661311] ? __lock_is_held+0xb5/0x140 [ 828.665398] ? perf_trace_sched_process_exec+0x860/0x860 [ 828.670866] __should_failslab+0x124/0x180 [ 828.675102] should_failslab+0x9/0x14 [ 828.678950] __kmalloc+0x2e0/0x760 [ 828.682492] ? kobject_uevent_env+0x2f3/0x101e [ 828.687072] ? rcu_read_lock_sched_held+0x14f/0x180 [ 828.692088] ? kobject_get_path+0xc2/0x1b0 [ 828.696318] ? kmem_cache_alloc_trace+0x353/0x750 [ 828.701204] kobject_get_path+0xc2/0x1b0 [ 828.705283] kobject_uevent_env+0x314/0x101e [ 828.709708] kobject_uevent+0x1f/0x24 [ 828.713510] lo_ioctl+0x1385/0x1d60 [ 828.717139] ? lo_rw_aio+0x1ef0/0x1ef0 [ 828.721026] blkdev_ioctl+0x98e/0x21b0 [ 828.724936] ? blkpg_ioctl+0xc10/0xc10 [ 828.728833] ? lock_downgrade+0x900/0x900 [ 828.732981] ? check_preemption_disabled+0x48/0x280 [ 828.737999] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 828.742941] ? kasan_check_read+0x11/0x20 [ 828.747152] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 828.752439] ? rcu_softirq_qs+0x20/0x20 [ 828.756417] ? __fget+0x4d1/0x740 [ 828.759873] ? ksys_dup3+0x680/0x680 [ 828.763610] block_ioctl+0xee/0x130 [ 828.767260] ? blkdev_fallocate+0x400/0x400 [ 828.771622] do_vfs_ioctl+0x1de/0x1790 [ 828.775522] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 828.781074] ? ioctl_preallocate+0x300/0x300 [ 828.785492] ? __fget_light+0x2e9/0x430 [ 828.789475] ? fget_raw+0x20/0x20 [ 828.792969] ? rcu_read_lock_sched_held+0x14f/0x180 [ 828.797999] ? kmem_cache_free+0x24f/0x290 [ 828.802261] ? putname+0xf7/0x130 [ 828.805738] ? do_syscall_64+0x9a/0x820 [ 828.809721] ? do_syscall_64+0x9a/0x820 [ 828.813695] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 828.818320] ? security_file_ioctl+0x94/0xc0 [ 828.822763] ksys_ioctl+0xa9/0xd0 [ 828.826257] __x64_sys_ioctl+0x73/0xb0 [ 828.830144] do_syscall_64+0x1b9/0x820 [ 828.834032] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 828.839396] ? syscall_return_slowpath+0x5e0/0x5e0 [ 828.844331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 828.849207] ? trace_hardirqs_on_caller+0x310/0x310 [ 828.854227] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 828.859394] ? prepare_exit_to_usermode+0x291/0x3b0 [ 828.864435] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 828.869282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.874465] RIP: 0033:0x4573d7 [ 828.877654] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 828.896546] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 828.904246] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 828.911524] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 03:33:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x3f00}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:23 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x2) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) [ 828.918794] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 828.926067] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 828.933480] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:23 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x14, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x18, @mcast2}, 0x80, &(0x7f0000000140)}, 0x0) modify_ldt$read_default(0x2, &(0x7f00000005c0)=""/246, 0xf6) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f00000006c0)) rename(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000540)='./file0\x00') accept$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) sendmsg$xdp(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x2c, 0x1, r2, 0x39}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000180)="01786aa0ed19e81dfbc43da0a44eb3cf6aa9f104723fd6668a15a0aefd86f053ff1c19d1ce4dffcb0868d01e9327c60a4ff2377a2107098f7513d98a7416a15de756d5ca14bcd4879f1b7f1b2f15f330113d440f0de8d2bc5811407fb5e5528b611f038221ef86168529338fa000ee4cace528fa33d3b20d679d6cbf0b1ca3a39e5129af", 0x84}, {&(0x7f0000000340)="a5b51629ec86f8aeb49eeb3896e249e0fa4fba1f3043a6fbd807a0046d9fba4f48fdb50766a9b1cae3249f7c7c34790b4303d58acaad3a70345dffc7f1bea67b0e95703a542d9c6babf017a69078e171671e1218de35eb4f80efae5d8a3ac536d217a9edd6792e8b3ea41dac0f052251c54558316a3b3f9f053d9db2bb072349e9878c550125dd4afaa85062fccc210eede019f9dadf70d306445050e794fff68426a80469bf3b650cd5245e4a1eb683fe789733068b3addf4f24b23bbf3c85885c60685e382f88c3dd21277339f6b6cbbac9f52786c", 0xd6}, {&(0x7f0000000440)="000b195059ecdd136d6be9b28e3f6ad7dcd756ede02d90f349e7c455fe80de1c0f70106721310db3b1307f9df6391ba79100166488d1e2f65034d6774b56acbaf14427dbd4f51f820a4f0d113fb18dd29b2e0644617078d6d9793891ef26c24791b78a19714f009847d085e8c76d9a06eb8634c30ad46958f01087951f0359b669cf829ceb92e8d67759cfeb0f007cb5d4aac414593fb9e2f347f4797b66679c89482cadf334e9a469e14b9fc8b032743892a702a90a2841dea22b41ffa4f7daffe58054fc292c7fb44dfaa10dc4d92f65167b4cdbcf27f455fc2cd7a0c4533593a90101319ee8af74ac4d15ad", 0xed}], 0x3, 0x0, 0x0, 0x4000000}, 0x800) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000000)={0x1, 0x7, 0x7}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x12000, 0x20) fcntl$setlease(r3, 0x400, 0x0) syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x9, 0x200) r4 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r4, r3) 03:33:23 executing program 3 (fault-call:3 fault-nth:21): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:23 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x97d6}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 829.125620] FAULT_INJECTION: forcing a failure. [ 829.125620] name failslab, interval 1, probability 0, space 0, times 0 [ 829.147664] CPU: 1 PID: 22879 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 829.155062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.164433] Call Trace: [ 829.167052] dump_stack+0x244/0x39d [ 829.170721] ? dump_stack_print_info.cold.1+0x20/0x20 [ 829.175960] ? debug_smp_processor_id+0x1c/0x20 [ 829.180653] ? perf_trace_lock+0x14d/0x7a0 [ 829.184947] should_fail.cold.4+0xa/0x17 [ 829.189029] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 829.194141] ? lock_release+0xa00/0xa00 [ 829.198126] ? perf_trace_sched_process_exec+0x860/0x860 [ 829.203590] ? zap_class+0x640/0x640 [ 829.207342] ? find_held_lock+0x36/0x1c0 [ 829.211419] ? __lock_is_held+0xb5/0x140 [ 829.215502] ? put_dec+0x3b/0xf0 [ 829.218866] ? perf_trace_sched_process_exec+0x860/0x860 [ 829.224325] ? zap_class+0x640/0x640 [ 829.228102] __should_failslab+0x124/0x180 [ 829.232341] should_failslab+0x9/0x14 [ 829.236147] kmem_cache_alloc_node+0x26e/0x730 [ 829.240738] ? find_held_lock+0x36/0x1c0 [ 829.244833] __alloc_skb+0x119/0x770 [ 829.248578] ? netdev_alloc_frag+0x1f0/0x1f0 [ 829.253014] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 829.257973] ? kasan_check_read+0x11/0x20 [ 829.262149] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 829.267446] ? rcu_softirq_qs+0x20/0x20 [ 829.271483] ? netlink_has_listeners+0x2cb/0x4a0 [ 829.276241] ? netlink_tap_init_net+0x3d0/0x3d0 [ 829.280910] alloc_uevent_skb+0x84/0x1da [ 829.285007] kobject_uevent_env+0xa52/0x101e [ 829.289432] kobject_uevent+0x1f/0x24 [ 829.293234] lo_ioctl+0x1385/0x1d60 [ 829.296862] ? lo_rw_aio+0x1ef0/0x1ef0 [ 829.300749] blkdev_ioctl+0x98e/0x21b0 [ 829.304645] ? blkpg_ioctl+0xc10/0xc10 [ 829.308543] ? lock_downgrade+0x900/0x900 [ 829.312705] ? check_preemption_disabled+0x48/0x280 [ 829.317732] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 829.322657] ? kasan_check_read+0x11/0x20 [ 829.326799] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 829.332072] ? rcu_softirq_qs+0x20/0x20 [ 829.336053] ? __fget+0x4d1/0x740 [ 829.339507] ? ksys_dup3+0x680/0x680 [ 829.343227] block_ioctl+0xee/0x130 [ 829.346848] ? blkdev_fallocate+0x400/0x400 [ 829.351169] do_vfs_ioctl+0x1de/0x1790 [ 829.355058] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 829.360603] ? ioctl_preallocate+0x300/0x300 [ 829.365019] ? __fget_light+0x2e9/0x430 [ 829.369028] ? fget_raw+0x20/0x20 [ 829.372482] ? rcu_read_lock_sched_held+0x14f/0x180 [ 829.377497] ? kmem_cache_free+0x24f/0x290 [ 829.381733] ? putname+0xf7/0x130 [ 829.385191] ? do_syscall_64+0x9a/0x820 [ 829.389162] ? do_syscall_64+0x9a/0x820 [ 829.393134] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 829.397718] ? security_file_ioctl+0x94/0xc0 [ 829.402137] ksys_ioctl+0xa9/0xd0 [ 829.405619] __x64_sys_ioctl+0x73/0xb0 [ 829.409572] do_syscall_64+0x1b9/0x820 [ 829.413469] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 829.418832] ? syscall_return_slowpath+0x5e0/0x5e0 [ 829.423756] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 829.428608] ? trace_hardirqs_on_caller+0x310/0x310 [ 829.433637] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 829.438651] ? prepare_exit_to_usermode+0x291/0x3b0 [ 829.443679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 829.448543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.453726] RIP: 0033:0x4573d7 [ 829.456933] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 829.475829] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 829.483528] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 829.490803] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 829.498067] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 829.505343] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 829.512605] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:23 executing program 4: r0 = epoll_create1(0x80000) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x80, 0x400001) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000080)={0x2, 0x7fff, 0x3014}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r3, 0xc010640c, &(0x7f0000000040)={0x9, 0x1f}) 03:33:23 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000140)={0xe, 0xae3, 0x1f, 0x80800, r0}) r3 = dup2(r1, r2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0xfffffffffffffff7, 0x8000, 0x9, 0xfff, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000200)={r4, 0x6, 0x9}, &(0x7f0000000100)=0xc5) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f00000000c0)={0xb, 0x102, 0x1, {0x8, 0x1, 0x2fa, 0x362b945}}) 03:33:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x97d6000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:23 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:23 executing program 2: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:23 executing program 3 (fault-call:3 fault-nth:22): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:23 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x6, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) dup2(r1, r2) setsockopt(r2, 0x10d, 0x800000000e, &(0x7f00001c9fff)="03", 0x1) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r1, 0x2) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000340)={0x2, 0x4e23, @empty=0x1700000000000000}, 0x10) r4 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f00000007c0)={{0x2, 0x4e23, @local}, {0x6}, 0x30, {0x2, 0x4e20, @multicast2}, 'team_slave_0\x00'}) syz_mount_image$nfs4(&(0x7f00000001c0)='nfs4\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x5, &(0x7f0000000740)=[{&(0x7f0000000340)="386bc2b83b84eb0912b5c01c072b7ba94d95a85665b665d8af8a9a9a3abaa26f4a3188b9db410c6377374b750911b06edf1214b5cd65d381efc998da4e9e0d6bc004fd7b4c5831b1a8a099fc83b40a7526f36b158b4b3601580086aa215b9eab83f590615af68c18239a55745f8e9bf0ef4c469d48b87185d9e8de1379d4e0e0b7e5bdbb7024cecee5a53598095ec4fdcb414d10237e21160da54898866522ce73687a0236eea247d8f120eca93ec331a5ca9a36dca48c194cd4f67ed1b7fd7ea8f3019bade86d38ecd1766d5bd42a", 0xcf, 0x1f}, {&(0x7f0000000440)="755f6e17f59f10d8fa561ede76f14742835f3d19760617bef1fb6191922624607175a4ffaa378c631e8ee28873c84d2d4fa8feaad4638831085f5cfa5335a24fa1a3aaf1672f3080a98df63c21d758a54d16295b502a5cad506fef39b006b989c679cf63c80a7d78a813290a0987643a2b8f4d4cc2162209db1e397a8245cd83ab2d56d13a025678dd049bef5d469cbc1cef9e96835279292472b5b55a6b2ddd8d31ae58b3f20878666f6e0a460b3a12de7f04d63516ca144fc812880197e6a6ae3d19a3a1", 0xc5, 0xb00}, {&(0x7f0000000240)="1a04f0c00365a1fda9fb5771b3f923208eb5225307bab83ede42fea39835a31f0bb994dc6558d43f0f3687ea4cfd2e9a4e04261b8d754153498a6b88eb9018e07f6b1e73543de3568c7e060ddfb80d78b7a08887c7fedb149e69a6f89e81", 0x5e, 0x2}, {&(0x7f0000000540)="3d3b4b30f1e77694a61ab6357f8ec43c87b6ca5a37b5552c29fd6c5ceb5566b3706ea266fd66568e2ea783fe42388e901b46c40c6f6d42c0598aa575afce0a329d49b7b4ff6b1d522b6b2bbe93f2702ca43de65a759dd774fe6d4fe0396b495efcb6aba40e855a00a5c31e4c46b789d85126c2c45aad2c91f766cea414d9a7b86a6361e88a7b243b6f198d2adc775a537542828b194c445fe133488f46483a9d58ab4280787a0c724b40eeb61b8b9ae25f034c819e8bb9cca9863b43280a97b39555a82d2b889cec50a629f8f398a8563939b4f7", 0xd4, 0x9}, {&(0x7f0000000640)="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", 0xfc, 0x6}], 0x4404, &(0x7f00000002c0)='trusted.overlay.upper\x00') fcntl$setlease(r4, 0x400, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0xf3, 0x1, 0x8, "6f5d347d07f87552fa84b6373d7ea16e", "a88447ba50851b979d10d9311d8b78eec025f8103650750e13033e937add767f21c4a9c382a159a51cf8219cf5346f102ccb4627c2d8e058746e08c3fcc0112aa6b2facae0f8eee21abbcc1a98872de40839f7ed31eb6e4a62e7cd0fff1b1159d9fdfec77a7ea048076fd9028711b8dff74b6280b1e1cc39491607e67f1ef5dfe38572387e99a5a813e525edb77ba50cb6c0da9686705d052789e4650e86aab4fc3df0f88d94257eca2f3d9113a38dc8e8b21da6ede7513e1b3ddce267d105adf6d02faa37ba9bb4c3087f0772367dbdc898f286aba69dea7766bff699b0"}, 0xf3, 0x3) r5 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r5, r4) 03:33:23 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x300000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:23 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 829.745443] FAULT_INJECTION: forcing a failure. [ 829.745443] name failslab, interval 1, probability 0, space 0, times 0 03:33:24 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) fremovexattr(r2, &(0x7f0000000040)=@random={'os2.', '/dev/null\x00'}) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:24 executing program 2: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f800000000c0000004000001000000000800000000000000081000000000000008200000001000010000000000100000000000006c0b4a40200010000100000000000000000000000000c0908040c", 0xffffffffffffff42}], 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f00000001c0)=0xffffffffffffff2e) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x20, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000130000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',allow_other,dont_hash,obj_role=systemeth0,smackfsroot=xfs\x00,uid=', @ANYRESDEC=r3, @ANYBLOB="2c657569643e997b0473bc05c5a3023edc20f238c76b723fc5bdcdccc4372c1660a2a5b6250917b43124017d46c409ebf0ef44c63daffef35cdea7d00d5924ad3fa6", @ANYRESDEC=r4, @ANYBLOB="2c736d61636b66737472616e736d7574653d76626f786e657438656d30708415ac6a9e1bcf8c948f8062371af924ff6923a62afe6cade7e5efd9dbdf35b7dfe7debcdf8243bc0000000000"]) [ 829.790376] CPU: 1 PID: 22917 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 829.797777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.807147] Call Trace: [ 829.809767] dump_stack+0x244/0x39d [ 829.813445] ? dump_stack_print_info.cold.1+0x20/0x20 [ 829.818674] ? debug_smp_processor_id+0x1c/0x20 [ 829.823373] ? perf_trace_lock+0x14d/0x7a0 [ 829.827640] should_fail.cold.4+0xa/0x17 [ 829.831738] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 829.836862] ? __save_stack_trace+0x8d/0xf0 [ 829.841215] ? zap_class+0x640/0x640 [ 829.844969] ? save_stack+0xa9/0xd0 [ 829.848619] ? save_stack+0x43/0xd0 [ 829.852351] ? find_held_lock+0x36/0x1c0 [ 829.856449] ? __lock_is_held+0xb5/0x140 [ 829.856478] ? zap_class+0x640/0x640 [ 829.856495] ? perf_trace_sched_process_exec+0x860/0x860 [ 829.856515] ? check_preemption_disabled+0x48/0x280 [ 829.856536] __should_failslab+0x124/0x180 [ 829.878999] should_failslab+0x9/0x14 [ 829.882828] kmem_cache_alloc_node_trace+0x270/0x740 03:33:24 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80000) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 829.887987] __kmalloc_node_track_caller+0x3c/0x70 [ 829.892960] __kmalloc_reserve.isra.40+0x41/0xe0 [ 829.897745] __alloc_skb+0x155/0x770 [ 829.901490] ? netdev_alloc_frag+0x1f0/0x1f0 [ 829.905945] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 829.910901] ? kasan_check_read+0x11/0x20 [ 829.915089] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 829.920393] ? rcu_softirq_qs+0x20/0x20 [ 829.924378] ? netlink_has_listeners+0x2cb/0x4a0 [ 829.929167] ? netlink_tap_init_net+0x3d0/0x3d0 [ 829.933853] alloc_uevent_skb+0x84/0x1da 03:33:24 executing program 4: r0 = epoll_create1(0xfffffffffffffffd) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) timerfd_settime(r4, 0x0, &(0x7f0000005000)={{r2, r3+30000000}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000021ff4)={0x2001}) [ 829.937946] kobject_uevent_env+0xa52/0x101e [ 829.942358] kobject_uevent+0x1f/0x24 [ 829.946158] lo_ioctl+0x1385/0x1d60 [ 829.949785] ? lo_rw_aio+0x1ef0/0x1ef0 [ 829.953682] blkdev_ioctl+0x98e/0x21b0 [ 829.957591] ? blkpg_ioctl+0xc10/0xc10 [ 829.961486] ? lock_downgrade+0x900/0x900 [ 829.965651] ? check_preemption_disabled+0x48/0x280 [ 829.970710] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 829.975662] ? kasan_check_read+0x11/0x20 [ 829.979832] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 829.985128] ? rcu_softirq_qs+0x20/0x20 [ 829.989142] ? __fget+0x4d1/0x740 [ 829.992627] ? ksys_dup3+0x680/0x680 [ 829.996373] block_ioctl+0xee/0x130 [ 830.000033] ? blkdev_fallocate+0x400/0x400 [ 830.004377] do_vfs_ioctl+0x1de/0x1790 [ 830.008280] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 830.013816] ? ioctl_preallocate+0x300/0x300 [ 830.018222] ? __fget_light+0x2e9/0x430 [ 830.022193] ? fget_raw+0x20/0x20 [ 830.025646] ? rcu_read_lock_sched_held+0x14f/0x180 [ 830.030661] ? kmem_cache_free+0x24f/0x290 [ 830.034911] ? putname+0xf7/0x130 [ 830.038413] ? do_syscall_64+0x9a/0x820 [ 830.042395] ? do_syscall_64+0x9a/0x820 [ 830.046370] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 830.050982] ? security_file_ioctl+0x94/0xc0 [ 830.055417] ksys_ioctl+0xa9/0xd0 [ 830.058886] __x64_sys_ioctl+0x73/0xb0 [ 830.062794] do_syscall_64+0x1b9/0x820 [ 830.066680] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 830.072054] ? syscall_return_slowpath+0x5e0/0x5e0 [ 830.076977] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 830.081824] ? trace_hardirqs_on_caller+0x310/0x310 [ 830.086838] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 830.091850] ? prepare_exit_to_usermode+0x291/0x3b0 [ 830.096867] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 830.101716] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.106909] RIP: 0033:0x4573d7 [ 830.110133] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.129030] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:33:24 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000080)={0x8001, 0x0, 'client0\x00', 0x1, "c82283706064fbd7", "644d6f8e2e002fafa940aa0dc4a3c9fcfdd9f72d8a8fe64850e0abd16e5b006f", 0x1b6f0278, 0xe082}) dup2(r1, r0) [ 830.136731] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 830.144038] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 830.151319] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 830.158612] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 830.165876] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x500000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:24 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x7, 0x4) open(&(0x7f0000000080)='./file0\x00', 0x22000, 0x1a0) dup2(r0, r0) 03:33:24 executing program 3 (fault-call:3 fault-nth:23): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:24 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xf5ffffff00000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:24 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x200000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x2, &(0x7f0000000080)='/\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x2, &(0x7f0000000340)=""/4096) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000000)=0x11, 0x4) socket$packet(0x11, 0x3, 0x300) dup2(r1, r0) [ 830.441070] FAULT_INJECTION: forcing a failure. [ 830.441070] name failslab, interval 1, probability 0, space 0, times 0 [ 830.485562] CPU: 0 PID: 22970 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 830.492980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.492988] Call Trace: [ 830.493019] dump_stack+0x244/0x39d [ 830.493048] ? dump_stack_print_info.cold.1+0x20/0x20 [ 830.493077] ? debug_smp_processor_id+0x1c/0x20 [ 830.518511] ? perf_trace_lock+0x14d/0x7a0 [ 830.522775] should_fail.cold.4+0xa/0x17 [ 830.526862] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 830.531991] ? rcu_softirq_qs+0x20/0x20 [ 830.535985] ? unwind_dump+0x190/0x190 [ 830.539910] ? is_bpf_text_address+0xd3/0x170 [ 830.544557] ? zap_class+0x640/0x640 [ 830.548315] ? find_held_lock+0x36/0x1c0 [ 830.552430] ? __lock_is_held+0xb5/0x140 [ 830.556547] ? kobject_uevent+0x1f/0x24 [ 830.560544] ? perf_trace_sched_process_exec+0x860/0x860 [ 830.566015] ? do_vfs_ioctl+0x1de/0x1790 [ 830.570093] ? ksys_ioctl+0xa9/0xd0 [ 830.573745] ? do_syscall_64+0x1b9/0x820 [ 830.577840] __should_failslab+0x124/0x180 [ 830.582101] should_failslab+0x9/0x14 [ 830.585935] kmem_cache_alloc+0x2be/0x730 [ 830.590117] skb_clone+0x1bb/0x500 [ 830.593686] ? skb_split+0x11e0/0x11e0 [ 830.597814] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 830.602853] ? netlink_trim+0x1b4/0x380 [ 830.606848] ? netlink_skb_destructor+0x210/0x210 [ 830.611729] netlink_broadcast_filtered+0x110f/0x1680 [ 830.616970] ? __netlink_sendskb+0xd0/0xd0 [ 830.621268] ? kasan_check_read+0x11/0x20 [ 830.625446] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 830.625471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:33:24 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 830.625490] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 830.625511] ? refcount_add_not_zero_checked+0x330/0x330 [ 830.625530] ? netlink_has_listeners+0x2cb/0x4a0 [ 830.636350] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 830.636374] netlink_broadcast+0x3a/0x50 [ 830.636397] kobject_uevent_env+0xa83/0x101e [ 830.636440] kobject_uevent+0x1f/0x24 [ 830.669272] lo_ioctl+0x1385/0x1d60 [ 830.672899] ? lo_rw_aio+0x1ef0/0x1ef0 [ 830.676803] blkdev_ioctl+0x98e/0x21b0 [ 830.680691] ? blkpg_ioctl+0xc10/0xc10 03:33:24 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xfc000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 830.684717] ? lock_downgrade+0x900/0x900 [ 830.688880] ? check_preemption_disabled+0x48/0x280 [ 830.693956] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 830.698905] ? kasan_check_read+0x11/0x20 [ 830.703096] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 830.708397] ? rcu_softirq_qs+0x20/0x20 [ 830.712412] ? __fget+0x4d1/0x740 [ 830.715897] ? ksys_dup3+0x680/0x680 [ 830.719665] block_ioctl+0xee/0x130 [ 830.723334] ? blkdev_fallocate+0x400/0x400 [ 830.727668] do_vfs_ioctl+0x1de/0x1790 [ 830.731586] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 830.737152] ? ioctl_preallocate+0x300/0x300 [ 830.741578] ? __fget_light+0x2e9/0x430 [ 830.745552] ? fget_raw+0x20/0x20 [ 830.749005] ? rcu_read_lock_sched_held+0x14f/0x180 [ 830.754019] ? kmem_cache_free+0x24f/0x290 [ 830.758270] ? putname+0xf7/0x130 [ 830.761748] ? do_syscall_64+0x9a/0x820 [ 830.765747] ? do_syscall_64+0x9a/0x820 [ 830.769752] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 830.774360] ? security_file_ioctl+0x94/0xc0 [ 830.778839] ksys_ioctl+0xa9/0xd0 [ 830.782321] __x64_sys_ioctl+0x73/0xb0 [ 830.786238] do_syscall_64+0x1b9/0x820 [ 830.790180] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 830.795898] ? syscall_return_slowpath+0x5e0/0x5e0 [ 830.800842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 830.805685] ? trace_hardirqs_on_caller+0x310/0x310 [ 830.810704] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 830.815723] ? prepare_exit_to_usermode+0x291/0x3b0 [ 830.820739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 830.825604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.830785] RIP: 0033:0x4573d7 [ 830.833980] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 830.852882] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 830.860597] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004573d7 [ 830.867859] RDX: 0000000000000007 RSI: 0000000000004c00 RDI: 0000000000000008 [ 830.875116] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 830.882368] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 830.889648] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 [ 831.014585] XFS (loop2): Mounting V4 Filesystem [ 831.049929] attempt to access beyond end of device [ 831.054935] loop2: rw=4096, want=412316860929, limit=264192 [ 831.066313] XFS (loop2): metadata I/O error in "xlog_bread_noalign" at daddr 0x6000000200 len 1 error 5 [ 831.090702] XFS (loop2): empty log check failed [ 831.095395] XFS (loop2): log mount/recovery failed: error -5 [ 831.119221] XFS (loop2): log mount failed 03:33:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000080)={'nat\x00', 0x0, 0x4, 0xb2, [], 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000280)=""/178}, &(0x7f0000000340)=0x78) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000005c0)="0a5c2d0240316285717070") mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$9p_rdma(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000000)={'trans=rdma,', {'port'}}) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) 03:33:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x10}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:25 executing program 3 (fault-call:3 fault-nth:24): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:25 executing program 4: r0 = epoll_create1(0x1) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x107000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="0100a8418878cfee286e66b2ae026e4f5b2447b50a42d76a5e4cad9c66ba9c02bcd970a336f29db08805d7af441db641cd4244e4ac766a4ea6c32df4d0e893bf09f09a19d932f1bf35c19488498538ac00ad3d18413305000f2fdfc9d55d07d685661d85ca511635f89652f7c8ed59d357ca5a9cae558b8cd3140e38f44d73393e8a46454a3f8586fdbbbe3dffd18172b65ac3d22369b1a651e293e9c8728b05843e6e9d985457d525e1b902c3e18acc3cbf43aba96af1a531000000000000"], &(0x7f0000000080)=0xe) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100)={r4, 0x7a, "f820cc972cf29240e1083bfad211ab658129210c9a57cacba8c773d0e77c4b9585a054001f425d2c8cf966042bebcce117cf3642c80739381e6005ecf31a6efd34cd64cbf9ba1b5836e7cf95d5519d88e73ed2943a26d83b5262d897c016105097f27fa9e4a45fd0b6d16c0bcb196790bd364006a1a4050d5d2f"}, &(0x7f00000001c0)=0x82) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:25 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000000c0)=0x2, 0x4) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000180)={0x7b, 0x0, [0x0, 0x5, 0x101, 0x7]}) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r1) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) 03:33:25 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 831.240263] FAULT_INJECTION: forcing a failure. [ 831.240263] name failslab, interval 1, probability 0, space 0, times 0 [ 831.278249] CPU: 1 PID: 23014 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 831.285675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.295035] Call Trace: [ 831.297649] dump_stack+0x244/0x39d [ 831.301338] ? dump_stack_print_info.cold.1+0x20/0x20 [ 831.306554] ? debug_smp_processor_id+0x1c/0x20 [ 831.311244] ? perf_trace_lock+0x14d/0x7a0 [ 831.315514] should_fail.cold.4+0xa/0x17 [ 831.319579] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 831.324685] ? debug_smp_processor_id+0x1c/0x20 [ 831.329365] ? perf_trace_lock+0x14d/0x7a0 [ 831.333617] ? lock_is_held_type+0x210/0x210 [ 831.338052] ? zap_class+0x640/0x640 [ 831.341803] ? path_parentat.isra.41+0x20/0x160 [ 831.341846] ? find_held_lock+0x36/0x1c0 [ 831.341870] ? __lock_is_held+0xb5/0x140 [ 831.350575] ? cachefiles_sync_cache+0x128/0x1b0 [ 831.350606] ? perf_trace_sched_process_exec+0x860/0x860 [ 831.350633] __should_failslab+0x124/0x180 [ 831.350683] should_failslab+0x9/0x14 [ 831.350705] kmem_cache_alloc+0x2be/0x730 [ 831.350730] __d_alloc+0xc8/0xb90 [ 831.380648] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 831.385690] ? d_alloc_parallel+0x1f40/0x1f40 [ 831.390203] ? d_lookup+0x255/0x300 [ 831.393845] ? d_lookup+0x255/0x300 [ 831.397488] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 831.402089] ? lookup_dcache+0x22/0x140 [ 831.406081] ? trace_hardirqs_off_caller+0x310/0x310 [ 831.411210] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 831.416252] d_alloc+0x96/0x380 [ 831.419546] ? __d_lookup+0x9e0/0x9e0 [ 831.423366] ? __d_alloc+0xb90/0xb90 [ 831.427109] __lookup_hash+0xd9/0x190 [ 831.430938] filename_create+0x1e5/0x5b0 [ 831.435019] ? kern_path_mountpoint+0x40/0x40 [ 831.436702] NFS: bad mount option value specified: port=0x0000000000000000 [ 831.439531] ? fget_raw+0x20/0x20 [ 831.439556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 831.439574] ? getname_flags+0x26e/0x590 [ 831.439595] do_mkdirat+0xda/0x310 [ 831.439616] ? __ia32_sys_mknod+0xb0/0xb0 [ 831.439638] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.472758] ? trace_hardirqs_off_caller+0x310/0x310 [ 831.477880] ? ksys_ioctl+0x81/0xd0 [ 831.481533] __x64_sys_mkdir+0x5c/0x80 [ 831.485438] do_syscall_64+0x1b9/0x820 [ 831.489336] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 831.494731] ? syscall_return_slowpath+0x5e0/0x5e0 [ 831.499672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 831.504535] ? trace_hardirqs_on_caller+0x310/0x310 [ 831.509564] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 831.514591] ? prepare_exit_to_usermode+0x291/0x3b0 [ 831.519626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 831.524509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.529713] RIP: 0033:0x456987 [ 831.532937] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 831.551871] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 831.559592] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 831.566882] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 831.574187] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 831.581460] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 03:33:25 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x1000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:25 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r0, r0) [ 831.588738] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:25 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000080)="f59660267dc214804af1be525411f332dc80056751dfbe69aa222a336afa7b4870e594c93eac9292ab7167f2e412d4bcb68b4262a18536685ced0d954397b4d40a9520170bcfd305fd7ce96a9b9a5cdf8b51b68a12830d10f09ad7513e6fbf42efb47b6c4c39bb19cb0b0d2e2ea3570d6d4be42e544b4b338c9e0cc49326a1e197fcef4d592dfc7af06a2dec6ca6e9785457fc54a10f666b38f17772a9d304641a2d1f4f9f824763025b08bff956646fe638b469ed9af887c2ccbbe3b03b9899d4c320129f976969ae73b94038bad31335ff92b33d1e480d4b4d16a7612f2ecd3f227e929c238dd0c2300b10553cd89176ab45d220") setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x1ff, 0x4) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:25 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:25 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x1000000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:25 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0x1003, 0x600000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x202200) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x100000000, 0x8000) keyctl$join(0x1, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x5}, 0x8) userfaultfd(0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000014c0)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x80000000, 0x24002) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x15, &(0x7f0000000100)='posix_acl_accessppp0\x00', 0xffffffffffffffff}, 0x30) getpgrp(r2) msgsnd(0x0, &(0x7f0000e74f60)={0x2}, 0x8, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) 03:33:25 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80000, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) dup2(r1, r0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x1, 0x3, 0x2, 0x8, 0x9, 0x10001, 0xffffffff}, &(0x7f0000000080)=0x20) [ 831.714679] NFS: bad mount option value specified: port=0x0000000000000000 03:33:26 executing program 3 (fault-call:3 fault-nth:25): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 831.918176] FAULT_INJECTION: forcing a failure. [ 831.918176] name failslab, interval 1, probability 0, space 0, times 0 [ 831.929642] CPU: 1 PID: 23062 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 831.937009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.946374] Call Trace: [ 831.948991] dump_stack+0x244/0x39d [ 831.952633] ? dump_stack_print_info.cold.1+0x20/0x20 [ 831.957833] ? debug_smp_processor_id+0x1c/0x20 [ 831.962509] ? perf_trace_lock+0x14d/0x7a0 [ 831.966775] should_fail.cold.4+0xa/0x17 [ 831.970850] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 831.975987] ? blkpg_ioctl+0xc10/0xc10 [ 831.979877] ? lock_downgrade+0x900/0x900 [ 831.984029] ? check_preemption_disabled+0x48/0x280 [ 831.989054] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 831.993990] ? kasan_check_read+0x11/0x20 [ 831.998143] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 832.003444] ? find_held_lock+0x36/0x1c0 [ 832.007556] ? perf_trace_sched_process_exec+0x860/0x860 [ 832.013051] ? block_ioctl+0xee/0x130 [ 832.016865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.022418] __should_failslab+0x124/0x180 [ 832.026671] should_failslab+0x9/0x14 [ 832.030490] kmem_cache_alloc+0x2be/0x730 [ 832.034648] ? fget_raw+0x20/0x20 [ 832.038120] getname_flags+0xd0/0x590 [ 832.041950] do_mkdirat+0xc5/0x310 [ 832.045505] ? __ia32_sys_mknod+0xb0/0xb0 [ 832.049658] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.055045] ? trace_hardirqs_off_caller+0x310/0x310 [ 832.060160] ? ksys_ioctl+0x81/0xd0 [ 832.063799] __x64_sys_mkdir+0x5c/0x80 [ 832.067708] do_syscall_64+0x1b9/0x820 [ 832.071605] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 832.076989] ? syscall_return_slowpath+0x5e0/0x5e0 [ 832.081938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 832.086809] ? trace_hardirqs_on_caller+0x310/0x310 [ 832.091836] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 832.096865] ? prepare_exit_to_usermode+0x291/0x3b0 [ 832.101899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 832.106768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.111961] RIP: 0033:0x456987 [ 832.115164] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 832.134068] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 832.141795] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 832.149073] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 832.156364] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 03:33:26 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r3, 0x28, &(0x7f0000000040)}, 0x10) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0xa00000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:26 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:26 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 832.163638] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 832.170938] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:26 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0x1003, 0x600000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x202200) syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x100000000, 0x8000) keyctl$join(0x1, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x5}, 0x8) userfaultfd(0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000014c0)) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x80000000, 0x24002) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0x15, &(0x7f0000000100)='posix_acl_accessppp0\x00', 0xffffffffffffffff}, 0x30) getpgrp(r2) msgsnd(0x0, &(0x7f0000e74f60)={0x2}, 0x8, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81}) 03:33:26 executing program 3 (fault-call:3 fault-nth:26): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:26 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000032c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_RCLUNK(r0, &(0x7f0000003300)={0x7, 0x79, 0x1}, 0x7) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r1, 0x400, 0x8002) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000080)={r3, 0x80000, r1}) r6 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r1, 0x0, 0x1, &(0x7f0000000240)='.\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000340)=0xc) r9 = getegid() r10 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000480)=0xe8) open$dir(&(0x7f0000003340)='./file0\x00', 0x80800, 0x1) fcntl$getown(0xffffffffffffffff, 0x9) clock_gettime(0x3, &(0x7f0000003380)) getresgid(&(0x7f00000004c0)=0x0, &(0x7f0000000500), &(0x7f0000000540)) r13 = fcntl$getown(r2, 0x9) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) getresgid(&(0x7f00000035c0)=0x0, &(0x7f0000003580), &(0x7f0000003440)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003200)=[{&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)="576cefe840bd41d282e1f7810f7fa367e7c31e00214aca58cfae40bef30f5814fdb0121b64780a5de71c2719565c516ae4f658c35ac3a76d071197378eae25b9afd377cf8678dddf97517628b154678f5a79702b42b4f0a0b45b001b26bf7f1f9fdb4257d73a8826e85f62dbc08ea9666edd7f4b6352d99d6f0c90cf03b70d20fe339ff2bfac1d3125f14736ecbdf364b5310afa3e14431ac0da66f346f3e3aef3495fdf67fb38bc9663874d514fb9d8bc2a61c8", 0xb4}], 0x1, &(0x7f0000000580)=[@cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x38, 0x1, 0x1, [r1, 0xffffffffffffffff, r4, r1, r4, r2, r2, r4, r5]}, @rights={0x20, 0x1, 0x1, [r5, r2, r1]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}, @rights={0x28, 0x1, 0x1, [r2, r1, r2, r4, r2]}, @rights={0x18, 0x1, 0x1, [0xffffffffffffffff, r2]}], 0xf0, 0x4000080}, {&(0x7f0000000680)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000700)="9ba8e324558d96e7b260f30c3a5af87a695c19726c281fb22cca5af49d2ac609678aff9d763a59", 0x27}, {&(0x7f0000000740)="502f397bac8f0caa5fd3359a3d9296ca5fbc07955c91a061712d8d24504e8ba186c2b119ace00d0533a993964ff4f9a4cffe4a60b0c19e36dc15e00732d5b0a3f5e953b86ac7523c241f55f2c17fbbf24d2d03f1f8553eb7a0a528512b177bd69a05ce7795899153b40c1b3af2bc5ee424efe2ab9d7fc1ec0605c13ab7474e4ac7a65de979476748dbfc9ac3312cee222e03f962b4a230490d4779809531f014620f03b0bde9e2d0c36ae6ea5b8e163af80f60d5bfea67c0d86653578feb96e263e92227d829916786ed11653b6da411ee3f2aa36f9b", 0xd6}, {&(0x7f0000000840)="6d9b41f7904c156850b4ee37be0b9101a67e183503eec3f82b9b", 0x1a}, {&(0x7f0000000880)="293cd4e9f9e406fe497e4182a6f1915564e1fb2ae02b2bf93981d66c56f9facb2fe7ecb7aa7023647bf62d3a7c953fc2ff7ee0bc90e0feedbe983156c66926ccdf40a5266940b4801aebeb06eb08541576cf41d753f54b4c968b09e930479b19ba9c9c0386512a7e161e7a9a7e52abd1116919681a1c5087c1f923f9a1a484d94b80a17e09a8acfa779ba5fb356a603a472c820ac969a3a0b9589c807505ad0c1762053685ba83f819d86caabb474b151081", 0xb2}, {&(0x7f0000000940)="bb841ce9437869fc28324e25a7e89ed8f51d6e7597e72c80d76d05a22347f56ee3b452047bc5b673f1a0d2f5e810dda39d9da0befb82fcb8026303486eadf0a9125999579de103234c8343fd03bd59fd8c19fbba0320dd78d1f8d59ba74f6e3712f8076bb191e8b7689b35bd50d2179cf5008ea8b9b96a83ddd371d3811eb5a5ded41ca5b254be20d1bcda6be2a2354a26c8b04db1a56bb1bfe39029f9b2114e89f2e04a74e08931b111bb9f766db811ac797123e7ba4364dcd7a7c31a6fd19ec4e3c14875db8230dae34c328296a78d6a6adc2847bbd5134d8592df7f293515589da59e479af0", 0xe7}], 0x5, &(0x7f0000000cc0)=[@rights={0x30, 0x1, 0x1, [r1, 0xffffffffffffffff, r5, r4, r2, r1, r1, r5]}, @rights={0x28, 0x1, 0x1, [r1, r1, 0xffffffffffffffff, r2, r4]}, @rights={0x18, 0x1, 0x1, [0xffffffffffffffff]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x90, 0x20000000}, {&(0x7f0000000d80)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000003180)=[{&(0x7f0000000e00)="6da344581a2f35b31281b238bb6096730da2c6c6fd8fe9cf9ab41090922c9c433ee37dd762a59f97f8e30df279ab9aeeefb9f69d6f21320d0309ad5790c86c6c89204e7f2ab67445dd405431710dcdfde2acf654883c5f8bf7867bc207759d9ba14de33da6b3f3fa54103c5ea8068fb0d21a41c2285eb775b05718709de3ca133f27878b572875599e823e391a64d284a59375c9d8b8908a4e85f8b0faa2ceb2fb94585d49d5df4e977237d3f9879be53f08ac53c4505d650184c24785adf3e7", 0xc0}, {&(0x7f0000000ec0)="0c9a94f9167deaec666afd444458bdac85c62917f996bc3538589e5c73b3f272d2c7e45b394b97284df94f6a21086a6624cce2642f97bac3aa83b514e2c09de2f55b2d8c2624a90de6305b0dfc5f469861c790c71ddf9258203d5e83dd687c857b19020baf860ea5b1638815ad21e1811a7720a12193b1e571f6c11a47de98cc4f36c6be14112655309a8dcb29c686ad677ae4ba942356124d060cb41c6c19beef5cf3edf074aeef17f8c5c66fb23d42e4cb4e6cac64d7ee10d07b88ad6577f816decd110c34d029d54b08c66c48894e503ba5da1ac54f4121c9", 0xda}, {&(0x7f0000000fc0)="96f41c68aa232c71147f370a6c9a193c6a0c41d2ce6cbc9a91fb4f0f7abca10bb6ddcc90150dc638e7325ea693b72f8a8ea6ab44e8c2dcb5eb903871f84a7c6d796e164a2b6470b1eaf2a26137c9c19ed6c5eeb1270b929d298377f54c428bed7c31b0a063b7486aa0346e5f3450653ba07cb0b6f54fb1d56d063abfaad234c10038124add", 0x85}, {&(0x7f0000001080)="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", 0x1000}, {&(0x7f0000002080)="c3129ca590751d80dcd170ab883125f286072543d3e752194f7846eb3d7ec1c4f9f03e7afdb526446727924e9f11a0a0a785c1dbbb04bbe4ba1296002decefb61ff4bf48e3", 0x45}, {&(0x7f0000002100)="b087cfa6077ad0eecb3b26cc80d62b898318315c265e0dfabdf90dbd0cd1912b0af027a9eeb9e709373efb9517ba3338df86925de4ef1615d8576854d9525eb62829318d2a7ae323ebdb6397fedf2f66178df83d448c6a9f30aeee535088513d592b39f2df8c9503e5d4f3", 0x6b}, {&(0x7f0000002180)="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", 0x1000}], 0x7, 0x0, 0x0, 0x8000}], 0x3, 0x4000000) 03:33:26 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:26 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x100000000000000}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 832.365371] FAULT_INJECTION: forcing a failure. [ 832.365371] name failslab, interval 1, probability 0, space 0, times 0 [ 832.394599] CPU: 0 PID: 23083 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 832.402001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 832.411377] Call Trace: 03:33:26 executing program 4: epoll_create(0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x280200, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000100)={0x5000000000000, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e23, @loopback}, {0x2, 0x4e22, @rand_addr=0x3}, 0x40, 0x7, 0x5, 0x3, 0x8001, &(0x7f0000000040)='team_slave_0\x00', 0x7ff, 0x6, 0x80}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000180)="839315f5dc5531ee0774e3d9ed19629aa4be95478a5174cc58d97fe974e60104dc0551a9c48ddf3b68ea161b260bba3a5961d7ce073b66f99a9a4ec2a7f822de2e51678b68b69c7ccc740b06d07f03c498aa4fb8bd1a81bf96688dbd666f3c881aa0ed832651d69a902a9438de61db8c146e460cf65eccde0373359a6da52932e167d67a3b52d1e9bfc7d8fbd3d4b7e7001e91629329cabf0a29e7019d4806156e31fb27c166cb7ece3c840ab498eacb833c6a6c92555a9e2c0208eec45a7bef96019047238fe8501f9686008ba71ac59d0d92c3c0f0359f7206da32a0dff20614b2f76beeaf3a809343cd2c38a116d5f7b0cc961a4194437a035716c785c044") r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r3, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000021ff4)={0x2001}) [ 832.413990] dump_stack+0x244/0x39d [ 832.417663] ? dump_stack_print_info.cold.1+0x20/0x20 [ 832.422914] ? debug_smp_processor_id+0x1c/0x20 [ 832.427619] ? perf_trace_lock+0x14d/0x7a0 [ 832.431881] should_fail.cold.4+0xa/0x17 [ 832.435974] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 832.441107] ? debug_smp_processor_id+0x1c/0x20 [ 832.445792] ? perf_trace_lock+0x14d/0x7a0 [ 832.450091] ? lock_is_held_type+0x210/0x210 [ 832.454512] ? zap_class+0x640/0x640 [ 832.458249] ? path_parentat.isra.41+0x20/0x160 [ 832.462965] ? find_held_lock+0x36/0x1c0 [ 832.467049] ? __lock_is_held+0xb5/0x140 [ 832.471142] ? perf_trace_sched_process_exec+0x860/0x860 [ 832.476621] __should_failslab+0x124/0x180 [ 832.476645] should_failslab+0x9/0x14 [ 832.476663] kmem_cache_alloc+0x2be/0x730 [ 832.476708] __d_alloc+0xc8/0xb90 [ 832.476731] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 832.476768] ? d_alloc_parallel+0x1f40/0x1f40 [ 832.501869] ? d_lookup+0x255/0x300 [ 832.505501] ? d_lookup+0x255/0x300 [ 832.509134] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 832.513737] ? lookup_dcache+0x22/0x140 [ 832.517716] ? trace_hardirqs_off_caller+0x310/0x310 [ 832.522836] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 832.527858] d_alloc+0x96/0x380 [ 832.531155] ? __d_lookup+0x9e0/0x9e0 [ 832.534964] ? __d_alloc+0xb90/0xb90 [ 832.538692] __lookup_hash+0xd9/0x190 [ 832.542502] filename_create+0x1e5/0x5b0 [ 832.546570] ? kern_path_mountpoint+0x40/0x40 [ 832.551074] ? fget_raw+0x20/0x20 [ 832.554540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 832.560081] ? getname_flags+0x26e/0x590 [ 832.564147] do_mkdirat+0xda/0x310 [ 832.567714] ? __ia32_sys_mknod+0xb0/0xb0 [ 832.571898] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.577287] ? trace_hardirqs_off_caller+0x310/0x310 [ 832.582391] ? ksys_ioctl+0x81/0xd0 [ 832.586042] __x64_sys_mkdir+0x5c/0x80 [ 832.589955] do_syscall_64+0x1b9/0x820 [ 832.593845] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 832.599464] ? syscall_return_slowpath+0x5e0/0x5e0 [ 832.604392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 832.609240] ? trace_hardirqs_on_caller+0x310/0x310 [ 832.614262] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 832.619279] ? prepare_exit_to_usermode+0x291/0x3b0 [ 832.624301] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 832.629144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 832.634326] RIP: 0033:0x456987 [ 832.637518] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 832.656460] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 832.664196] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 832.671463] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 832.678756] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 832.686017] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 832.693280] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:26 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x42) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:27 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x3]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:27 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x7, 0x80003) r3 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xffffffff00000001, 0x101002) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000001100)={0x0, 0xd0}, &(0x7f0000001140)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000001180)={r4, 0x1, 0x20}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0xa1) read$FUSE(r5, &(0x7f0000000100), 0x1000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:27 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x101200) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000080)=0x5, &(0x7f00000000c0)=0x4) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r1, 0x400, 0x0) futimesat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x0, 0x7530}, {0x0, 0x7530}}) r2 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) dup2(r2, r1) 03:33:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x4]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:27 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0xf) socket$kcm(0x29, 0x5, 0x0) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) mremap(&(0x7f00002e5000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) madvise(&(0x7f000096e000/0x4000)=nil, 0x4000, 0x0) socket$rds(0x15, 0x5, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x200000000000000f, 0x0) 03:33:27 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:27 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000080)) dup2(r1, r0) 03:33:27 executing program 3 (fault-call:3 fault-nth:27): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xff01000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x4000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:27 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:27 executing program 0: r0 = open(&(0x7f0000000100)='./file0\x00', 0x80, 0x0) fcntl$setlease(r0, 0x400, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x7, 0x8001) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000040)=0x4) 03:33:27 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x1000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 833.313655] FAULT_INJECTION: forcing a failure. [ 833.313655] name failslab, interval 1, probability 0, space 0, times 0 [ 833.343447] CPU: 1 PID: 23158 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 833.350838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 833.360190] Call Trace: [ 833.362803] dump_stack+0x244/0x39d [ 833.366439] ? dump_stack_print_info.cold.1+0x20/0x20 [ 833.371658] ? debug_smp_processor_id+0x1c/0x20 [ 833.376329] ? perf_trace_lock+0x14d/0x7a0 [ 833.380595] should_fail.cold.4+0xa/0x17 [ 833.384681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 833.389799] ? debug_smp_processor_id+0x1c/0x20 [ 833.394504] ? perf_trace_lock+0x14d/0x7a0 [ 833.398812] ? lock_is_held_type+0x210/0x210 [ 833.403247] ? zap_class+0x640/0x640 [ 833.406991] ? path_parentat.isra.41+0x20/0x160 [ 833.411704] ? find_held_lock+0x36/0x1c0 [ 833.415792] ? __lock_is_held+0xb5/0x140 [ 833.419891] ? perf_trace_sched_process_exec+0x860/0x860 [ 833.425378] __should_failslab+0x124/0x180 [ 833.429631] should_failslab+0x9/0x14 [ 833.433456] kmem_cache_alloc+0x2be/0x730 [ 833.437627] __d_alloc+0xc8/0xb90 [ 833.441125] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 833.446160] ? d_alloc_parallel+0x1f40/0x1f40 [ 833.450669] ? d_lookup+0x255/0x300 [ 833.454307] ? d_lookup+0x255/0x300 [ 833.457953] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 833.462553] ? lookup_dcache+0x22/0x140 [ 833.466541] ? trace_hardirqs_off_caller+0x310/0x310 [ 833.471669] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 833.476713] d_alloc+0x96/0x380 [ 833.480004] ? __d_lookup+0x9e0/0x9e0 [ 833.483815] ? __d_alloc+0xb90/0xb90 [ 833.487551] __lookup_hash+0xd9/0x190 [ 833.491370] filename_create+0x1e5/0x5b0 [ 833.495463] ? kern_path_mountpoint+0x40/0x40 [ 833.499983] ? fget_raw+0x20/0x20 [ 833.503455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 833.509016] ? getname_flags+0x26e/0x590 [ 833.513097] do_mkdirat+0xda/0x310 [ 833.516652] ? __ia32_sys_mknod+0xb0/0xb0 [ 833.520813] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.526186] ? trace_hardirqs_off_caller+0x310/0x310 [ 833.531297] ? ksys_ioctl+0x81/0xd0 [ 833.534964] __x64_sys_mkdir+0x5c/0x80 [ 833.538868] do_syscall_64+0x1b9/0x820 [ 833.542789] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 833.548166] ? syscall_return_slowpath+0x5e0/0x5e0 [ 833.553108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 833.557966] ? trace_hardirqs_on_caller+0x310/0x310 [ 833.562993] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 833.568022] ? prepare_exit_to_usermode+0x291/0x3b0 [ 833.573057] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 833.577919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 833.583146] RIP: 0033:0x456987 [ 833.586348] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 833.605257] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 833.612995] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 833.620282] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 833.627568] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 833.634842] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 833.642113] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:27 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:27 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000080)={0x8, 0x0, 0x301f, 0x1}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r1, 0x400, 0xffffffffffffffff) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r2, r1) 03:33:27 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:28 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0xf) socket$kcm(0x29, 0x5, 0x0) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) mremap(&(0x7f00002e5000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) madvise(&(0x7f000096e000/0x4000)=nil, 0x4000, 0x0) socket$rds(0x15, 0x5, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x200000000000000f, 0x0) 03:33:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xc3ffffff00000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:28 executing program 3 (fault-call:3 fault-nth:28): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:28 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000100)) fcntl$setlease(r0, 0x400, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000040)={0x1, 0x9}) openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x80000, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000000c0)=0x42, 0x4) 03:33:28 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:28 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80000) socket$inet_dccp(0x2, 0x6, 0x0) r2 = timerfd_create(0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0x10000000}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 834.068022] FAULT_INJECTION: forcing a failure. [ 834.068022] name failslab, interval 1, probability 0, space 0, times 0 [ 834.084311] CPU: 1 PID: 23182 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 834.091704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.101063] Call Trace: [ 834.103668] dump_stack+0x244/0x39d [ 834.107313] ? dump_stack_print_info.cold.1+0x20/0x20 [ 834.112513] ? perf_trace_sched_process_exec+0x860/0x860 [ 834.117969] ? lock_downgrade+0x900/0x900 [ 834.122131] should_fail.cold.4+0xa/0x17 [ 834.126200] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 834.131311] ? block_commit_write+0x30/0x30 [ 834.135666] ? print_usage_bug+0xc0/0xc0 [ 834.139763] ? __ext4_handle_dirty_metadata+0x1e0/0x5a0 [ 834.145141] ? kasan_check_write+0x14/0x20 [ 834.149394] ? zap_class+0x640/0x640 [ 834.153149] ? __lock_is_held+0xb5/0x140 [ 834.157233] ? perf_trace_sched_process_exec+0x860/0x860 [ 834.162717] ? __lock_acquire+0x62f/0x4c20 [ 834.167002] __should_failslab+0x124/0x180 [ 834.171251] should_failslab+0x9/0x14 [ 834.175059] __kmalloc+0x2e0/0x760 [ 834.178614] ? ext4_find_extent+0x757/0x9b0 [ 834.182953] ext4_find_extent+0x757/0x9b0 [ 834.187123] ext4_ext_map_blocks+0x291/0x48f0 [ 834.191627] ? kasan_check_write+0x14/0x20 [ 834.195883] ? ext4_ext_release+0x10/0x10 [ 834.200043] ? zap_class+0x640/0x640 [ 834.203767] ? zap_class+0x640/0x640 [ 834.207488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.213065] ? check_preemption_disabled+0x48/0x280 [ 834.218112] ? lock_acquire+0x1ed/0x520 [ 834.222105] ? ext4_map_blocks+0x487/0x1b50 [ 834.226463] ? lock_release+0xa00/0xa00 [ 834.230454] ? perf_trace_sched_process_exec+0x860/0x860 [ 834.235907] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 834.240590] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 834.245522] ? kasan_check_read+0x11/0x20 [ 834.249677] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 834.255061] ? down_read+0x8d/0x120 [ 834.258709] ? ext4_map_blocks+0x487/0x1b50 [ 834.263054] ? __down_interruptible+0x700/0x700 [ 834.267747] ? kernel_text_address+0x79/0xf0 [ 834.272185] ext4_map_blocks+0xe2d/0x1b50 [ 834.276361] ? __save_stack_trace+0x8d/0xf0 [ 834.280717] ? ext4_issue_zeroout+0x190/0x190 [ 834.285283] ? save_stack+0x43/0xd0 [ 834.288947] ? __kasan_slab_free+0x102/0x150 [ 834.293403] ? kasan_slab_free+0xe/0x10 [ 834.297387] ? kmem_cache_free+0x83/0x290 [ 834.301559] ext4_getblk+0x10e/0x630 [ 834.305308] ? ext4_iomap_begin+0x1390/0x1390 [ 834.309836] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.315410] ? __dquot_initialize+0x629/0xdd0 [ 834.319941] ext4_bread+0x95/0x2b0 [ 834.323514] ? ext4_getblk+0x630/0x630 [ 834.327421] ? dquot_get_next_dqblk+0x180/0x180 [ 834.332117] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 834.337062] ? common_perm+0x1f6/0x7b0 [ 834.340976] ext4_append+0x14e/0x370 [ 834.344722] ext4_mkdir+0x532/0xe60 [ 834.348378] ? ext4_init_dot_dotdot+0x510/0x510 [ 834.353069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.358622] ? security_inode_permission+0xd2/0x100 [ 834.363672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 834.369227] ? security_inode_mkdir+0xe8/0x120 [ 834.373852] vfs_mkdir+0x42e/0x6b0 [ 834.377412] do_mkdirat+0x27a/0x310 [ 834.381054] ? __ia32_sys_mknod+0xb0/0xb0 [ 834.385214] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.390596] ? trace_hardirqs_off_caller+0x310/0x310 [ 834.395725] ? ksys_ioctl+0x81/0xd0 [ 834.399375] __x64_sys_mkdir+0x5c/0x80 [ 834.403281] do_syscall_64+0x1b9/0x820 [ 834.407186] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 834.412571] ? syscall_return_slowpath+0x5e0/0x5e0 [ 834.417516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 834.422384] ? trace_hardirqs_on_caller+0x310/0x310 [ 834.427416] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 834.432453] ? prepare_exit_to_usermode+0x291/0x3b0 [ 834.437489] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 834.442353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 834.447567] RIP: 0033:0x456987 [ 834.450772] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:28 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 834.469707] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 834.477451] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 834.484730] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 834.492018] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 834.499298] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 834.506572] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:28 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @remote, 0x1, 0x8, [@multicast1, @broadcast, @empty, @rand_addr=0x2, @remote, @multicast2, @dev={0xac, 0x14, 0x14, 0x1f}, @empty]}, 0x30) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x3f000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:28 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @local}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0xfffffffffffffc00}, &(0x7f0000000300)=0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="280000001d00010000000000000081e63f16800014003d0007000000000000000000ffff7f0000018adf31b7a05e6465b3cb74db80c4d1c54238fac74cb2e60fe4c1b5ccda3d775970e56a22b720e30f59d4db9dc07256ae539f1008099bd4e5814dad67e040ab3043fda7f311703e359a922435a5edb3898f8cba17c194ef9361765098a9c9fcda1e571723af4326e241214599545916a22ad3156771f28fb04a3bb7f4ef2113"], 0x28}}, 0x0) 03:33:28 executing program 4: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x800) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) rt_sigaction(0x32, &(0x7f0000000180)={&(0x7f0000000080)="c482f9dbdc3e660f0dbfb9a5c7dd0f5616f69d3b7b0000d8c5c482790ef80f1aecc4417853484f2ed16800c481796e4bfe", {}, 0x8000000, &(0x7f0000000100)="2e450fae3ec482f9239800000000c4a2b8f3d08fa9c098f18f4978c6710a0f0f0d350000008e8f480ca20c4836c4817a11bd0c00000026410f79212636660f6021"}, &(0x7f0000000280)={&(0x7f00000001c0)="c401d058bce4b6eff518c461b9604de066440f71d605c402658e10c4c17de4e1260520000000c4e3c16f096f6540a746812a00000000c482a5ac1500000080", {}, 0x0, &(0x7f0000000200)="f041090036450f0fac6e18c38574b766400ff4b99e000000362e66400f38225241c442813dc047de2dffefffff3666a800400fd421c4e291928c99fd74000066430f38db646781"}, 0x8, &(0x7f00000002c0)) r2 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x800) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @remote}, 0x4, 0x1}}, 0x2e) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000021ff4)={0x2001}) 03:33:28 executing program 3 (fault-call:3 fault-nth:29): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:28 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:28 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x408040, 0xffffffffffffffff) fcntl$setlease(r0, 0x400, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) 03:33:28 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x300]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 834.665566] netlink: 'syz-executor2': attribute type 61 has an invalid length. [ 834.697372] netlink: 'syz-executor2': attribute type 61 has an invalid length. [ 834.731184] FAULT_INJECTION: forcing a failure. [ 834.731184] name failslab, interval 1, probability 0, space 0, times 0 [ 834.774185] CPU: 0 PID: 23220 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 834.781583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 834.790965] Call Trace: [ 834.793622] dump_stack+0x244/0x39d [ 834.797279] ? dump_stack_print_info.cold.1+0x20/0x20 [ 834.802497] ? rcu_softirq_qs+0x20/0x20 [ 834.806498] should_fail.cold.4+0xa/0x17 [ 834.810619] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 834.815737] ? kernel_text_address+0x79/0xf0 [ 834.820161] ? __kernel_text_address+0xd/0x40 [ 834.824681] ? __save_stack_trace+0x8d/0xf0 [ 834.829023] ? zap_class+0x640/0x640 [ 834.832770] ? save_stack+0xa9/0xd0 [ 834.836416] ? __lock_is_held+0xb5/0x140 [ 834.840489] ? print_usage_bug+0xc0/0xc0 [ 834.844580] ? trace_hardirqs_off+0xb8/0x310 [ 834.849128] ? trace_hardirqs_on+0x310/0x310 [ 834.853568] ? perf_trace_sched_process_exec+0x860/0x860 [ 834.853588] ? __lock_acquire+0x62f/0x4c20 [ 834.853611] __should_failslab+0x124/0x180 [ 834.853632] should_failslab+0x9/0x14 03:33:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getresuid(&(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000280)) read$FUSE(r0, &(0x7f0000000640), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x46d) socketpair(0x11, 0x3, 0x9, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000140)) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=@known='security.apparmor\x00', &(0x7f0000000540)=""/222, 0x296) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="b80000000000000004000000000000000000000000000000000000000000000000000000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcff90ff000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="06000000000000000000000000000000000000000000000000000000d1000000000000002475736572766d6e6574302b00000000"], 0xb8) 03:33:29 executing program 4: r0 = epoll_create1(0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000d10d008000000000c7f64ad73822e92e20e769bdfe758cb78d1872c758a96b2e9b96886ae41e463aeacaffa8d8a8e6ad56de96335b8603fa2c8383ef7c6bb045d23d5a583353195ccae592d7177c52d163f8272b159ce8262d7a34987dfbcd0e21a93362497e34ae4997091e2d250000000000000000796806a36ab28c58d4124c7f12b6266183fe8260b9b6ec2358071e40f710eae778768cdac1f9a1a87229d0dd86e23a6df18047823eadc3f8b022d99c681662372af75d47f2a5f58328836878e27e9a621b5b9cf547ff0210de2c7f100b7f8526fb1fa694951b0d451f4ddc985bf578b9f44cf75e633c79426acc0c23aa17b5bb1f5afe5dac7cae8ad4fc8e1eef734017d1505cb1a143ffd49720cee652521ee7307f0034b480c402005aa76e096201cdfe3c491fb54546dd6b1aab99cffa8f"], &(0x7f0000000040)='GPL\x00', 0xe110, 0x38, &(0x7f0000000080)=""/56, 0x41f00, 0x1, [], r1, 0x5}, 0x48) r2 = epoll_create1(0x0) r3 = timerfd_create(0x7, 0x800) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r3, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000021ff4)={0x2001}) [ 834.853647] __kmalloc+0x2e0/0x760 [ 834.853669] ? ext4_find_extent+0x757/0x9b0 [ 834.853690] ext4_find_extent+0x757/0x9b0 [ 834.853715] ext4_ext_map_blocks+0x291/0x48f0 [ 834.853733] ? debug_smp_processor_id+0x1c/0x20 [ 834.853752] ? perf_trace_lock+0x14d/0x7a0 [ 834.863437] ? kasan_check_write+0x14/0x20 [ 834.863462] ? lock_is_held_type+0x210/0x210 [ 834.863498] ? ext4_ext_release+0x10/0x10 [ 834.863520] ? zap_class+0x640/0x640 [ 834.863538] ? zap_class+0x640/0x640 [ 834.863557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:33:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xff010000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 834.863574] ? check_preemption_disabled+0x48/0x280 [ 834.863610] ? lock_acquire+0x1ed/0x520 [ 834.871617] ? ext4_map_blocks+0x88f/0x1b50 [ 834.871642] ? lock_release+0xa00/0xa00 [ 834.871656] ? perf_trace_sched_process_exec+0x860/0x860 [ 834.871671] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 834.871686] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 834.871701] ? kasan_check_read+0x11/0x20 [ 834.871716] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 834.871747] ? down_write+0x8a/0x130 [ 834.871762] ? ext4_map_blocks+0x88f/0x1b50 [ 834.871778] ? down_read+0x120/0x120 [ 834.871797] ? kernel_text_address+0x79/0xf0 [ 834.964735] ext4_map_blocks+0x8f7/0x1b50 [ 834.964753] ? __save_stack_trace+0x8d/0xf0 [ 834.964782] ? ext4_issue_zeroout+0x190/0x190 [ 834.964805] ? save_stack+0x43/0xd0 [ 834.964821] ? __kasan_slab_free+0x102/0x150 [ 834.964837] ? kasan_slab_free+0xe/0x10 [ 834.964851] ? kmem_cache_free+0x83/0x290 [ 834.964872] ext4_getblk+0x10e/0x630 [ 834.964893] ? ext4_iomap_begin+0x1390/0x1390 [ 834.997595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 03:33:29 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) r3 = getpgid(0x0) r4 = getpgid(0x0) tgkill(r3, r4, 0x3) [ 834.997610] ? __dquot_initialize+0x629/0xdd0 [ 834.997633] ext4_bread+0x95/0x2b0 [ 834.997666] ? ext4_getblk+0x630/0x630 [ 834.997679] ? dquot_get_next_dqblk+0x180/0x180 [ 834.997697] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 834.997718] ? common_perm+0x1f6/0x7b0 [ 835.040514] ext4_append+0x14e/0x370 [ 835.040539] ext4_mkdir+0x532/0xe60 [ 835.040567] ? ext4_init_dot_dotdot+0x510/0x510 [ 835.040588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 835.040605] ? security_inode_permission+0xd2/0x100 [ 835.040624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 835.040638] ? security_inode_mkdir+0xe8/0x120 [ 835.040675] vfs_mkdir+0x42e/0x6b0 [ 835.040693] do_mkdirat+0x27a/0x310 [ 835.056844] ? __ia32_sys_mknod+0xb0/0xb0 [ 835.056859] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.056876] ? trace_hardirqs_off_caller+0x310/0x310 [ 835.056892] ? ksys_ioctl+0x81/0xd0 [ 835.056911] __x64_sys_mkdir+0x5c/0x80 [ 835.056939] do_syscall_64+0x1b9/0x820 [ 835.056953] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 835.056971] ? syscall_return_slowpath+0x5e0/0x5e0 [ 835.056989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 835.130597] ? trace_hardirqs_on_caller+0x310/0x310 [ 835.135631] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 835.140692] ? prepare_exit_to_usermode+0x291/0x3b0 [ 835.145722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 835.150585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.155776] RIP: 0033:0x456987 03:33:29 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x5, 0x2, 0xb100}, 0x10) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r2, r0) 03:33:29 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 835.158975] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 835.177892] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 835.185615] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 835.192892] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 835.200181] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 835.207461] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 835.214738] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:29 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x3) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000080)={0x20002, 0x0, [0xffffffffffffffff, 0x8, 0x4, 0x7, 0x1f, 0x9, 0xfffffffffffffffc]}) dup2(r1, r0) getsockopt$inet_int(r0, 0x0, 0x3f, &(0x7f0000000000), &(0x7f0000000100)=0x4) 03:33:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x500]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:29 executing program 3 (fault-call:3 fault-nth:30): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:29 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = dup2(r1, r0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000000)=0x16, 0x4) 03:33:29 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x1, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0x11}) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(r3, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x3}}, 0x18) prctl$PR_GET_SECCOMP(0x15) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:29 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:29 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) socket(0x1b, 0x80000, 0xfff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0x2, 0x0, 0xfa, 0x3, 0x9}, 0x1, 0x2, 0x1000000000000000}) 03:33:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfffffff5]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 835.400378] FAULT_INJECTION: forcing a failure. [ 835.400378] name failslab, interval 1, probability 0, space 0, times 0 [ 835.429850] CPU: 0 PID: 23263 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 835.437228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 835.446599] Call Trace: [ 835.449221] dump_stack+0x244/0x39d [ 835.452891] ? dump_stack_print_info.cold.1+0x20/0x20 [ 835.458107] ? rcu_softirq_qs+0x20/0x20 [ 835.462106] should_fail.cold.4+0xa/0x17 [ 835.466189] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 835.471313] ? kernel_text_address+0x79/0xf0 [ 835.475735] ? __kernel_text_address+0xd/0x40 [ 835.480267] ? __save_stack_trace+0x8d/0xf0 [ 835.484604] ? zap_class+0x640/0x640 [ 835.488367] ? save_stack+0xa9/0xd0 [ 835.492009] ? __lock_is_held+0xb5/0x140 [ 835.496081] ? print_usage_bug+0xc0/0xc0 03:33:29 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) socket(0x1b, 0x80000, 0xfff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0x2, 0x0, 0xfa, 0x3, 0x9}, 0x1, 0x2, 0x1000000000000000}) [ 835.500164] ? trace_hardirqs_off+0xb8/0x310 [ 835.504650] ? trace_hardirqs_on+0x310/0x310 [ 835.509084] ? perf_trace_sched_process_exec+0x860/0x860 [ 835.514575] ? __lock_acquire+0x62f/0x4c20 [ 835.514613] __should_failslab+0x124/0x180 [ 835.514664] should_failslab+0x9/0x14 [ 835.514680] __kmalloc+0x2e0/0x760 [ 835.514701] ? ext4_find_extent+0x757/0x9b0 [ 835.530499] ext4_find_extent+0x757/0x9b0 [ 835.538979] ext4_ext_map_blocks+0x291/0x48f0 [ 835.543494] ? debug_smp_processor_id+0x1c/0x20 [ 835.548167] ? perf_trace_lock+0x14d/0x7a0 [ 835.552431] ? kasan_check_write+0x14/0x20 [ 835.556712] ? lock_is_held_type+0x210/0x210 [ 835.561159] ? ext4_ext_release+0x10/0x10 [ 835.565321] ? zap_class+0x640/0x640 [ 835.569038] ? zap_class+0x640/0x640 [ 835.569057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 835.569073] ? check_preemption_disabled+0x48/0x280 [ 835.569105] ? lock_acquire+0x1ed/0x520 [ 835.587268] ? ext4_map_blocks+0x88f/0x1b50 [ 835.591593] ? lock_release+0xa00/0xa00 [ 835.595579] ? perf_trace_sched_process_exec+0x860/0x860 03:33:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x1000000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:29 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 835.601048] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 835.605723] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 835.610667] ? kasan_check_read+0x11/0x20 [ 835.614826] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 835.620126] ? down_write+0x8a/0x130 [ 835.620141] ? ext4_map_blocks+0x88f/0x1b50 [ 835.620155] ? down_read+0x120/0x120 [ 835.620172] ? kernel_text_address+0x79/0xf0 [ 835.620192] ext4_map_blocks+0x8f7/0x1b50 [ 835.620214] ? __save_stack_trace+0x8d/0xf0 [ 835.636370] ? ext4_issue_zeroout+0x190/0x190 [ 835.649309] ? save_stack+0x43/0xd0 [ 835.649326] ? __kasan_slab_free+0x102/0x150 [ 835.649355] ? kasan_slab_free+0xe/0x10 [ 835.649388] ? kmem_cache_free+0x83/0x290 [ 835.665534] ext4_getblk+0x10e/0x630 [ 835.665557] ? ext4_iomap_begin+0x1390/0x1390 [ 835.665578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 835.665595] ? __dquot_initialize+0x629/0xdd0 [ 835.673795] ext4_bread+0x95/0x2b0 [ 835.673814] ? ext4_getblk+0x630/0x630 [ 835.673826] ? dquot_get_next_dqblk+0x180/0x180 [ 835.673843] ? debug_lockdep_rcu_enabled+0x77/0x90 03:33:29 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x400000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 835.673860] ? common_perm+0x1f6/0x7b0 [ 835.683873] ext4_append+0x14e/0x370 [ 835.683898] ext4_mkdir+0x532/0xe60 [ 835.683934] ? ext4_init_dot_dotdot+0x510/0x510 [ 835.683969] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 835.722350] ? security_inode_permission+0xd2/0x100 [ 835.727526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 835.733075] ? security_inode_mkdir+0xe8/0x120 [ 835.737677] vfs_mkdir+0x42e/0x6b0 [ 835.741233] do_mkdirat+0x27a/0x310 [ 835.744894] ? __ia32_sys_mknod+0xb0/0xb0 [ 835.749131] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.749150] ? trace_hardirqs_off_caller+0x310/0x310 [ 835.749165] ? ksys_ioctl+0x81/0xd0 [ 835.749184] __x64_sys_mkdir+0x5c/0x80 [ 835.767191] do_syscall_64+0x1b9/0x820 [ 835.771135] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 835.776511] ? syscall_return_slowpath+0x5e0/0x5e0 [ 835.781491] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 835.786343] ? trace_hardirqs_on_caller+0x310/0x310 [ 835.791393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 835.796425] ? prepare_exit_to_usermode+0x291/0x3b0 [ 835.801452] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 835.806320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 835.811510] RIP: 0033:0x456987 [ 835.814708] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 835.833619] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 835.841346] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 03:33:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xf5ffffff00000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:30 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x82001}) [ 835.848642] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 835.855910] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 835.863194] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 835.870480] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:30 executing program 3 (fault-call:3 fault-nth:31): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) fcntl$setown(r0, 0x8, r1) r2 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = open$dir(&(0x7f0000000300)='./file0\x00', 0x1, 0x0) name_to_handle_at(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x79, 0x4, "1bc9fa2cf6393205f3a1812c255be7ff647f56c0a945171eb555a84f458704fc8bf7e30fee5d13a7d94dbce2e3a15d8996daf0cd2dc76e87c30873766408948681e2449baf61c66f44619208c783b4e7e033e8561ecdd9cdfe6b3b22f0363a0ae2667947ad25c696046a3e830ac9efe5f7"}, &(0x7f0000000180), 0x400) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000000), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1) dup2(r3, r2) 03:33:30 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) socket(0x1b, 0x80000, 0xfff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0x2, 0x0, 0xfa, 0x3, 0x9}, 0x1, 0x2, 0x1000000000000000}) 03:33:30 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80000) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0xffffffffffffff0a) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:30 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfec00000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 836.072196] FAULT_INJECTION: forcing a failure. [ 836.072196] name failslab, interval 1, probability 0, space 0, times 0 [ 836.089320] CPU: 1 PID: 23326 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 836.096732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 836.106093] Call Trace: [ 836.108710] dump_stack+0x244/0x39d [ 836.112364] ? dump_stack_print_info.cold.1+0x20/0x20 [ 836.117571] ? zap_class+0x640/0x640 [ 836.121300] ? __mark_inode_dirty+0xfc4/0x1510 [ 836.125896] should_fail.cold.4+0xa/0x17 [ 836.129997] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 836.135102] ? __lock_is_held+0xb5/0x140 [ 836.139215] ? zap_class+0x640/0x640 [ 836.142955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 836.148499] ? __mark_inode_dirty+0x4b2/0x1510 [ 836.153093] ? __inode_attach_wb+0x13f0/0x13f0 [ 836.157683] ? __lock_is_held+0xb5/0x140 [ 836.161743] ? rcu_softirq_qs+0x20/0x20 [ 836.165732] ? inode_add_bytes+0xd3/0xf0 [ 836.169791] ? perf_trace_sched_process_exec+0x860/0x860 [ 836.175238] ? __dquot_alloc_space+0x4b9/0x8c0 [ 836.179845] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 836.184866] __should_failslab+0x124/0x180 [ 836.189108] should_failslab+0x9/0x14 [ 836.192914] kmem_cache_alloc+0x2be/0x730 [ 836.197089] ext4_mb_new_blocks+0x787/0x4840 [ 836.201505] ? find_held_lock+0x36/0x1c0 [ 836.205584] ? ext4_discard_preallocations+0x1900/0x1900 [ 836.211041] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 836.215975] ? kasan_check_read+0x11/0x20 [ 836.220133] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 836.225425] ? rcu_softirq_qs+0x20/0x20 [ 836.229484] ? rcu_softirq_qs+0x20/0x20 [ 836.233463] ? unwind_dump+0x190/0x190 [ 836.237364] ? is_bpf_text_address+0xd3/0x170 [ 836.241922] ? kernel_text_address+0x79/0xf0 [ 836.246359] ? __kernel_text_address+0xd/0x40 [ 836.250858] ? unwind_get_return_address+0x61/0xa0 [ 836.255794] ? __save_stack_trace+0x8d/0xf0 [ 836.260148] ? save_stack+0xa9/0xd0 [ 836.263777] ? save_stack+0x43/0xd0 [ 836.267504] ? kasan_kmalloc+0xc7/0xe0 [ 836.271401] ? __kmalloc+0x15b/0x760 [ 836.275110] ? ext4_find_extent+0x757/0x9b0 [ 836.279426] ? ext4_ext_map_blocks+0x291/0x48f0 [ 836.284097] ? ext4_map_blocks+0x8f7/0x1b50 [ 836.288422] ? ext4_getblk+0x10e/0x630 [ 836.292309] ? ext4_bread+0x95/0x2b0 [ 836.296041] ? ext4_append+0x14e/0x370 [ 836.299936] ? ext4_mkdir+0x532/0xe60 [ 836.303764] ? vfs_mkdir+0x42e/0x6b0 [ 836.307494] ? do_mkdirat+0x27a/0x310 [ 836.311286] ? __x64_sys_mkdir+0x5c/0x80 [ 836.315358] ? do_syscall_64+0x1b9/0x820 [ 836.319410] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.324787] ? save_stack+0xa9/0xd0 [ 836.328425] ? zap_class+0x640/0x640 [ 836.332169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.337704] ? check_preemption_disabled+0x48/0x280 [ 836.342731] ? __lock_is_held+0xb5/0x140 [ 836.346822] ? rcu_read_lock_sched_held+0x14f/0x180 [ 836.351830] ? __kmalloc+0x5ee/0x760 [ 836.355550] ? ext4_find_extent+0x757/0x9b0 [ 836.359889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.365427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.370967] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 836.375989] ext4_ext_map_blocks+0x2724/0x48f0 [ 836.380584] ? ext4_ext_release+0x10/0x10 [ 836.384735] ? zap_class+0x640/0x640 [ 836.388461] ? zap_class+0x640/0x640 [ 836.392281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.397885] ? check_preemption_disabled+0x48/0x280 [ 836.402939] ? lock_acquire+0x1ed/0x520 [ 836.406941] ? ext4_map_blocks+0x88f/0x1b50 [ 836.411307] ? lock_release+0xa00/0xa00 [ 836.415280] ? perf_trace_sched_process_exec+0x860/0x860 [ 836.420746] ? ext4_es_cache_extent+0x6a0/0x6a0 [ 836.425427] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 836.430353] ? kasan_check_read+0x11/0x20 [ 836.434513] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 836.439800] ? down_write+0x8a/0x130 [ 836.443511] ? ext4_map_blocks+0x88f/0x1b50 [ 836.447829] ? down_read+0x120/0x120 [ 836.451576] ? kernel_text_address+0x79/0xf0 [ 836.455990] ext4_map_blocks+0x8f7/0x1b50 [ 836.460136] ? __save_stack_trace+0x8d/0xf0 [ 836.464471] ? ext4_issue_zeroout+0x190/0x190 [ 836.469018] ? save_stack+0x43/0xd0 [ 836.472660] ? __kasan_slab_free+0x102/0x150 [ 836.477070] ? kasan_slab_free+0xe/0x10 [ 836.481085] ? kmem_cache_free+0x83/0x290 [ 836.485242] ext4_getblk+0x10e/0x630 [ 836.488969] ? ext4_iomap_begin+0x1390/0x1390 [ 836.493464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.499011] ? __dquot_initialize+0x629/0xdd0 [ 836.503539] ext4_bread+0x95/0x2b0 [ 836.507115] ? ext4_getblk+0x630/0x630 [ 836.510999] ? dquot_get_next_dqblk+0x180/0x180 [ 836.515686] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 836.520620] ? common_perm+0x1f6/0x7b0 [ 836.524511] ext4_append+0x14e/0x370 [ 836.528245] ext4_mkdir+0x532/0xe60 [ 836.531896] ? ext4_init_dot_dotdot+0x510/0x510 [ 836.536586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.542145] ? security_inode_permission+0xd2/0x100 [ 836.547209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 836.552757] ? security_inode_mkdir+0xe8/0x120 [ 836.557343] vfs_mkdir+0x42e/0x6b0 [ 836.560887] do_mkdirat+0x27a/0x310 [ 836.564516] ? __ia32_sys_mknod+0xb0/0xb0 [ 836.568661] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.574029] ? trace_hardirqs_off_caller+0x310/0x310 [ 836.579141] ? ksys_ioctl+0x81/0xd0 [ 836.582772] __x64_sys_mkdir+0x5c/0x80 [ 836.586662] do_syscall_64+0x1b9/0x820 [ 836.590567] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 836.596079] ? syscall_return_slowpath+0x5e0/0x5e0 [ 836.601022] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 836.605863] ? trace_hardirqs_on_caller+0x310/0x310 [ 836.610889] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 836.615919] ? prepare_exit_to_usermode+0x291/0x3b0 [ 836.620983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 836.625842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 836.631060] RIP: 0033:0x456987 [ 836.634270] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 836.653212] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 836.660916] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 03:33:30 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) socket(0x1b, 0x80000, 0xfff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0x2, 0x0, 0xfa, 0x3, 0x9}, 0x1, 0x2, 0x1000000000000000}) 03:33:30 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000080)={0x0, r3}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000140)=0xfffffffff4f4dc67) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000100)=r4) [ 836.668193] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 836.675472] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 836.682733] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 836.689999] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:30 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x7]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:30 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000100)=""/179) 03:33:31 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140), 0x0, 0x0, 0x0, 0x0}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:31 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) socket(0x1b, 0x80000, 0xfff) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) [ 836.789998] EXT4-fs warning (device sda1): ext4_group_extend:1786: will only finish group (524288 blocks, 256 new) [ 836.825457] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted [ 836.857240] EXT4-fs warning (device sda1): ext4_group_extend:1786: will only finish group (524288 blocks, 256 new) [ 836.912497] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted 03:33:31 executing program 3 (fault-call:3 fault-nth:32): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x100000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:31 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1c26000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:31 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) socket(0x1b, 0x80000, 0xfff) 03:33:31 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x81, 0x4000) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000200)={{0x0, @broadcast, 0x4e23, 0x4, 'none\x00', 0x2, 0x800, 0x15}, {@broadcast, 0x4e22, 0x4, 0xfffffffffffffc00, 0x5, 0x8}}, 0x44) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r3, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000021ff4)={0x2001}) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000100)="97f1da418b9ca9ac3de118d9338bacf94c65066bf13c959de8640a7321caf0ecf8bd4ce467501fe6d5ddf6eb9bc9b4798ed70edd62f2b1d9e7bd71466c8440be3c02b4ba125488234b54a099fb74df4090842229f76d519d78f483c026f0bee090ca0e3d600ea45acf77bf1f152d32851f815a48b4c4719bfbc1d1d79e55ca790aa76ca5b72610d0e40b6dc7fd4a721b7a3e11b83d669cce9b17f84629b7c9e6a15f007a268ccc729b6bd65404cdf42eaf814fd28e9414fba76cc26088f3ce865bb099db0ab4f019a87343450addb06a050920f2f612adc03ef88088d19c575474903f3123e3e520a23758088b75", 0xee}, {&(0x7f0000000000)="b2e8c94279833a4af811121e529c6b2446636047f039811608cfaf66426299a35211353fe848255bc8", 0x29}], 0x2, 0x2) 03:33:31 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000080)={0x100, 0x7, 0x4, 'queue0\x00', 0x1}) dup2(r1, r1) 03:33:31 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x12000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:31 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfec0]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:31 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x2000) dup2(r1, r0) 03:33:31 executing program 4: r0 = epoll_create1(0x80000) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r4 = request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140), 0xfffffffffffffffa) keyctl$unlink(0x9, r3, r4) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:31 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:31 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 837.298357] FAULT_INJECTION: forcing a failure. [ 837.298357] name failslab, interval 1, probability 0, space 0, times 0 [ 837.310407] CPU: 0 PID: 23395 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 837.317791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.327158] Call Trace: [ 837.329775] dump_stack+0x244/0x39d [ 837.333456] ? dump_stack_print_info.cold.1+0x20/0x20 [ 837.338681] should_fail.cold.4+0xa/0x17 [ 837.342775] ? kasan_slab_free+0xe/0x10 [ 837.346897] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 837.352024] ? ext4_mkdir+0x532/0xe60 [ 837.352067] ? mark_held_locks+0x130/0x130 [ 837.352083] ? trace_hardirqs_on+0x310/0x310 [ 837.352101] ? ext4_es_delayed_clu+0x37e/0x420 [ 837.352120] ? zap_class+0x640/0x640 [ 837.372827] ? mark_held_locks+0xc7/0x130 [ 837.376987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 837.382548] ? check_preemption_disabled+0x48/0x280 [ 837.387581] ? __lock_is_held+0xb5/0x140 [ 837.391679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 837.397227] ? ext4_ext_map_blocks+0xeeb/0x48f0 [ 837.401904] __should_failslab+0x124/0x180 [ 837.406157] should_failslab+0x9/0x14 [ 837.409967] kmem_cache_alloc+0x47/0x730 [ 837.414036] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 837.419061] ? ext4_es_can_be_merged+0x23d/0x2a0 [ 837.423834] ? __es_tree_search.isra.12+0x1ba/0x220 [ 837.428862] __es_insert_extent+0x30c/0x1120 [ 837.433289] ? ext4_es_free_extent+0x790/0x790 [ 837.437884] ? do_raw_write_lock+0x14f/0x310 [ 837.442338] ? do_raw_read_unlock+0x70/0x70 [ 837.446676] ? __lock_is_held+0xb5/0x140 [ 837.450757] ext4_es_insert_extent+0x357/0xbd0 [ 837.455350] ? ext4_es_scan_clu+0x50/0x50 [ 837.459514] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 837.464857] ? down_write+0x8a/0x130 [ 837.468579] ? ext4_map_blocks+0x88f/0x1b50 [ 837.472910] ? down_read+0x120/0x120 [ 837.476660] ? kernel_text_address+0x79/0xf0 [ 837.481110] ext4_map_blocks+0xb0c/0x1b50 [ 837.485301] ? __save_stack_trace+0x8d/0xf0 [ 837.489671] ? ext4_issue_zeroout+0x190/0x190 [ 837.494203] ? save_stack+0x43/0xd0 [ 837.497868] ? __kasan_slab_free+0x102/0x150 [ 837.502287] ? kasan_slab_free+0xe/0x10 [ 837.506266] ? kmem_cache_free+0x83/0x290 [ 837.510451] ext4_getblk+0x10e/0x630 [ 837.514192] ? ext4_iomap_begin+0x1390/0x1390 [ 837.518701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 837.524241] ? __dquot_initialize+0x629/0xdd0 [ 837.528754] ext4_bread+0x95/0x2b0 [ 837.532332] ? ext4_getblk+0x630/0x630 [ 837.536225] ? dquot_get_next_dqblk+0x180/0x180 [ 837.540913] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 837.545872] ? common_perm+0x1f6/0x7b0 [ 837.549769] ext4_append+0x14e/0x370 [ 837.553494] ext4_mkdir+0x532/0xe60 [ 837.557133] ? ext4_init_dot_dotdot+0x510/0x510 [ 837.561808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 837.567362] ? security_inode_permission+0xd2/0x100 [ 837.572430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 837.577999] ? security_inode_mkdir+0xe8/0x120 [ 837.582606] vfs_mkdir+0x42e/0x6b0 [ 837.586172] do_mkdirat+0x27a/0x310 [ 837.589844] ? __ia32_sys_mknod+0xb0/0xb0 [ 837.594002] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.599631] ? trace_hardirqs_off_caller+0x310/0x310 [ 837.604744] ? ksys_ioctl+0x81/0xd0 [ 837.608410] __x64_sys_mkdir+0x5c/0x80 [ 837.612308] do_syscall_64+0x1b9/0x820 [ 837.616237] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 837.621644] ? syscall_return_slowpath+0x5e0/0x5e0 [ 837.626581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 837.631431] ? trace_hardirqs_on_caller+0x310/0x310 [ 837.636454] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 837.641478] ? prepare_exit_to_usermode+0x291/0x3b0 [ 837.646511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 837.651369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.656560] RIP: 0033:0x456987 [ 837.659765] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 837.678668] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 837.686377] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 837.693648] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 [ 837.700921] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 837.708237] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 837.715514] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:32 executing program 3 (fault-call:3 fault-nth:33): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:32 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) dup2(r1, r0) 03:33:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xffffffc3]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:32 executing program 2: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000140)) 03:33:32 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:32 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) inotify_init() 03:33:32 executing program 2: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000140)) 03:33:32 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000080)={{0x33, @broadcast, 0x4e21, 0x1, 'wrr\x00', 0x8, 0x7, 0x65}, {@loopback, 0x4e21, 0x5, 0x9, 0x6e, 0x100000001}}, 0x44) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) [ 837.864193] FAULT_INJECTION: forcing a failure. [ 837.864193] name failslab, interval 1, probability 0, space 0, times 0 [ 837.889859] CPU: 0 PID: 23418 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 837.897268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.906622] Call Trace: [ 837.906652] dump_stack+0x244/0x39d 03:33:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x500000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:32 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) write$P9_RREMOVE(r3, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 837.906698] ? dump_stack_print_info.cold.1+0x20/0x20 [ 837.906728] ? debug_smp_processor_id+0x1c/0x20 [ 837.906751] ? perf_trace_lock+0x14d/0x7a0 [ 837.927053] should_fail.cold.4+0xa/0x17 [ 837.931137] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 837.936246] ? find_held_lock+0x36/0x1c0 [ 837.936272] ? zap_class+0x640/0x640 [ 837.936293] ? zap_class+0x640/0x640 [ 837.947755] ? zap_class+0x640/0x640 [ 837.951487] ? find_held_lock+0x36/0x1c0 [ 837.955583] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 837.955603] ? perf_trace_sched_process_exec+0x860/0x860 [ 837.955619] ? rcu_softirq_qs+0x20/0x20 [ 837.955643] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 837.975529] __should_failslab+0x124/0x180 [ 837.975553] should_failslab+0x9/0x14 [ 837.975571] __kmalloc_track_caller+0x2d1/0x760 [ 837.975593] ? strncpy_from_user+0x5a0/0x5a0 [ 837.975614] ? strndup_user+0x77/0xd0 [ 837.988336] memdup_user+0x2c/0xa0 [ 837.988357] strndup_user+0x77/0xd0 [ 837.988379] ksys_mount+0x3c/0x140 [ 837.988400] __x64_sys_mount+0xbe/0x150 03:33:32 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 837.988424] do_syscall_64+0x1b9/0x820 [ 838.000153] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 838.000175] ? syscall_return_slowpath+0x5e0/0x5e0 [ 838.000192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 838.000222] ? trace_hardirqs_on_caller+0x310/0x310 [ 838.000241] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 838.000258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 838.000276] ? prepare_exit_to_usermode+0x291/0x3b0 [ 838.000300] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 838.000323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.061009] RIP: 0033:0x459fda 03:33:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x10000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 838.064239] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 838.083153] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 838.090878] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 838.098154] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 838.105462] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 838.112737] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 838.120024] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:32 executing program 3 (fault-call:3 fault-nth:34): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:32 executing program 2: syz_emit_ethernet(0x0, 0x0, &(0x7f0000000140)) 03:33:32 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = dup2(r1, r0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="0b5465762f6d6430002d90723f83647c5d28313e788daecb0fe9be9425ae58a7709591be849a7da3827aff3a04d7d32bb17aaf2d8f59837db0fbedcf92fa951f"], &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='qnx4\x00', 0x2000, &(0x7f0000000100)='\x00') ioctl$RTC_WIE_ON(r2, 0x700f) 03:33:32 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0x400007, 0x0, 0x9f) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x900000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:32 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x33fe0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 838.280944] FAULT_INJECTION: forcing a failure. [ 838.280944] name failslab, interval 1, probability 0, space 0, times 0 [ 838.292491] CPU: 0 PID: 23452 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 838.299858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 838.309213] Call Trace: [ 838.311806] dump_stack+0x244/0x39d [ 838.315511] ? dump_stack_print_info.cold.1+0x20/0x20 [ 838.320763] should_fail.cold.4+0xa/0x17 [ 838.324827] ? kasan_slab_free+0xe/0x10 [ 838.328802] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 838.333905] ? ext4_mkdir+0x532/0xe60 [ 838.337738] ? mark_held_locks+0x130/0x130 [ 838.341971] ? trace_hardirqs_on+0x310/0x310 [ 838.346377] ? ext4_es_delayed_clu+0x37e/0x420 [ 838.350978] ? zap_class+0x640/0x640 [ 838.354702] ? mark_held_locks+0xc7/0x130 [ 838.358846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 838.364387] ? check_preemption_disabled+0x48/0x280 [ 838.369409] ? __lock_is_held+0xb5/0x140 [ 838.373501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 838.379058] ? ext4_ext_map_blocks+0xeeb/0x48f0 [ 838.383756] __should_failslab+0x124/0x180 [ 838.387998] should_failslab+0x9/0x14 [ 838.391843] kmem_cache_alloc+0x47/0x730 [ 838.395899] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 838.400935] ? ext4_es_can_be_merged+0x23d/0x2a0 [ 838.405686] ? __es_tree_search.isra.12+0x1ba/0x220 [ 838.410717] __es_insert_extent+0x30c/0x1120 [ 838.415162] ? ext4_es_free_extent+0x790/0x790 [ 838.419752] ? do_raw_write_lock+0x14f/0x310 [ 838.424156] ? do_raw_read_unlock+0x70/0x70 [ 838.428499] ? __lock_is_held+0xb5/0x140 [ 838.432590] ext4_es_insert_extent+0x357/0xbd0 [ 838.437213] ? ext4_es_scan_clu+0x50/0x50 [ 838.441370] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 838.446659] ? down_write+0x8a/0x130 [ 838.450408] ? ext4_map_blocks+0x88f/0x1b50 [ 838.454809] ? down_read+0x120/0x120 [ 838.458575] ? kernel_text_address+0x79/0xf0 [ 838.463020] ext4_map_blocks+0xb0c/0x1b50 [ 838.467288] ? __save_stack_trace+0x8d/0xf0 [ 838.471649] ? ext4_issue_zeroout+0x190/0x190 [ 838.476163] ? save_stack+0x43/0xd0 [ 838.479787] ? __kasan_slab_free+0x102/0x150 [ 838.484243] ? kasan_slab_free+0xe/0x10 [ 838.488217] ? kmem_cache_free+0x83/0x290 [ 838.492408] ext4_getblk+0x10e/0x630 [ 838.496127] ? ext4_iomap_begin+0x1390/0x1390 [ 838.500623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 838.506156] ? __dquot_initialize+0x629/0xdd0 [ 838.510657] ext4_bread+0x95/0x2b0 [ 838.514217] ? ext4_getblk+0x630/0x630 [ 838.518134] ? dquot_get_next_dqblk+0x180/0x180 [ 838.522802] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 838.527740] ? common_perm+0x1f6/0x7b0 [ 838.531651] ext4_append+0x14e/0x370 [ 838.535388] ext4_mkdir+0x532/0xe60 [ 838.539025] ? ext4_init_dot_dotdot+0x510/0x510 [ 838.543816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 838.549352] ? security_inode_permission+0xd2/0x100 [ 838.554378] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 838.559909] ? security_inode_mkdir+0xe8/0x120 [ 838.564499] vfs_mkdir+0x42e/0x6b0 [ 838.568051] do_mkdirat+0x27a/0x310 [ 838.571678] ? __ia32_sys_mknod+0xb0/0xb0 [ 838.575824] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.581192] ? trace_hardirqs_off_caller+0x310/0x310 [ 838.586314] ? ksys_ioctl+0x81/0xd0 [ 838.589950] __x64_sys_mkdir+0x5c/0x80 [ 838.593838] do_syscall_64+0x1b9/0x820 [ 838.597948] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 838.603323] ? syscall_return_slowpath+0x5e0/0x5e0 [ 838.608301] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 838.613159] ? trace_hardirqs_on_caller+0x310/0x310 [ 838.618175] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 838.623219] ? prepare_exit_to_usermode+0x291/0x3b0 [ 838.628240] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 838.633106] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.638306] RIP: 0033:0x456987 [ 838.641536] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 838.660434] RSP: 002b:00007eff919e7a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 838.668154] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000456987 [ 838.675429] RDX: 0000000000000007 RSI: 00000000000001ff RDI: 0000000020000040 03:33:32 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:32 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) [ 838.682688] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 838.689958] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000007 [ 838.697242] R13: 0000000000000000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:32 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x4) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) clock_adjtime(0x7, &(0x7f00000001c0)={0x9, 0x9, 0x2, 0x7d, 0x7fffffff, 0x3, 0x6, 0x2, 0x8, 0xff, 0x0, 0x32c4, 0x8, 0x10000, 0x9c, 0x1000, 0x81, 0x5, 0x3ff, 0x5, 0x9, 0x8, 0x8, 0x2, 0x40, 0x8}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/130, 0x82}], 0x1, &(0x7f0000000140)=""/47, 0x2f, 0x5}, 0x40) 03:33:33 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:33 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1200000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:33 executing program 4: r0 = epoll_create1(0x0) prctl$PR_GET_SECCOMP(0x15) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000140)={0x20000001}) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="9603ccd4d8c91cb3a8ec6be71817ba0c0285fe108fa7957612dda4d709baee5025e6e62e97754521b3f8d7e97fb1574236314027b44ce139192848cf8fac5a134a02cd7f27577f44eea824ea3daf91e1ed9d1a6fb6fde70377e2919f3982420e07", 0x61) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:33 executing program 3 (fault-call:3 fault-nth:35): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x40000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:33 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0x2, 0x7f, 0x9, 0xffff}, 'syz0\x00', 0x56}) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) dup2(r1, r0) 03:33:33 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:33 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x40030000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:33 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0xffffffffffffffff, 0x1fd) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1555555555555562, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:33 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:33 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x44) dup2(r1, r0) 03:33:33 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc00000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfe800000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:33 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000808}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r4, 0x724, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x10}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0xd}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 839.080335] FAULT_INJECTION: forcing a failure. [ 839.080335] name failslab, interval 1, probability 0, space 0, times 0 [ 839.140089] CPU: 0 PID: 23494 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 839.147472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.156826] Call Trace: [ 839.159424] dump_stack+0x244/0x39d [ 839.163116] ? dump_stack_print_info.cold.1+0x20/0x20 [ 839.168322] ? debug_smp_processor_id+0x1c/0x20 [ 839.172996] ? perf_trace_lock+0x14d/0x7a0 [ 839.177256] should_fail.cold.4+0xa/0x17 [ 839.181325] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 839.186430] ? lock_is_held_type+0x210/0x210 [ 839.190884] ? kasan_kmalloc+0xc7/0xe0 [ 839.194773] ? __kmalloc_track_caller+0x157/0x760 [ 839.199633] ? memdup_user+0x2c/0xa0 [ 839.203356] ? zap_class+0x640/0x640 [ 839.207076] ? do_syscall_64+0x1b9/0x820 [ 839.211145] ? zap_class+0x640/0x640 [ 839.214889] ? find_held_lock+0x36/0x1c0 [ 839.218992] ? perf_trace_sched_process_exec+0x860/0x860 [ 839.224458] ? lock_release+0xa00/0xa00 [ 839.228436] ? perf_trace_sched_process_exec+0x860/0x860 [ 839.233897] ? usercopy_warn+0x110/0x110 [ 839.237981] __should_failslab+0x124/0x180 [ 839.242246] should_failslab+0x9/0x14 [ 839.246064] kmem_cache_alloc_trace+0x2d7/0x750 [ 839.250755] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 839.256342] ? _copy_from_user+0xdf/0x150 [ 839.260504] copy_mount_options+0x5f/0x430 [ 839.264744] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 839.270294] ksys_mount+0xd0/0x140 [ 839.273865] __x64_sys_mount+0xbe/0x150 [ 839.277850] do_syscall_64+0x1b9/0x820 [ 839.281742] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 839.287125] ? syscall_return_slowpath+0x5e0/0x5e0 [ 839.292059] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 839.296913] ? trace_hardirqs_on_caller+0x310/0x310 [ 839.301964] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 839.306985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 839.312524] ? prepare_exit_to_usermode+0x291/0x3b0 [ 839.317587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 839.322443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 839.327652] RIP: 0033:0x459fda [ 839.330848] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 839.349766] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 839.357477] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 839.364742] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 839.372008] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 839.379272] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 839.386538] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:33 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:33 executing program 3 (fault-call:3 fault-nth:36): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:33 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x13, &(0x7f0000000000)='nodevbdevZtrusted\'\x00', 0xffffffffffffffff}, 0x30) io_setup(0x9, &(0x7f00000000c0)=0x0) io_submit(r3, 0x3, &(0x7f00000003c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x10001, r0, &(0x7f0000000100)="4954e602ecf4ef32fab1c38e2e6c4320e2e5fe55a7d798066a8840a69736440456a9c0071d228929f35c8f86249480d1be7cb7b51dea8304252e3dc8e96a431f66b3db026b617e24c13fec091385fca3825980f788", 0x55, 0x8000, 0x0, 0x1, r0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x100, r0, &(0x7f00000001c0)="75681a284387125b6e41b3bcc18241d46950418ee13e53d7460f06d88303a307a85e0d5f1095aede4c5adcf6ecb607045cbbcab434dae07ffde6d61257991800be91060b870a1991779226e70b5c36bfda0c502ecce4a24d509aab2b3b184dc71255b9b5917d6e93cb223c652311a5f9f36f58232a91452fd5cedd4d3061755f29950117e71992c7be0ff2e206aa53aa6976056907b71a1b48ca9065e36c0baa2563fe8dd72bec4fba705ea57fbd4dec215d1c839f5795716dfb476d9f918d13b5a74c3a139913c3f1", 0xc9, 0x1b, 0x0, 0x0, r0}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x3, r2, &(0x7f0000000340)="1c0f074c0671ebf8aacaa60da9b96d5e6d862fb70b0c5fdaa583ff74ae5fe3e399886fc3caf33e5d5c70fe39d6cbc1b10dc2328c613e6e47d70c", 0x3a, 0x80, 0x0, 0x2, r0}]) dup2(r1, r2) 03:33:33 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x40000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x10]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:33 executing program 4: r0 = epoll_create1(0x100000) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:33 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:33 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x2000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:33 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:33 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x6]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:33 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:34 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0xffffffffbffffffc) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2000, 0x10) r2 = dup2(r1, r0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) r3 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003480)={0x0, 0x0}, &(0x7f00000034c0)=0xc) stat(&(0x7f0000003500)='./file0\x00', &(0x7f0000003540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000003680)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003400)=[{&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000001140)="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", 0x1000}, {&(0x7f0000002140)="7b2f3cea088c7adbfa3ffa67a17adc15f3d6f5df1b139db65c", 0x19}, {&(0x7f0000002180)="63c6f170a89bf282a9bfe37a6eec5def20a517599fe57925437dad9b080cfae437aad9a4a922ede4a756430d347d3014bb956ea38691f6b48374afcc8ce18f072dc5e6026c4f176cacfee1e8fc64c1b78869fda4a7e67005bc17b7ae5ed942020f51a4098bdbb304cfae40e1cb5165d6a8593e4509148ea53823ee11dd97d5b5d3304a8a2440c43a75479fbba7bef3304dac17580c102542b4fe2df47d0274ae066a877d498c10f79df46ae853f2c752fa", 0xb1}, {&(0x7f0000002240)="88a31033d764d296ecab9ca923a605dc02c4177f4251d47804742dd4b47d4d103ec35cf11bc605b21ceeae6735501fedf30213a7163cb8b3646343c58b39dc1db8564c3f56644d4a12152a353d3b81cb5e2ebd0bf9f8c237a1c183d0cb3aadd9f882d3a861796da8bb1bd4dfcc8964389efa42146c50111a042c7ababa9e535536126a87e3e753988b38e59e52b2ab53356b5a91e52753d2e9d1936062b0961631e7b50156e5ae982df13b86aded5e4df6a9a670c10738592157f0fabdbbd4082a3691dbe9b991482718da0b25e6c4", 0xcf}, {&(0x7f0000002340)="ff7b119974f5c80245c45fb84212b01225bc5082b8d814c3230bec53d17256d4f0a5a9c38c23ec15243f38f032ca47d0757dc75d1c7ab949fb69dfe6902064ee02bc39a2d94e9ffa8c728c9e15", 0x4d}, {&(0x7f00000023c0)="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", 0x1000}, {&(0x7f00000033c0)="6b1900b3df01566a0ca94e9b584748b9a1b0", 0x12}], 0x8, &(0x7f00000035c0)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x20, 0x1, 0x1, [r1, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x30, 0x1, 0x1, [r2, r0, r2, r0, r0, r0, r2]}], 0x88, 0x4000}, 0x20004004) ioctl$sock_ifreq(r2, 0x8938, &(0x7f00000036c0)={'sit0\x00', @ifru_mtu=0x9}) 03:33:34 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) [ 839.912633] FAULT_INJECTION: forcing a failure. [ 839.912633] name failslab, interval 1, probability 0, space 0, times 0 [ 839.929729] CPU: 0 PID: 23553 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 839.937146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 839.946488] Call Trace: [ 839.949085] dump_stack+0x244/0x39d [ 839.952746] ? dump_stack_print_info.cold.1+0x20/0x20 [ 839.957979] ? debug_smp_processor_id+0x1c/0x20 [ 839.962671] ? perf_trace_lock+0x14d/0x7a0 [ 839.966920] should_fail.cold.4+0xa/0x17 [ 839.971001] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 839.976107] ? is_bpf_text_address+0xac/0x170 [ 839.980605] ? lock_downgrade+0x900/0x900 [ 839.984778] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 839.989713] ? kasan_check_read+0x11/0x20 [ 839.993880] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 839.999216] ? rcu_softirq_qs+0x20/0x20 [ 840.003263] ? unwind_dump+0x190/0x190 [ 840.007171] ? find_held_lock+0x36/0x1c0 [ 840.011277] ? perf_trace_sched_process_exec+0x860/0x860 [ 840.016767] __should_failslab+0x124/0x180 [ 840.021047] should_failslab+0x9/0x14 [ 840.024850] kmem_cache_alloc+0x2be/0x730 [ 840.029015] ? zap_class+0x640/0x640 [ 840.032816] getname_flags+0xd0/0x590 [ 840.036628] user_path_at_empty+0x2d/0x50 [ 840.040803] do_mount+0x177/0x31f0 [ 840.044384] ? check_preemption_disabled+0x48/0x280 [ 840.049411] ? copy_mount_string+0x40/0x40 [ 840.053666] ? rcu_pm_notify+0xc0/0xc0 [ 840.057567] ? copy_mount_options+0x5f/0x430 [ 840.061988] ? rcu_read_lock_sched_held+0x14f/0x180 [ 840.067024] ? kmem_cache_alloc_trace+0x353/0x750 [ 840.071886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 840.077461] ? _copy_from_user+0xdf/0x150 [ 840.081630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.087175] ? copy_mount_options+0x315/0x430 [ 840.091737] ksys_mount+0x12d/0x140 [ 840.095373] __x64_sys_mount+0xbe/0x150 [ 840.099357] do_syscall_64+0x1b9/0x820 [ 840.103251] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 840.108627] ? syscall_return_slowpath+0x5e0/0x5e0 [ 840.113576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 840.118476] ? trace_hardirqs_on_caller+0x310/0x310 [ 840.123500] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 840.128521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.134065] ? prepare_exit_to_usermode+0x291/0x3b0 [ 840.139094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 840.143964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.149160] RIP: 0033:0x459fda [ 840.152373] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 840.171321] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 840.179053] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 840.186327] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 840.193596] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 840.200869] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 840.208157] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:34 executing program 3 (fault-call:3 fault-nth:37): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfc]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:34 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x80600, 0x12) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:34 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf6ffffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 840.423651] FAULT_INJECTION: forcing a failure. [ 840.423651] name failslab, interval 1, probability 0, space 0, times 0 [ 840.456101] CPU: 0 PID: 23567 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 840.463482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.472839] Call Trace: [ 840.475457] dump_stack+0x244/0x39d [ 840.479113] ? dump_stack_print_info.cold.1+0x20/0x20 [ 840.484320] ? debug_smp_processor_id+0x1c/0x20 [ 840.489038] ? perf_trace_lock+0x14d/0x7a0 [ 840.493301] should_fail.cold.4+0xa/0x17 [ 840.497370] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 840.502509] ? lock_is_held_type+0x210/0x210 [ 840.506983] ? save_stack+0x43/0xd0 [ 840.510639] ? kasan_kmalloc+0xc7/0xe0 [ 840.514533] ? __kmalloc_track_caller+0x157/0x760 [ 840.519381] ? memdup_user+0x2c/0xa0 [ 840.523118] ? do_syscall_64+0x1b9/0x820 [ 840.527198] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.532572] ? zap_class+0x640/0x640 [ 840.536290] ? zap_class+0x640/0x640 [ 840.540018] ? find_held_lock+0x36/0x1c0 [ 840.544106] ? init_inode_xattrs+0x9c8/0x1300 [ 840.548635] ? perf_trace_sched_process_exec+0x860/0x860 [ 840.554117] ? lock_release+0xa00/0xa00 [ 840.558099] ? perf_trace_sched_process_exec+0x860/0x860 [ 840.563584] __should_failslab+0x124/0x180 [ 840.567828] should_failslab+0x9/0x14 [ 840.571666] __kmalloc_track_caller+0x2d1/0x760 [ 840.576382] ? strncpy_from_user+0x5a0/0x5a0 [ 840.580795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 840.586334] ? strndup_user+0x77/0xd0 [ 840.590159] memdup_user+0x2c/0xa0 [ 840.593702] strndup_user+0x77/0xd0 [ 840.597548] ksys_mount+0x73/0x140 [ 840.601094] __x64_sys_mount+0xbe/0x150 [ 840.605120] do_syscall_64+0x1b9/0x820 [ 840.609051] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 840.614421] ? syscall_return_slowpath+0x5e0/0x5e0 [ 840.619360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 840.624234] ? trace_hardirqs_on_caller+0x310/0x310 [ 840.629268] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 840.634302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 840.639844] ? prepare_exit_to_usermode+0x291/0x3b0 [ 840.644868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 840.649744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 840.654970] RIP: 0033:0x459fda 03:33:34 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80001) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101080, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:34 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev}}}}}}, &(0x7f0000000140)) 03:33:34 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x400000, 0x80) dup2(r1, r0) 03:33:34 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x12}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:34 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x10000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 840.658168] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 840.677072] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 840.684781] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 840.692048] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 840.699321] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 840.706594] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 840.713868] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev}}}}}}, &(0x7f0000000140)) 03:33:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfe80000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:35 executing program 3 (fault-call:3 fault-nth:38): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:35 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/57, &(0x7f0000000080)=0x39) r2 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0)={0x40, 0x7, 0x0, 0xfa6, 0x8, 0x8, 0x4, 0x3, 0x0, 0x40000000, 0x1}, 0xb) 03:33:35 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x34000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:35 executing program 4: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) connect$netlink(r2, &(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x800}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000021ff4)={0x2001}) 03:33:35 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev}}}}}}, &(0x7f0000000140)) [ 840.925368] FAULT_INJECTION: forcing a failure. [ 840.925368] name failslab, interval 1, probability 0, space 0, times 0 [ 840.970961] CPU: 1 PID: 23589 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 840.978358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 840.987746] Call Trace: [ 840.990360] dump_stack+0x244/0x39d [ 840.994039] ? dump_stack_print_info.cold.1+0x20/0x20 [ 840.999251] ? debug_smp_processor_id+0x1c/0x20 [ 841.003961] ? perf_trace_lock+0x14d/0x7a0 [ 841.008223] should_fail.cold.4+0xa/0x17 [ 841.012305] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 841.017518] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 841.022628] ? pcpu_alloc+0x190/0x15e0 [ 841.026539] ? zap_class+0x640/0x640 [ 841.030285] ? find_held_lock+0x36/0x1c0 [ 841.034391] ? perf_trace_sched_process_exec+0x860/0x860 [ 841.039864] __should_failslab+0x124/0x180 [ 841.044110] should_failslab+0x9/0x14 [ 841.047959] kmem_cache_alloc+0x2be/0x730 [ 841.052162] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 841.057187] ? m_stop+0x20/0x20 [ 841.060487] getname_kernel+0x54/0x370 [ 841.064376] kern_path+0x1e/0x40 [ 841.067754] lookup_bdev+0x10c/0x250 [ 841.071477] ? blkdev_open+0x280/0x280 [ 841.075401] ? find_held_lock+0x36/0x1c0 [ 841.079479] blkdev_get_by_path+0x1f/0xe0 [ 841.083637] mount_bdev+0x5d/0x3e0 [ 841.087192] ? xfs_test_remount_options+0x90/0x90 [ 841.092096] xfs_fs_mount+0x34/0x40 [ 841.095748] mount_fs+0xae/0x31d [ 841.099127] vfs_kern_mount.part.35+0xdc/0x4f0 [ 841.103735] ? may_umount+0xb0/0xb0 [ 841.107370] ? _raw_read_unlock+0x2c/0x50 [ 841.111577] ? __get_fs_type+0x97/0xc0 [ 841.115496] do_mount+0x581/0x31f0 [ 841.119044] ? check_preemption_disabled+0x48/0x280 [ 841.124078] ? copy_mount_string+0x40/0x40 [ 841.128350] ? copy_mount_options+0x5f/0x430 [ 841.132772] ? rcu_read_lock_sched_held+0x14f/0x180 [ 841.137804] ? kmem_cache_alloc_trace+0x353/0x750 [ 841.142654] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 841.148199] ? _copy_from_user+0xdf/0x150 [ 841.152356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.157902] ? copy_mount_options+0x315/0x430 [ 841.162450] ksys_mount+0x12d/0x140 [ 841.166089] __x64_sys_mount+0xbe/0x150 [ 841.170078] do_syscall_64+0x1b9/0x820 [ 841.173991] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 841.179360] ? syscall_return_slowpath+0x5e0/0x5e0 [ 841.184296] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 841.189213] ? trace_hardirqs_on_caller+0x310/0x310 [ 841.194243] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 841.199273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.204822] ? prepare_exit_to_usermode+0x291/0x3b0 [ 841.209861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 841.214724] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:33:35 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x2) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200100, 0x40) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x8, 0x1, 0x2, 0x7fffffff, 0x1f, 0x100000000, 0x2, 0x5, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)={r2, 0x8fb}, &(0x7f0000000140)=0x8) dup2(r1, r0) 03:33:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x600]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:35 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xebffffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}]}]}}}}}}}, &(0x7f0000000140)) 03:33:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}]}]}}}}}}}, &(0x7f0000000140)) 03:33:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {[@loopback]}]}]}}}}}}}, &(0x7f0000000140)) 03:33:35 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {}]}]}}}}}}}, &(0x7f0000000140)) [ 841.219919] RIP: 0033:0x459fda [ 841.223121] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 841.242028] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 841.249746] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 841.249756] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 841.249765] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 03:33:35 executing program 3 (fault-call:3 fault-nth:39): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:35 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:35 executing program 4: r0 = epoll_create1(0x0) getrusage(0x1, &(0x7f0000000040)) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x2019}) pipe2$9p(&(0x7f0000000200), 0x4000) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0xffffffff80000006, "64ed6c95e22cf753", "832cd4c9197f89577b13de44d640671c15863397fe300112b8c87b23916ba229", 0x400, 0x770}) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="54000000796bd86684960602b3404268c89e1c1a7a447dd6fa62e9b250f1cc43f33915859be304432e9d34b4c1c80174af3758edf62b6e79d9a04ab9e34a8857d810c2977db8be5a83eca30b031af7e46a9d617af72aa7989ffd05e695b80000000000000000000000000000000013a18ed54f2b3876dca637baabb209e4bade1787290a1d713dbf413722c5f072f280c97ece573e12cda8c60b9f563878eaee595280"], &(0x7f00000002c0)=0x5c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000300)={r4, 0x40}, &(0x7f0000000340)=0x8) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 841.249774] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 841.249783] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:35 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0xd0e1, 0x4000) getsockname$unix(r0, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x188) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x42) poll(&(0x7f0000000080)=[{r2, 0x1082}, {r2, 0x40}, {r2, 0x4}, {r2, 0x400}, {r2, 0x8000}, {r1, 0x24}, {r3, 0x2000}, {r1, 0x100}, {r2, 0x400}, {r1, 0x4000}], 0xa, 0x3) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000200)=0x20) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$FUSE_WRITE(r3, &(0x7f0000000240)={0x18, 0x0, 0x5, {0x3}}, 0x18) dup2(r2, r1) 03:33:35 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfe80]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:35 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:35 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e0000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 841.399279] FAULT_INJECTION: forcing a failure. [ 841.399279] name failslab, interval 1, probability 0, space 0, times 0 [ 841.436147] CPU: 1 PID: 23635 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 841.443524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 841.443532] Call Trace: [ 841.443556] dump_stack+0x244/0x39d [ 841.443581] ? dump_stack_print_info.cold.1+0x20/0x20 [ 841.464295] ? debug_smp_processor_id+0x1c/0x20 [ 841.469007] ? perf_trace_lock+0x14d/0x7a0 [ 841.473254] should_fail.cold.4+0xa/0x17 [ 841.477325] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 841.482466] ? find_held_lock+0x36/0x1c0 [ 841.486541] ? find_held_lock+0x36/0x1c0 [ 841.490638] ? perf_trace_sched_process_exec+0x860/0x860 [ 841.496091] ? kfree+0x1f8/0x230 [ 841.499463] ? ida_alloc_range+0x953/0xc70 [ 841.503708] __should_failslab+0x124/0x180 [ 841.507956] should_failslab+0x9/0x14 [ 841.511791] __kmalloc_track_caller+0x2d1/0x760 [ 841.516479] ? kstrdup_const+0x66/0x80 [ 841.520371] kstrdup+0x39/0x70 [ 841.523569] kstrdup_const+0x66/0x80 [ 841.527314] alloc_vfsmnt+0x186/0x990 [ 841.531113] ? m_stop+0x20/0x20 [ 841.534408] ? zap_class+0x640/0x640 [ 841.538121] ? rcu_pm_notify+0xc0/0xc0 [ 841.542017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.547556] ? refcount_sub_and_test_checked+0x203/0x310 [ 841.553025] ? find_held_lock+0x36/0x1c0 [ 841.557106] ? __get_fs_type+0x97/0xc0 [ 841.560998] ? lock_downgrade+0x900/0x900 [ 841.565153] ? lock_release+0xa00/0xa00 [ 841.569130] ? apparmor_cred_transfer+0x590/0x590 [ 841.574012] vfs_kern_mount.part.35+0x90/0x4f0 [ 841.578628] ? may_umount+0xb0/0xb0 [ 841.582253] ? _raw_read_unlock+0x2c/0x50 [ 841.586405] ? __get_fs_type+0x97/0xc0 [ 841.590301] do_mount+0x581/0x31f0 [ 841.593872] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 841.599324] ? retint_kernel+0x1b/0x2d [ 841.603219] ? copy_mount_string+0x40/0x40 [ 841.607475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 841.612253] ? retint_kernel+0x2d/0x2d [ 841.616188] ? copy_mount_options+0x257/0x430 [ 841.620684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.626225] ? copy_mount_options+0x315/0x430 [ 841.630735] ksys_mount+0x12d/0x140 [ 841.634382] __x64_sys_mount+0xbe/0x150 [ 841.638369] do_syscall_64+0x1b9/0x820 [ 841.642289] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 841.647686] ? syscall_return_slowpath+0x5e0/0x5e0 [ 841.652633] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 841.657479] ? trace_hardirqs_on_caller+0x310/0x310 [ 841.662528] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 841.667543] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 841.673079] ? prepare_exit_to_usermode+0x291/0x3b0 [ 841.678097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 841.682952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 841.688141] RIP: 0033:0x459fda [ 841.691376] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 841.710273] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 841.717976] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 841.725286] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 841.733030] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 841.740300] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 03:33:35 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0xa0) dup2(r1, r0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000000)={0xfff, 0x3, 0x8, 0x2fce, 0x100000000}) [ 841.747599] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xa000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:36 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000840)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@multicast2}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000a80)=0xe8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file1\x00', 0x4, 0xa, &(0x7f0000000740)=[{&(0x7f00000000c0)="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", 0xfe, 0x1}, {&(0x7f00000001c0)="a69589ac10aa94b35c914a55604c62fae41fe0185b3200fa91388782801fadb1a4557b56d6a7ed7b8c0a60af0acb52a930347a4b08d51319db926aa9006cfaa370e72e9d969df8838370c7025a04fb82f2c5afb35b405818162d8c2e2b76313626f20728bedce6d8e6acfd677ca9afef729413f6a360cf49", 0x78, 0x21dc}, {&(0x7f0000000240)="8010973686ace7347a45e823a89721106f16796b04c93d24658002dd94b5ef0457d83bd1ebcaa7a25e274730a3edca2cee83861dbd2db466be18fde0e5fc8ff390170728a49189057e33a10b8957b8e2db6af42d8b9408b1730c173bf6ebf6b77787c9c41752c5f528d3f60f4a67c9e9e8d882fa061cee4703cb8d26d71e61ca9443bbced8c600664464f84e79a996ffba1b32d7ed645a3d51cad85cc4adcb2d99f4ee2cf3d4c6b4", 0xa8, 0x1e}, {&(0x7f0000000340)="f370a5dafe", 0x5, 0x65493f54}, {&(0x7f0000000380)="27955db3504bdea47aff5f72dfd67028a9d78b1aeb81f1233e9123a6067e3ee484775852d08b5323e95c52bd9b90e97c150255a446659c535400716cef4e5214ed1236bbab68ce1cf614ec21cc52b83e090787dd4bff945444f81f5620f5e822f23fbd9eec16726753f085574084c06fa5bed388e83b6803a7f68dcbbab339dd5ba6707b89cd2a57baaa9b3c0b3f446d331e9ecf6b357400bd994ffa0205e914cfee", 0xa2, 0x11b}, {&(0x7f0000000440)="ce84c11a20bfca257667a01ce2da493f8c8511bd508e6d4c2c3b3da2440ec62422114eef578ef6a806d6c2f497e7f74808307c8add7923fe1945edeccdd7639350596a9e13d9b463d14b14f3b13e0dc723c838cc74bac5c4b1be94780d9dbeacee9060b57739ac205eb67e7c4908770607688281d23e8ae7ab35d7526fa18b08c6e6979a168471ea8a580dd342960ef61217e7c023027ee1afa615a61ea6aaa2a1699a5be9012b124d1511cf89f0b85d08faf04edb028a0a4e1201ee59407a111ccfa844624b57d3cc79", 0xca, 0x9}, {&(0x7f0000000540)="47ad7f4b8b96b934e6a2e5ac57e60060ceaadd3d2af09f16b41462ed26bbaac8b3bf54056aa44ab7a0b0bae8e041e61b1374ff8d3bf37e038ecb937fe3ab4eb9d2dc9a56f1ab95cc18c6", 0x4a, 0x1}, {&(0x7f00000005c0)="7494446d4c9b0192fa569f24f3c2b315a265f6803287310c54f595a3704f01ea0be67f0a04b706cab8fa0409ce4f8907d1f268d7f10629c673e7e9c08874910db0104f6fc0e1b2f9c260053375dd0db925a47045127221c5fae2749782219d07239eb3a92bee42e987a22acc6538d3f3808c88427745b13e413ac7a25baaaf531cda31c8dc7cf98f973a810231432ea20cc1f147b57c5e2cba8ccee862973379229a25671d758c3f35407f7ce680905bb32dbbbb9d285e1f", 0xb8, 0x9}, {&(0x7f0000000680)="33c4c282a130dc1ed039f6e61ec4d54fb3e298ef74e69b08e5d10a76da4787fd80f2c95b8c48f04a4bf5f4b2073761db0435673f4ad9df9576f51f8305", 0x3d, 0x8}, {&(0x7f00000006c0)="297a93d0351b6dbef1df39eb4396cf3ab5e9d6682ceab5003a61ff01f883d583954f9ebca60c128ee49e7355ebffdbd534d06d1d1946be119dd39cd34b22f1b133fc676ec9e356c233ff15faa2cb009fbcbcec1cf09b066e", 0x58, 0x2}], 0x20000, &(0x7f0000000ac0)={[{@mtpt='mtpt'}, {@grpquota='grpquota'}, {@lazytime='lazytime'}, {@bsdgroups='bsdgroups'}], [{@fowner_gt={'fowner>', r1}}, {@fowner_lt={'fowner<', r2}}]}) r3 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000b40)={0x9}) dup2(r3, r0) 03:33:36 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) write$tun(r3, &(0x7f0000000100)={@void, @val={0x3, 0x0, 0x5, 0x80000000, 0x9, 0x5}, @ipv4={{0x25, 0x4, 0x9, 0xff, 0x1259, 0x68, 0xfffffffffffffffb, 0xc5, 0x33, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x12}, {[@generic={0xcf, 0x11, "41c549d75001d002d09d83140de58b"}, @timestamp={0x44, 0x20, 0x1, 0x1, 0x2, [{[], 0x1000}, {[], 0x3}, {[], 0x3}, {[], 0x80000001}, {[@local], 0x10000}, {[], 0x8001}]}, @timestamp={0x44, 0x1c, 0xfffffffffffffffe, 0x3, 0xfffffffffffffffd, [{[], 0x5}, {[@empty], 0x9}, {[], 0x9}, {[@multicast1], 0x8}]}, @noop, @cipso={0x86, 0x31, 0x3, [{0x7, 0x5, "eb94f5"}, {0x6, 0x11, "5044742b0c4eb40289129d2d85de4e"}, {0x5, 0x3, 'G'}, {0x7, 0x12, "27b283657f5db0575e491ae021459eeb"}]}]}}, @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, 0x1, 0x880b, 0x3a, 0x2, [0x3, 0x38], "aa6f9c0d9d56f1f24729c9497e44b9185fec69233406b3ec3fc7f0af2a8a517eb2c1444d2243c3f669aa9bfda77e653ae813411eb923f6c373ef"}, {0x7, 0x0, 0x5, 0x200, 0x0, 0x0, 0x800, [], "ca8bc76ed1ea3ce44630dfa6d57e0387b3d49f91ccefb7a564c85aa21cc8e4989953c4047bed76906a583cffb8827117fbca726e3ffa12520435d72ac3f80ae2f4ce6e8983ff3b08cfd54fb41af08bcce81025a8a01cfb115a1da78c1069514ba0c2a2b4c70e8fb55fe5cc"}, {0x0, 0x0, 0x1, 0x101, 0x0, 0x0, 0x86dd, [0x40, 0xfffffffffffff800, 0x7], "70729229501c71d5908892025f6c2e1788426a3675d043ea3eb7dbab586028cf101352cc5793ead1b3c7289c3104fd4c35b01a146738360d1fe9ca2e2934166b95ff0e7e92cf46439e13859f5700b6057a2259b8e275f40fb5bedd63f455788e5fcac7635347323d027f4286952d04abd6a2910553652095052f7a5d149d44e99142001e1801fdd9ae882ef3b35e5ccf58383fd365cabcc37678e2aea16d081b2534a276e120ee90d06622fbc09620d2d08f498f3d90bb4690fce354d5d35a3fd1de9568c95eb2ad19455a73d03a783e37ca"}, {0x8, 0x88be, 0x3, {{0x9, 0x1, 0x9, 0xffffffffffffffa3, 0xc755, 0x4, 0x1, 0x1}, 0x1, 0x9}}, {0x8, 0x22eb, 0x0, {{0x4, 0x2, 0x9, 0x3f, 0x3ff, 0x7fffffff, 0x20000000}, 0x2, 0x10000, 0x5, 0x5, 0x0, 0x0, 0xf2, 0xbf, 0x24000000000000, 0xd373}}, {0x8, 0x6558, 0x1, "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"}}}}, 0x1263) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:36 executing program 3 (fault-call:3 fault-nth:40): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:36 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x6000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x700]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:36 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000080)=""/172) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) [ 841.981144] FAULT_INJECTION: forcing a failure. [ 841.981144] name failslab, interval 1, probability 0, space 0, times 0 [ 842.004024] CPU: 1 PID: 23672 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 842.011429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.020785] Call Trace: [ 842.023407] dump_stack+0x244/0x39d [ 842.027087] ? dump_stack_print_info.cold.1+0x20/0x20 [ 842.032305] ? debug_smp_processor_id+0x1c/0x20 [ 842.036997] ? perf_trace_lock+0x14d/0x7a0 [ 842.041254] should_fail.cold.4+0xa/0x17 [ 842.045325] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 842.050462] ? find_held_lock+0x36/0x1c0 [ 842.054613] ? find_held_lock+0x36/0x1c0 [ 842.058761] ? perf_trace_sched_process_exec+0x860/0x860 [ 842.064234] ? kfree+0x1f8/0x230 [ 842.067616] ? ida_alloc_range+0x953/0xc70 [ 842.071885] __should_failslab+0x124/0x180 [ 842.076168] should_failslab+0x9/0x14 [ 842.079977] __kmalloc_track_caller+0x2d1/0x760 [ 842.080003] ? kstrdup_const+0x66/0x80 [ 842.080021] kstrdup+0x39/0x70 [ 842.080039] kstrdup_const+0x66/0x80 [ 842.080063] alloc_vfsmnt+0x186/0x990 [ 842.088605] ? m_stop+0x20/0x20 [ 842.088641] ? zap_class+0x640/0x640 [ 842.088662] ? rcu_pm_notify+0xc0/0xc0 [ 842.110182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.115736] ? refcount_sub_and_test_checked+0x203/0x310 [ 842.121201] ? find_held_lock+0x36/0x1c0 [ 842.125300] ? __get_fs_type+0x97/0xc0 [ 842.129216] ? lock_downgrade+0x900/0x900 [ 842.133381] ? lock_release+0xa00/0xa00 [ 842.137368] ? apparmor_cred_transfer+0x590/0x590 [ 842.142261] vfs_kern_mount.part.35+0x90/0x4f0 [ 842.146892] ? may_umount+0xb0/0xb0 [ 842.150525] ? _raw_read_unlock+0x2c/0x50 [ 842.150540] ? __get_fs_type+0x97/0xc0 [ 842.150577] do_mount+0x581/0x31f0 [ 842.150613] ? check_preemption_disabled+0x48/0x280 [ 842.162167] ? copy_mount_string+0x40/0x40 [ 842.162197] ? copy_mount_options+0x5f/0x430 [ 842.162235] ? rcu_read_lock_sched_held+0x14f/0x180 [ 842.180910] ? kmem_cache_alloc_trace+0x353/0x750 [ 842.185774] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 842.191316] ? _copy_from_user+0xdf/0x150 [ 842.195519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.201066] ? copy_mount_options+0x315/0x430 [ 842.205579] ksys_mount+0x12d/0x140 [ 842.209214] __x64_sys_mount+0xbe/0x150 [ 842.213205] do_syscall_64+0x1b9/0x820 [ 842.217095] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 842.222476] ? syscall_return_slowpath+0x5e0/0x5e0 [ 842.227472] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 842.232342] ? trace_hardirqs_on_caller+0x310/0x310 [ 842.237388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 842.242445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.248067] ? prepare_exit_to_usermode+0x291/0x3b0 [ 842.253097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 842.257999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.263196] RIP: 0033:0x459fda 03:33:36 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x10}) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:36 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x18, 0x4) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000180)={0x1, 0x5a3e, 0x3}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r1, 0x400, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r1, 0xc0c85666, &(0x7f0000000080)={{0x7, @name="edcececbe59696034b394e342c195331834897b2961ea658db14d3a4aab18433"}, "0defe3ae79721ac8c5a4f240079520d4f92a55ff8b7c8ed7dbbce529b2c14c88", 0x1}) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r2, r1) 03:33:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xa00]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 842.266395] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 842.285305] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 842.293019] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 842.300295] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 842.307568] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 842.314871] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 842.322145] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {}, {}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:36 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000080)=""/117) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x0, 0x20}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r2, 0x3, 0x6, 0x9, 0x3, 0xa5c}, &(0x7f0000000180)=0x14) dup2(r1, r0) 03:33:36 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x40000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:36 executing program 4: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f0000000040)=""/115, 0x73, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r0, 0x4) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r3, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000021ff4)={0x2001}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=""/187, 0xbb) 03:33:36 executing program 3 (fault-call:3 fault-nth:41): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:36 executing program 0: fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000140)=0x4) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00'}, &(0x7f0000000100)=0x78) dup2(r0, 0xffffffffffffffff) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8a, 0x0) 03:33:36 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x2]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:36 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x11000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:36 executing program 4: r0 = epoll_create1(0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x4c17a7089298d659, 0xa1) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000440)={'nat\x00', 0x0, 0x4, 0x46, [], 0x4, &(0x7f0000000380)=[{}, {}, {}, {}], &(0x7f00000003c0)=""/70}, &(0x7f00000004c0)=0x78) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r3, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r2, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x5a03, 0x40000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) r6 = getuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose='loose'}, {@posixacl='posixacl'}, {@access_any='access=any'}, {@version_9p2000='version=9p2000'}, {@dfltuid={'dfltuid', 0x3d, r5}}, {@cachetag={'cachetag', 0x3d, 'ppp0'}}], [{@fsname={'fsname'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'keyring'}}, {@uid_lt={'uid<', r6}}, {@smackfstransmute={'smackfstransmute', 0x3d, "85766d6e6574306d643573756d76626f786e657431766d6e657431"}}]}}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000021ff4)={0x2001}) 03:33:36 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) mq_notify(r0, &(0x7f00000002c0)={0x0, 0x11, 0x0, @thr={&(0x7f0000000200)="44344c04abc632ae6733d5ad11cd7439d545dc8babc756ac3c7731e4b035e054e12e67bfb299f35b6f4fb317449e5724972bbe42f43023055cd82fe40d188276652fb728576c92c088897ca1b9a503256e854549d4c188877f4ad2fdd697327c1abbb272031c", &(0x7f0000000280)="8feb9f27bdc787941b3e2fb90a77be46390aefa77d5fcea79d7c64cac10970"}}) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000000)={0x6, r0, 0x1}) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x2) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f00000001c0)={0xffffffff, 0x7fffffff, 0x1, 0x3}) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000140)=r2) r3 = dup2(r1, r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in, @in6=@local}}, {{@in6}}}, &(0x7f0000000440)=0xe8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000480)=@assoc_value={0x0, 0xfff}, &(0x7f00000004c0)=0x8) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000005c0)={'veth0\x00', {0x2, 0x4e22}}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000500)={r4, 0x0, 0x2}, &(0x7f0000000540)=0x8) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000580)={0x0, 0x0, 0x3}) [ 842.601900] FAULT_INJECTION: forcing a failure. [ 842.601900] name failslab, interval 1, probability 0, space 0, times 0 [ 842.653787] CPU: 1 PID: 23724 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 842.661205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 842.661222] Call Trace: [ 842.661252] dump_stack+0x244/0x39d [ 842.661280] ? dump_stack_print_info.cold.1+0x20/0x20 [ 842.661309] ? debug_smp_processor_id+0x1c/0x20 [ 842.661331] ? perf_trace_lock+0x14d/0x7a0 [ 842.661359] should_fail.cold.4+0xa/0x17 [ 842.661384] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 842.661420] ? zap_class+0x640/0x640 [ 842.661449] ? find_held_lock+0x36/0x1c0 [ 842.661474] ? __lock_is_held+0xb5/0x140 [ 842.686864] ? xfs_read_agi+0x628/0x750 [ 842.686909] ? __lockdep_init_map+0x105/0x590 [ 842.686930] ? perf_trace_sched_process_exec+0x860/0x860 [ 842.695225] ? lockdep_init_map+0x9/0x10 [ 842.695254] __should_failslab+0x124/0x180 [ 842.695277] should_failslab+0x9/0x14 [ 842.695297] __kmalloc+0x2e0/0x760 [ 842.704101] ? __init_waitqueue_head+0x9e/0x150 [ 842.704120] ? init_wait_entry+0x1c0/0x1c0 [ 842.704137] ? prealloc_shrinker+0x172/0x340 [ 842.704159] prealloc_shrinker+0x172/0x340 [ 842.759268] sget_userns+0x945/0xed0 [ 842.762996] ? kill_litter_super+0x60/0x60 [ 842.767269] ? ns_test_super+0x50/0x50 [ 842.771174] ? grab_super+0x400/0x400 [ 842.775003] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 842.780565] ? apparmor_capable+0x355/0x6c0 [ 842.784905] ? apparmor_cred_transfer+0x590/0x590 [ 842.789774] ? cap_capable+0x1f9/0x260 [ 842.793682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.799232] ? security_capable+0x99/0xc0 [ 842.803398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.808990] ? ns_capable_common+0x13f/0x170 [ 842.813433] ? kill_litter_super+0x60/0x60 [ 842.817683] sget+0x10b/0x150 [ 842.820836] ? ns_test_super+0x50/0x50 [ 842.824748] mount_bdev+0x111/0x3e0 [ 842.828406] ? xfs_test_remount_options+0x90/0x90 [ 842.833267] xfs_fs_mount+0x34/0x40 [ 842.836907] mount_fs+0xae/0x31d [ 842.840302] vfs_kern_mount.part.35+0xdc/0x4f0 [ 842.844908] ? may_umount+0xb0/0xb0 [ 842.848556] ? _raw_read_unlock+0x2c/0x50 [ 842.852728] ? __get_fs_type+0x97/0xc0 [ 842.856649] do_mount+0x581/0x31f0 [ 842.860220] ? check_preemption_disabled+0x48/0x280 [ 842.865258] ? copy_mount_string+0x40/0x40 [ 842.869540] ? copy_mount_options+0x5f/0x430 [ 842.874057] ? rcu_read_lock_sched_held+0x14f/0x180 [ 842.879103] ? kmem_cache_alloc_trace+0x353/0x750 [ 842.883978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 842.889541] ? _copy_from_user+0xdf/0x150 [ 842.893703] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.899255] ? copy_mount_options+0x315/0x430 [ 842.903769] ksys_mount+0x12d/0x140 [ 842.907413] __x64_sys_mount+0xbe/0x150 [ 842.911413] do_syscall_64+0x1b9/0x820 [ 842.915307] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 842.920679] ? syscall_return_slowpath+0x5e0/0x5e0 [ 842.925623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 842.930581] ? trace_hardirqs_on_caller+0x310/0x310 [ 842.935665] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 842.940702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 842.946265] ? prepare_exit_to_usermode+0x291/0x3b0 [ 842.951329] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 842.956188] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 842.961396] RIP: 0033:0x459fda [ 842.964610] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 842.983510] RSP: 002b:00007eff919c6a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 842.991218] RAX: ffffffffffffffda RBX: 00007eff919c6b30 RCX: 0000000000459fda 03:33:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x97d6000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1], 0x81000000}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) [ 842.998488] RDX: 00007eff919c6ad0 RSI: 0000000020000040 RDI: 00007eff919c6af0 [ 843.005773] RBP: 0000000020000040 R08: 00007eff919c6b30 R09: 00007eff919c6ad0 [ 843.013042] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000005 [ 843.020326] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000004 03:33:37 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 843.090134] 9pnet: Insufficient options for proto=fd 03:33:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfec0000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 843.145195] 9pnet: Insufficient options for proto=fd 03:33:37 executing program 3 (fault-call:3 fault-nth:42): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:37 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) accept(r0, &(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000000)=0x80) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000140)=0x10) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000180)={0x8, 0x80000001, 0x0, 0x1}) dup2(r1, r1) 03:33:37 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:37 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3ec0}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:37 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x4) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000040)={0x9, 0x6, 0x4, 0x2000, {0x77359400}, {0x7, 0xc, 0x2, 0x1, 0x255d, 0x3, "f5550145"}, 0x7, 0x4, @offset=0x8, 0x4}) fcntl$setlease(r0, 0x400, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:37 executing program 4: r0 = epoll_create1(0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="040000000000000000000000000000000800000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000008b0000000000000000000000000000000000000000000000", @ANYRES32, @ANYBLOB="00000000030000000000000000000000000000000000000000000000", @ANYRES32, @ANYBLOB="00000000008000000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="00000000ff0300000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000000000000080ff0100000000000000000000000000000000", @ANYRES32, @ANYBLOB="000000000008000000fb0000000000000000000000f0c18e9bcbed4eca08041b07000000b93f5ecf8f7053c2f98f50ce"]) r1 = timerfd_create(0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000000000, 0x103040) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r1, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000021ff4)={0x2001}) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x6, 0x4000000000000004) write$input_event(r3, &(0x7f0000000040)={{}, 0x3, 0x10000, 0xa6b2}, 0x18) 03:33:37 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xffffffff00000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 843.265424] FAULT_INJECTION: forcing a failure. [ 843.265424] name failslab, interval 1, probability 0, space 0, times 0 [ 843.327119] CPU: 0 PID: 23760 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 843.334508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.343873] Call Trace: [ 843.346490] dump_stack+0x244/0x39d [ 843.350147] ? dump_stack_print_info.cold.1+0x20/0x20 [ 843.355363] ? debug_smp_processor_id+0x1c/0x20 [ 843.360046] ? perf_trace_lock+0x14d/0x7a0 [ 843.364304] should_fail.cold.4+0xa/0x17 [ 843.368390] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 843.373508] ? perf_trace_lock+0x14d/0x7a0 [ 843.377771] ? mark_held_locks+0x130/0x130 [ 843.382034] ? lock_is_held_type+0x210/0x210 [ 843.386459] ? zap_class+0x640/0x640 [ 843.390203] ? find_held_lock+0x36/0x1c0 [ 843.394288] ? __lock_is_held+0xb5/0x140 [ 843.398390] ? perf_trace_sched_process_exec+0x860/0x860 [ 843.403866] ? sget_userns+0x190/0xed0 [ 843.407778] __should_failslab+0x124/0x180 [ 843.412046] should_failslab+0x9/0x14 [ 843.415859] kmem_cache_alloc_trace+0x2d7/0x750 [ 843.420556] sget_userns+0x1b6/0xed0 [ 843.424326] ? kill_litter_super+0x60/0x60 [ 843.428574] ? ns_test_super+0x50/0x50 [ 843.432466] ? grab_super+0x400/0x400 [ 843.436269] ? do_raw_spin_trylock+0x270/0x270 [ 843.440865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 843.446443] ? apparmor_capable+0x355/0x6c0 [ 843.450793] ? apparmor_cred_transfer+0x590/0x590 [ 843.455670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.461220] ? cap_capable+0x1f9/0x260 [ 843.465142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.470688] ? security_capable+0x99/0xc0 [ 843.474847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.480395] ? ns_capable_common+0x13f/0x170 [ 843.484832] ? kill_litter_super+0x60/0x60 [ 843.489078] sget+0x10b/0x150 [ 843.492219] ? ns_test_super+0x50/0x50 [ 843.496126] mount_bdev+0x111/0x3e0 [ 843.499767] ? xfs_test_remount_options+0x90/0x90 [ 843.504636] xfs_fs_mount+0x34/0x40 [ 843.508272] mount_fs+0xae/0x31d [ 843.511688] vfs_kern_mount.part.35+0xdc/0x4f0 [ 843.516342] ? may_umount+0xb0/0xb0 [ 843.520120] ? _raw_read_unlock+0x2c/0x50 [ 843.524274] ? __get_fs_type+0x97/0xc0 [ 843.528201] do_mount+0x581/0x31f0 [ 843.531759] ? check_preemption_disabled+0x48/0x280 [ 843.536802] ? copy_mount_string+0x40/0x40 [ 843.541063] ? copy_mount_options+0x5f/0x430 [ 843.545475] ? rcu_read_lock_sched_held+0x14f/0x180 [ 843.550494] ? kmem_cache_alloc_trace+0x353/0x750 [ 843.555342] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 843.560914] ? _copy_from_user+0xdf/0x150 [ 843.565093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.570636] ? copy_mount_options+0x315/0x430 [ 843.575149] ksys_mount+0x12d/0x140 [ 843.578786] __x64_sys_mount+0xbe/0x150 [ 843.582770] do_syscall_64+0x1b9/0x820 [ 843.586658] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 843.592030] ? syscall_return_slowpath+0x5e0/0x5e0 [ 843.596996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 843.601865] ? trace_hardirqs_on_caller+0x310/0x310 [ 843.606913] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 843.611993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 843.617553] ? prepare_exit_to_usermode+0x291/0x3b0 [ 843.622627] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 843.627481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.632794] RIP: 0033:0x459fda [ 843.636007] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 843.654912] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 843.662637] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 843.669946] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 03:33:37 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xeffdffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:37 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x9000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:37 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:37 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) setxattr$security_evm(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@v2={0x3, 0x3, 0x4, 0x1b7d, 0x9, "4af0472beb4543652b"}, 0x13, 0x1) fcntl$setlease(r0, 0x400, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = msgget$private(0x0, 0xa75652c946becbf) msgctl$MSG_INFO(r1, 0xc, &(0x7f00000000c0)) socket$inet(0x2, 0x40000025, 0xfffffffffffffffd) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000180)={0x1}, 0x4) dup2(r0, r0) [ 843.677226] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 843.684504] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 843.691793] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:38 executing program 3 (fault-call:3 fault-nth:43): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:38 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x2) readahead(r0, 0x953, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r1, r0) 03:33:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x3f00]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:38 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 843.888493] FAULT_INJECTION: forcing a failure. [ 843.888493] name failslab, interval 1, probability 0, space 0, times 0 [ 843.938040] CPU: 1 PID: 23798 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 843.945426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.954780] Call Trace: [ 843.957390] dump_stack+0x244/0x39d [ 843.961029] ? dump_stack_print_info.cold.1+0x20/0x20 [ 843.966240] ? debug_smp_processor_id+0x1c/0x20 [ 843.970918] ? perf_trace_lock+0x14d/0x7a0 [ 843.975194] should_fail.cold.4+0xa/0x17 [ 843.979280] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 843.984387] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 843.989526] ? pcpu_alloc+0x190/0x15e0 [ 843.993457] ? zap_class+0x640/0x640 [ 843.997218] ? find_held_lock+0x36/0x1c0 [ 844.001313] ? perf_trace_sched_process_exec+0x860/0x860 [ 844.006790] __should_failslab+0x124/0x180 [ 844.011039] should_failslab+0x9/0x14 [ 844.014850] kmem_cache_alloc+0x2be/0x730 [ 844.019026] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 844.024084] ? m_stop+0x20/0x20 [ 844.027385] getname_kernel+0x54/0x370 [ 844.031299] kern_path+0x1e/0x40 [ 844.034676] lookup_bdev+0x10c/0x250 [ 844.038401] ? blkdev_open+0x280/0x280 [ 844.042300] ? find_held_lock+0x36/0x1c0 [ 844.046388] blkdev_get_by_path+0x1f/0xe0 [ 844.050582] mount_bdev+0x5d/0x3e0 [ 844.054148] ? xfs_test_remount_options+0x90/0x90 [ 844.059077] xfs_fs_mount+0x34/0x40 [ 844.062716] mount_fs+0xae/0x31d [ 844.066125] vfs_kern_mount.part.35+0xdc/0x4f0 [ 844.070720] ? may_umount+0xb0/0xb0 [ 844.074349] ? _raw_read_unlock+0x2c/0x50 [ 844.078548] ? __get_fs_type+0x97/0xc0 [ 844.082464] do_mount+0x581/0x31f0 [ 844.086041] ? check_preemption_disabled+0x48/0x280 [ 844.091088] ? copy_mount_string+0x40/0x40 [ 844.095358] ? copy_mount_options+0x5f/0x430 [ 844.099804] ? rcu_read_lock_sched_held+0x14f/0x180 [ 844.104839] ? kmem_cache_alloc_trace+0x353/0x750 [ 844.109691] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 844.115263] ? _copy_from_user+0xdf/0x150 [ 844.119416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.124964] ? copy_mount_options+0x315/0x430 [ 844.129482] ksys_mount+0x12d/0x140 [ 844.133144] __x64_sys_mount+0xbe/0x150 [ 844.137140] do_syscall_64+0x1b9/0x820 [ 844.141030] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 844.146425] ? syscall_return_slowpath+0x5e0/0x5e0 [ 844.151359] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 844.156220] ? trace_hardirqs_on_caller+0x310/0x310 [ 844.161256] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 844.166290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.171875] ? prepare_exit_to_usermode+0x291/0x3b0 [ 844.176899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 844.181763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.186981] RIP: 0033:0x459fda [ 844.190175] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 844.209088] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 844.216819] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 844.216834] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 844.231361] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 03:33:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:38 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) r3 = socket$inet(0x2, 0x1, 0xfffffffffffffff7) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000080)=0x9beb, 0x4) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2100, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:38 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x40) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x3) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000100)=0x7) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000080)=0x9f) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) modify_ldt$write2(0x11, &(0x7f0000000000)={0x4, 0x100000, 0xffffffffffffffff, 0x7, 0x100, 0x1, 0x8, 0x7ff, 0xf1f, 0x7}, 0x10) dup2(r2, r2) 03:33:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x97d6]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:38 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf0ffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 844.238660] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 844.245928] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:38 executing program 3 (fault-call:3 fault-nth:44): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:38 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x6}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[], 0x81000000}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:38 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = getuid() syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x81, 0x5, &(0x7f0000000440)=[{&(0x7f00000000c0)="b70f658ce1dc0c141714f4044044bc803c415b5f4b096dd9eb238648db12aab9895c01cb124fb9ab9040c665", 0x2c, 0x1}, {&(0x7f0000000100)="b3e8c25e9a06ca66f35c17e0b04b24bf233713cce168bfa316ef1529291ac9e30eac32bb41cb08d7c34bb13fc6ad9d65c97b3a4c14955386aa5087c82bb549ed28bb7f6fd308a8b123b1449208f7116f2d3907f8b03fb0c04496bdc8fa6b2787e785f6e619dac6dcd6bb1252be8c3ffd55e79f085217bdd46abacd701d42e9ecf3a9d5f3867e7bb9d21dc8875fff78998b647c4baf5c9437881006a78b2eda4c9b04191ea12d00ee233279fb79210f65e18cc46ea67e7e225b05635b9ba12b2581e23e6b8b4a0be5a288d1e29d490b8e50f5ab58", 0xd4, 0x800}, {&(0x7f0000000200)="ade08c1181c103a69339f89d556d1dab589e840c3b8a177cb418550ac128b460eb826d7c045c1c8802d2326835b7a7f61251395317763fbe614c9bec77fdb17bfa8b152cc2cebfc658ebe7865b32a8a8078749a63d236402d046b5632e60c4228d55e24addd7dc80f822f29ffc0f241b5b80060e65907fa8e0fd6f9a7531b42d4da73958ea1125c70c29b3902b5aabbb1fa5159aac8800ead24652be4ce33e4c763feec84acfa90b5d670045742bd44be2918ebf8a8a410d8e46ddcdb10b4a3596299768678e378b23", 0xc9, 0x7fff}, {&(0x7f0000000340)="99ca1c3da8cc67ab6c22717f35816fc66e11fe79a01c95f1bb41b24bb9847b24b0499528216da33ebbae82795aa487d22d7ba6e75d26df0b45962f29127b2b1f72df230d9830161625f40a5910dab850fca5b96c0790e5fcefc776076bab1662c731e4fdd5313067ba588a76ebe787da54161ce71f8f9fa401e96c8329688b6018f709cfe2d7db4cf027cb18b2e5e962e694afabfc5025568f9075d91a4e7e8e20f49997826dc0bf88d2ff8fc9390b2f33eed1c32a8572", 0xb7}, {&(0x7f0000000400)="ca706cb6f38d87af40a2a654", 0xc, 0x9}], 0x0, &(0x7f00000004c0)={[{@type={'type', 0x3d, "708caaeb"}}, {@creator={'creator', 0x3d, "97e33f5f"}}, {@quiet='quiet'}, {@type={'type', 0x3d, "95cfba4a"}}, {@part={'part', 0x3d, 0x4}}, {@file_umask={'file_umask'}}, {@codepage={'codepage', 0x3d, 'maccyrillic'}}, {@umask={'umask', 0x3d, 0x4}}, {@type={'type', 0x3d, "57013a44"}}], [{@pcr={'pcr', 0x3d, 0x10}}, {@uid_lt={'uid<', r1}}]}) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup2(r2, r0) 03:33:38 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xc0fe]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 844.400978] FAULT_INJECTION: forcing a failure. [ 844.400978] name failslab, interval 1, probability 0, space 0, times 0 [ 844.412373] CPU: 1 PID: 23833 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 844.419739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.429121] Call Trace: [ 844.429156] dump_stack+0x244/0x39d [ 844.429176] ? dump_stack_print_info.cold.1+0x20/0x20 [ 844.440585] ? debug_smp_processor_id+0x1c/0x20 [ 844.445254] ? perf_trace_lock+0x14d/0x7a0 03:33:38 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000480)={0x20000003}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1c000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000440)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x10, &(0x7f0000000200)={&(0x7f0000000100)=""/233, 0xe9, 0x0}}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000300)={0x0, 0xfffffffffffff001, 0xa094, 0x7fffffdf, 0x8, 0xfffffffffffffffb}) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) write$evdev(r3, &(0x7f00000004c0)=[{{0x77359400}, 0x17, 0x5, 0x5}], 0x18) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000580)='/dev/audio\x00', 0x10000, 0x0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'L+'}, 0x28, 0x2) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r3, 0x10, &(0x7f0000000280)={&(0x7f0000000040)=""/103, 0x67, r4}}, 0x10) clock_gettime(0x0, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) timerfd_settime(r5, 0x0, &(0x7f0000005000)={{r6, r7+10000000}, {r8, r9+30000000}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) mknodat(r3, &(0x7f0000000400)='./file0\x00', 0x8000, 0x8d8) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000500)={[0x4, 0x3000, 0x103001, 0x1], 0x0, 0x0, 0x9}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x10001) [ 844.449522] should_fail.cold.4+0xa/0x17 [ 844.453592] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 844.458699] ? perf_trace_lock+0x14d/0x7a0 [ 844.458726] ? mark_held_locks+0x130/0x130 [ 844.458750] ? lock_is_held_type+0x210/0x210 [ 844.458777] ? zap_class+0x640/0x640 [ 844.467232] ? find_held_lock+0x36/0x1c0 [ 844.467254] ? __lock_is_held+0xb5/0x140 [ 844.467285] ? perf_trace_sched_process_exec+0x860/0x860 [ 844.467302] ? sget_userns+0x190/0xed0 [ 844.467327] __should_failslab+0x124/0x180 [ 844.489035] should_failslab+0x9/0x14 [ 844.489052] kmem_cache_alloc_trace+0x2d7/0x750 [ 844.489079] sget_userns+0x1b6/0xed0 [ 844.489093] ? kill_litter_super+0x60/0x60 [ 844.489113] ? ns_test_super+0x50/0x50 [ 844.489130] ? grab_super+0x400/0x400 [ 844.505749] ? do_raw_spin_trylock+0x270/0x270 [ 844.505791] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 844.505807] ? apparmor_capable+0x355/0x6c0 [ 844.505827] ? apparmor_cred_transfer+0x590/0x590 [ 844.505843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.505864] ? cap_capable+0x1f9/0x260 [ 844.517669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.517698] ? security_capable+0x99/0xc0 [ 844.517738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.526116] ? ns_capable_common+0x13f/0x170 [ 844.526134] ? kill_litter_super+0x60/0x60 [ 844.526148] sget+0x10b/0x150 [ 844.526162] ? ns_test_super+0x50/0x50 [ 844.526195] mount_bdev+0x111/0x3e0 [ 844.526212] ? xfs_test_remount_options+0x90/0x90 [ 844.526229] xfs_fs_mount+0x34/0x40 [ 844.593194] mount_fs+0xae/0x31d [ 844.596840] vfs_kern_mount.part.35+0xdc/0x4f0 [ 844.601442] ? may_umount+0xb0/0xb0 [ 844.605085] ? _raw_read_unlock+0x2c/0x50 [ 844.609248] ? __get_fs_type+0x97/0xc0 [ 844.613171] do_mount+0x581/0x31f0 [ 844.616749] ? check_preemption_disabled+0x48/0x280 [ 844.621793] ? copy_mount_string+0x40/0x40 [ 844.626045] ? copy_mount_options+0x5f/0x430 [ 844.630468] ? rcu_read_lock_sched_held+0x14f/0x180 [ 844.635490] ? kmem_cache_alloc_trace+0x353/0x750 [ 844.640354] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 844.645893] ? _copy_from_user+0xdf/0x150 [ 844.650078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.655622] ? copy_mount_options+0x315/0x430 [ 844.660131] ksys_mount+0x12d/0x140 [ 844.663768] __x64_sys_mount+0xbe/0x150 [ 844.667755] do_syscall_64+0x1b9/0x820 [ 844.671645] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 844.677035] ? syscall_return_slowpath+0x5e0/0x5e0 [ 844.682004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 844.686873] ? trace_hardirqs_on_caller+0x310/0x310 [ 844.691895] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 844.696946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 844.702506] ? prepare_exit_to_usermode+0x291/0x3b0 [ 844.707560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 844.712429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.717618] RIP: 0033:0x459fda [ 844.720817] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 844.739725] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 844.747444] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 844.754753] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 844.762028] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 844.769301] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 844.776596] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:39 executing program 2: syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:39 executing program 0: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc03e0000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x7000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:39 executing program 3 (fault-call:3 fault-nth:45): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:39 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xeffdffff}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:39 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:39 executing program 0: r0 = epoll_create1(0x0) prctl$PR_GET_SECCOMP(0x15) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000140)={0x20000001}) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000040)="9603ccd4d8c91cb3a8ec6be71817ba0c0285fe108fa7957612dda4d709baee5025e6e62e97754521b3f8d7e97fb1574236314027b44ce139192848cf8fac5a134a02cd7f27577f44eea824ea3daf91e1ed9d1a6fb6fde70377e2919f3982420e07", 0x61) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfc000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 844.968789] FAULT_INJECTION: forcing a failure. [ 844.968789] name failslab, interval 1, probability 0, space 0, times 0 [ 844.993970] CPU: 0 PID: 23863 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 845.001378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.010730] Call Trace: [ 845.013331] dump_stack+0x244/0x39d [ 845.016970] ? dump_stack_print_info.cold.1+0x20/0x20 [ 845.022181] ? debug_smp_processor_id+0x1c/0x20 [ 845.026852] ? perf_trace_lock+0x14d/0x7a0 [ 845.031089] should_fail.cold.4+0xa/0x17 [ 845.035163] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 845.040275] ? zap_class+0x640/0x640 [ 845.044016] ? find_held_lock+0x36/0x1c0 [ 845.048097] ? __lock_is_held+0xb5/0x140 [ 845.052174] ? __lockdep_init_map+0x105/0x590 [ 845.056667] ? perf_trace_sched_process_exec+0x860/0x860 [ 845.062120] ? lockdep_init_map+0x9/0x10 [ 845.066224] __should_failslab+0x124/0x180 [ 845.070467] should_failslab+0x9/0x14 [ 845.074268] __kmalloc+0x2e0/0x760 [ 845.077824] ? __init_waitqueue_head+0x9e/0x150 [ 845.082526] ? init_wait_entry+0x1c0/0x1c0 [ 845.086768] ? prealloc_shrinker+0x172/0x340 [ 845.091180] prealloc_shrinker+0x172/0x340 [ 845.095426] sget_userns+0x945/0xed0 [ 845.099158] ? kill_litter_super+0x60/0x60 [ 845.103443] ? ns_test_super+0x50/0x50 [ 845.107334] ? grab_super+0x400/0x400 [ 845.111152] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 845.116690] ? apparmor_capable+0x355/0x6c0 [ 845.121024] ? apparmor_cred_transfer+0x590/0x590 [ 845.125871] ? cap_capable+0x1f9/0x260 [ 845.129769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.135310] ? security_capable+0x99/0xc0 [ 845.139476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.145030] ? ns_capable_common+0x13f/0x170 [ 845.149442] ? kill_litter_super+0x60/0x60 [ 845.153679] sget+0x10b/0x150 [ 845.156784] ? ns_test_super+0x50/0x50 [ 845.160722] mount_bdev+0x111/0x3e0 [ 845.164353] ? xfs_test_remount_options+0x90/0x90 [ 845.169202] xfs_fs_mount+0x34/0x40 [ 845.172833] mount_fs+0xae/0x31d [ 845.176236] vfs_kern_mount.part.35+0xdc/0x4f0 [ 845.180838] ? may_umount+0xb0/0xb0 [ 845.184474] ? _raw_read_unlock+0x2c/0x50 [ 845.188651] ? __get_fs_type+0x97/0xc0 [ 845.192550] do_mount+0x581/0x31f0 [ 845.196123] ? check_preemption_disabled+0x48/0x280 [ 845.201147] ? copy_mount_string+0x40/0x40 [ 845.205398] ? copy_mount_options+0x5f/0x430 [ 845.209819] ? rcu_read_lock_sched_held+0x14f/0x180 [ 845.214843] ? kmem_cache_alloc_trace+0x353/0x750 [ 845.219703] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 845.225246] ? _copy_from_user+0xdf/0x150 [ 845.229400] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.234944] ? copy_mount_options+0x315/0x430 [ 845.239506] ksys_mount+0x12d/0x140 [ 845.243154] __x64_sys_mount+0xbe/0x150 [ 845.247134] do_syscall_64+0x1b9/0x820 [ 845.251038] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 845.256402] ? syscall_return_slowpath+0x5e0/0x5e0 [ 845.261362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.266227] ? trace_hardirqs_on_caller+0x310/0x310 [ 845.271257] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 845.276269] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.281808] ? prepare_exit_to_usermode+0x291/0x3b0 [ 845.286823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 845.291669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.296868] RIP: 0033:0x459fda [ 845.300056] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 845.318957] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 845.326664] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 845.333927] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 845.341217] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 845.348477] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 845.355736] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:39 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x8000000000000000, 0x80000000003) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x402000, 0x0) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f0000000100)={0x6, 0x2}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000040)) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000140)={0x2001}) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x2000) ioctl$TIOCSTI(r4, 0x5412, 0x68) socket$inet(0x2, 0x80006, 0x9) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) 03:33:39 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:39 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xff01]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:39 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x61ea2a8a, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000001c0)={0x1, 0x1ff, 0x200, 0x7f5e, 0x100}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_CROPCAP(r3, 0xc02c563a, &(0x7f0000000040)={0x4, {0x6, 0xfff, 0x1000, 0x7}, {0x1000, 0xd1, 0x38, 0x7}, {0x10001, 0x10001}}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) 03:33:39 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x8]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:39 executing program 3 (fault-call:3 fault-nth:46): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:39 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xfffff000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:39 executing program 2: syz_emit_ethernet(0x5e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x20, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:39 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x800000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 845.751173] FAULT_INJECTION: forcing a failure. [ 845.751173] name failslab, interval 1, probability 0, space 0, times 0 [ 845.764101] CPU: 0 PID: 23917 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 845.771471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.780821] Call Trace: [ 845.783418] dump_stack+0x244/0x39d [ 845.787097] ? dump_stack_print_info.cold.1+0x20/0x20 [ 845.792317] ? debug_smp_processor_id+0x1c/0x20 [ 845.796990] ? perf_trace_lock+0x14d/0x7a0 [ 845.801259] should_fail.cold.4+0xa/0x17 [ 845.805385] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 845.810512] ? zap_class+0x640/0x640 [ 845.814246] ? find_held_lock+0x36/0x1c0 [ 845.818315] ? __lock_is_held+0xb5/0x140 [ 845.822411] ? ntfs_attr_extend_allocation+0x28d8/0x3170 [ 845.827911] ? __lockdep_init_map+0x105/0x590 [ 845.832503] ? perf_trace_sched_process_exec+0x860/0x860 [ 845.837994] ? lockdep_init_map+0x9/0x10 [ 845.842101] __should_failslab+0x124/0x180 [ 845.846364] should_failslab+0x9/0x14 [ 845.850174] __kmalloc+0x2e0/0x760 [ 845.853727] ? __init_waitqueue_head+0x9e/0x150 [ 845.858418] ? init_wait_entry+0x1c0/0x1c0 [ 845.862663] ? prealloc_shrinker+0x172/0x340 [ 845.867131] prealloc_shrinker+0x172/0x340 [ 845.871387] sget_userns+0x945/0xed0 [ 845.875111] ? kill_litter_super+0x60/0x60 [ 845.879362] ? ns_test_super+0x50/0x50 [ 845.883262] ? grab_super+0x400/0x400 [ 845.887102] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 845.892654] ? apparmor_capable+0x355/0x6c0 [ 845.897009] ? apparmor_cred_transfer+0x590/0x590 [ 845.901869] ? cap_capable+0x1f9/0x260 [ 845.905775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.911338] ? security_capable+0x99/0xc0 [ 845.915503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 845.921057] ? ns_capable_common+0x13f/0x170 [ 845.925484] ? kill_litter_super+0x60/0x60 [ 845.929730] sget+0x10b/0x150 [ 845.932847] ? ns_test_super+0x50/0x50 [ 845.936753] mount_bdev+0x111/0x3e0 [ 845.940394] ? xfs_test_remount_options+0x90/0x90 [ 845.945253] xfs_fs_mount+0x34/0x40 [ 845.948890] mount_fs+0xae/0x31d [ 845.952277] vfs_kern_mount.part.35+0xdc/0x4f0 [ 845.956867] ? may_umount+0xb0/0xb0 [ 845.960498] ? _raw_read_unlock+0x2c/0x50 [ 845.964695] ? __get_fs_type+0x97/0xc0 [ 845.968620] do_mount+0x581/0x31f0 [ 845.972176] ? check_preemption_disabled+0x48/0x280 [ 845.977224] ? copy_mount_string+0x40/0x40 [ 845.981482] ? copy_mount_options+0x5f/0x430 [ 845.985908] ? rcu_read_lock_sched_held+0x14f/0x180 [ 845.990957] ? kmem_cache_alloc_trace+0x353/0x750 [ 845.995812] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 846.001352] ? _copy_from_user+0xdf/0x150 [ 846.005510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.011073] ? copy_mount_options+0x315/0x430 [ 846.015607] ksys_mount+0x12d/0x140 [ 846.019258] __x64_sys_mount+0xbe/0x150 [ 846.023259] do_syscall_64+0x1b9/0x820 [ 846.027152] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 846.032539] ? syscall_return_slowpath+0x5e0/0x5e0 [ 846.037483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 846.042340] ? trace_hardirqs_on_caller+0x310/0x310 [ 846.047370] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 846.052427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.057985] ? prepare_exit_to_usermode+0x291/0x3b0 [ 846.063013] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 846.067912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.073115] RIP: 0033:0x459fda [ 846.076315] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 846.095218] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 03:33:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x5000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 846.102951] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 846.110230] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 846.117502] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 846.124773] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 846.132071] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:40 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x240) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000080)) r1 = epoll_create1(0x0) r2 = epoll_create1(0xfffffffffffffffd) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000180)={0x6, 0x3, 0x4, 0x20082014, {0x0, 0x7530}, {0x7, 0xe, 0x89, 0x10001, 0x0, 0x5, "b0b019f0"}, 0x0, 0x6, @planes=&(0x7f0000000140)={0xf2bb, 0xfffffffffffffe00, @userptr=0x8001, 0x9}, 0x4}) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x410001) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r3, 0x0, &(0x7f0000000100), 0x0) epoll_pwait(r2, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000021ff4)={0x2001}) 03:33:40 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:40 executing program 2: syz_emit_ethernet(0x5e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x20, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x2000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:40 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "347c78bb2262205797cbf4fbc43a7a872c8db4da9812271c503b7afade9ee1d79509e9ba41e4fea8e9dafd63d8e15a8f3a6664084fd779612a0d905ba0750215", "1b4dc1e22bddc446dc90cbe1d1c52b5be29b65c763baae6ab530693386f2fc3f"}) 03:33:40 executing program 3 (fault-call:3 fault-nth:47): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:40 executing program 2: syz_emit_ethernet(0x5e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x20, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:40 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xa00}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:40 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x4000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:40 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80002) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) [ 846.528173] FAULT_INJECTION: forcing a failure. [ 846.528173] name failslab, interval 1, probability 0, space 0, times 0 [ 846.565879] CPU: 1 PID: 23950 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 846.573308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.582661] Call Trace: [ 846.585271] dump_stack+0x244/0x39d [ 846.588913] ? dump_stack_print_info.cold.1+0x20/0x20 [ 846.594187] ? debug_smp_processor_id+0x1c/0x20 [ 846.599004] ? perf_trace_lock+0x14d/0x7a0 [ 846.603288] should_fail.cold.4+0xa/0x17 [ 846.607378] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 846.612530] ? zap_class+0x640/0x640 [ 846.616296] ? save_stack+0xa9/0xd0 [ 846.619931] ? save_stack+0x43/0xd0 [ 846.623587] ? kasan_kmalloc+0xc7/0xe0 [ 846.627476] ? __kmalloc+0x15b/0x760 [ 846.631230] ? find_held_lock+0x36/0x1c0 [ 846.635300] ? __lock_is_held+0xb5/0x140 [ 846.639382] ? perf_trace_sched_process_exec+0x860/0x860 [ 846.644876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.650436] ? check_preemption_disabled+0x48/0x280 [ 846.655460] __should_failslab+0x124/0x180 [ 846.659705] should_failslab+0x9/0x14 [ 846.663549] kmem_cache_alloc_node_trace+0x270/0x740 [ 846.668671] __kmalloc_node+0x3c/0x70 [ 846.672482] kvmalloc_node+0x65/0xf0 [ 846.676209] __list_lru_init+0x5d9/0x840 [ 846.680286] ? list_lru_destroy+0x500/0x500 [ 846.684621] ? up_write+0x7b/0x220 [ 846.688165] ? down_write_nested+0x130/0x130 [ 846.692593] ? down_read+0x120/0x120 [ 846.696316] ? init_wait_entry+0x1c0/0x1c0 [ 846.700571] ? prealloc_shrinker+0x172/0x340 [ 846.705043] sget_userns+0x975/0xed0 [ 846.708778] ? kill_litter_super+0x60/0x60 [ 846.713058] ? ns_test_super+0x50/0x50 [ 846.716960] ? grab_super+0x400/0x400 [ 846.720842] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 846.726408] ? apparmor_capable+0x355/0x6c0 [ 846.730783] ? apparmor_cred_transfer+0x590/0x590 [ 846.735635] ? cap_capable+0x1f9/0x260 [ 846.739537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.745089] ? security_capable+0x99/0xc0 [ 846.749246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.754788] ? ns_capable_common+0x13f/0x170 [ 846.759232] ? kill_litter_super+0x60/0x60 [ 846.763490] sget+0x10b/0x150 [ 846.766600] ? ns_test_super+0x50/0x50 [ 846.770494] mount_bdev+0x111/0x3e0 [ 846.774149] ? xfs_test_remount_options+0x90/0x90 [ 846.779016] xfs_fs_mount+0x34/0x40 [ 846.782646] mount_fs+0xae/0x31d [ 846.786045] vfs_kern_mount.part.35+0xdc/0x4f0 [ 846.790631] ? may_umount+0xb0/0xb0 [ 846.794303] ? _raw_read_unlock+0x2c/0x50 [ 846.798468] ? __get_fs_type+0x97/0xc0 [ 846.802370] do_mount+0x581/0x31f0 [ 846.805912] ? retint_kernel+0x1b/0x2d [ 846.809832] ? trace_hardirqs_on+0x310/0x310 [ 846.814253] ? copy_mount_string+0x40/0x40 [ 846.818502] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 846.823267] ? retint_kernel+0x2d/0x2d [ 846.827172] ? copy_mount_options+0x239/0x430 [ 846.831675] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 846.836544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.842107] ? copy_mount_options+0x315/0x430 [ 846.846631] ksys_mount+0x12d/0x140 [ 846.850265] __x64_sys_mount+0xbe/0x150 [ 846.854245] do_syscall_64+0x1b9/0x820 [ 846.858135] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 846.863502] ? syscall_return_slowpath+0x5e0/0x5e0 [ 846.868432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 846.873294] ? trace_hardirqs_on_caller+0x310/0x310 [ 846.878312] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 846.883353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 846.888899] ? prepare_exit_to_usermode+0x291/0x3b0 [ 846.893923] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 846.898779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.903979] RIP: 0033:0x459fda [ 846.907184] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 03:33:41 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xfffffffffffff000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:41 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000000)) 03:33:41 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) ioctl$UI_SET_RELBIT(r3, 0x40045566, 0x7) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:41 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x1c, 0x0, 0x0, 0x0, [{[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x5]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 846.926113] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 846.933834] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 846.941108] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 846.948389] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 846.955658] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 846.962923] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:41 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x8, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000340), 0x0, 0x2}, 0x20) 03:33:41 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x1c, 0x0, 0x0, 0x0, [{[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:41 executing program 3 (fault-call:3 fault-nth:48): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:41 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x261c}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xa]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:41 executing program 4: r0 = epoll_create1(0x80000) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:41 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xc, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x1c, 0x0, 0x0, 0x0, [{[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:41 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) inotify_init1(0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000400)=0x7fffffff) 03:33:41 executing program 2: syz_emit_ethernet(0x5e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x20, 0x0, 0x0, 0x0, [{}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) [ 847.236823] EXT4-fs warning (device sda1): ext4_group_extend:1786: will only finish group (524288 blocks, 256 new) [ 847.250531] EXT4-fs warning (device sda1): ext4_group_extend:1791: can't read last block, resize aborted 03:33:41 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xfeffffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:41 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x80fe]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:41 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000000)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000240)='illinois\x00', 0x9) sendto$inet6(r4, &(0x7f0000000100), 0x0, 0x20000004, 0x0, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r5, 0x401104000000016) pipe(&(0x7f0000000040)) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) eventfd2(0x5, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:41 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="5500000018007f4812fe01b2a4a280930a06027700a84306910000000b00020035000c00060000001900150002000000000000dc1338d54400009b84136ef75afb83de4411001613c43ab8220000060cec4faba7d4", 0x55}], 0x1}, 0x0) 03:33:41 executing program 2: syz_emit_ethernet(0x5e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x20, 0x0, 0x0, 0x0, [{}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) [ 847.378585] netlink: 'syz-executor0': attribute type 21 has an invalid length. [ 847.429895] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 847.436909] IPv6: NLM_F_CREATE should be set when creating new route [ 847.443522] IPv6: NLM_F_CREATE should be set when creating new route [ 847.450102] IPv6: NLM_F_CREATE should be set when creating new route [ 847.526328] FAULT_INJECTION: forcing a failure. [ 847.526328] name failslab, interval 1, probability 0, space 0, times 0 [ 847.538273] CPU: 0 PID: 24019 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 847.545661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.555037] Call Trace: [ 847.557651] dump_stack+0x244/0x39d [ 847.561305] ? dump_stack_print_info.cold.1+0x20/0x20 [ 847.566519] ? debug_smp_processor_id+0x1c/0x20 [ 847.571203] ? perf_trace_lock+0x14d/0x7a0 [ 847.575467] should_fail.cold.4+0xa/0x17 [ 847.579543] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 847.584673] ? kernel_text_address+0x79/0xf0 [ 847.589094] ? unwind_get_return_address+0x61/0xa0 [ 847.594031] ? __save_stack_trace+0x8d/0xf0 [ 847.598358] ? zap_class+0x640/0x640 [ 847.602135] ? find_held_lock+0x36/0x1c0 [ 847.606236] ? __lock_is_held+0xb5/0x140 [ 847.610320] ? perf_trace_sched_process_exec+0x860/0x860 [ 847.615775] ? check_preemption_disabled+0x48/0x280 [ 847.620821] __should_failslab+0x124/0x180 [ 847.625063] should_failslab+0x9/0x14 [ 847.628880] kmem_cache_alloc_trace+0x2d7/0x750 [ 847.633548] ? __kmalloc_node+0x3c/0x70 [ 847.637523] ? __kmalloc_node+0x3c/0x70 [ 847.641512] ? rcu_read_lock_sched_held+0x14f/0x180 [ 847.646563] __memcg_init_list_lru_node+0x185/0x2d0 [ 847.651586] ? kvfree_rcu+0x20/0x20 [ 847.655238] ? __kmalloc_node+0x50/0x70 [ 847.659271] __list_lru_init+0x4d6/0x840 [ 847.663357] ? list_lru_destroy+0x500/0x500 [ 847.667697] ? up_write+0x7b/0x220 [ 847.671268] ? down_write_nested+0x130/0x130 [ 847.675675] ? down_read+0x120/0x120 [ 847.679392] ? init_wait_entry+0x1c0/0x1c0 [ 847.683673] ? prealloc_shrinker+0x172/0x340 [ 847.688105] sget_userns+0x975/0xed0 [ 847.691836] ? kill_litter_super+0x60/0x60 [ 847.696083] ? ns_test_super+0x50/0x50 [ 847.700057] ? grab_super+0x400/0x400 [ 847.703873] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 847.709411] ? apparmor_capable+0x355/0x6c0 [ 847.713739] ? apparmor_cred_transfer+0x590/0x590 [ 847.718586] ? cap_capable+0x1f9/0x260 [ 847.722489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 847.728050] ? security_capable+0x99/0xc0 [ 847.732231] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 847.737789] ? ns_capable_common+0x13f/0x170 [ 847.742209] ? kill_litter_super+0x60/0x60 [ 847.746504] sget+0x10b/0x150 [ 847.749629] ? ns_test_super+0x50/0x50 [ 847.753532] mount_bdev+0x111/0x3e0 [ 847.757183] ? xfs_test_remount_options+0x90/0x90 [ 847.762041] xfs_fs_mount+0x34/0x40 [ 847.765677] mount_fs+0xae/0x31d [ 847.769054] vfs_kern_mount.part.35+0xdc/0x4f0 [ 847.773645] ? may_umount+0xb0/0xb0 [ 847.777276] ? _raw_read_unlock+0x2c/0x50 [ 847.781652] ? __get_fs_type+0x97/0xc0 [ 847.785581] do_mount+0x581/0x31f0 [ 847.789130] ? check_preemption_disabled+0x48/0x280 [ 847.794158] ? copy_mount_string+0x40/0x40 [ 847.798412] ? copy_mount_options+0x5f/0x430 [ 847.802830] ? rcu_read_lock_sched_held+0x14f/0x180 [ 847.807870] ? kmem_cache_alloc_trace+0x353/0x750 [ 847.812740] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 847.818330] ? _copy_from_user+0xdf/0x150 [ 847.822546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 847.828118] ? copy_mount_options+0x315/0x430 [ 847.832623] ksys_mount+0x12d/0x140 [ 847.836257] __x64_sys_mount+0xbe/0x150 [ 847.840263] do_syscall_64+0x1b9/0x820 [ 847.844184] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 847.849554] ? syscall_return_slowpath+0x5e0/0x5e0 [ 847.854481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 847.859326] ? trace_hardirqs_on_caller+0x310/0x310 [ 847.864356] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 847.869372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 847.874925] ? prepare_exit_to_usermode+0x291/0x3b0 [ 847.879977] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 847.884856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.890047] RIP: 0033:0x459fda [ 847.893255] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 847.912177] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 847.919904] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 847.927176] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 847.934448] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 847.941715] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 847.948985] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:42 executing program 3 (fault-call:3 fault-nth:49): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x8000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:42 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x200000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:42 executing program 2: syz_emit_ethernet(0x5e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xd, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x20, 0x0, 0x0, 0x0, [{}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, &(0x7f0000000140)) 03:33:42 executing program 0: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_subtree(r1, &(0x7f0000000040), 0x0) [ 848.130794] FAULT_INJECTION: forcing a failure. [ 848.130794] name failslab, interval 1, probability 0, space 0, times 0 [ 848.142693] CPU: 0 PID: 24035 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 848.150065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.159437] Call Trace: [ 848.162057] dump_stack+0x244/0x39d [ 848.165737] ? dump_stack_print_info.cold.1+0x20/0x20 [ 848.171013] ? debug_smp_processor_id+0x1c/0x20 [ 848.175724] ? perf_trace_lock+0x14d/0x7a0 [ 848.179987] should_fail.cold.4+0xa/0x17 [ 848.184072] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 848.189217] ? kernel_text_address+0x79/0xf0 [ 848.193642] ? unwind_get_return_address+0x61/0xa0 [ 848.198587] ? __save_stack_trace+0x8d/0xf0 [ 848.202923] ? zap_class+0x640/0x640 [ 848.206673] ? find_held_lock+0x36/0x1c0 [ 848.210746] ? __lock_is_held+0xb5/0x140 [ 848.214862] ? perf_trace_sched_process_exec+0x860/0x860 [ 848.220338] ? check_preemption_disabled+0x48/0x280 [ 848.225403] __should_failslab+0x124/0x180 [ 848.229651] should_failslab+0x9/0x14 [ 848.233469] kmem_cache_alloc_trace+0x2d7/0x750 [ 848.238149] ? __kmalloc_node+0x3c/0x70 [ 848.242136] ? __kmalloc_node+0x3c/0x70 [ 848.246121] ? rcu_read_lock_sched_held+0x14f/0x180 [ 848.251160] __memcg_init_list_lru_node+0x185/0x2d0 [ 848.256187] ? kvfree_rcu+0x20/0x20 [ 848.259861] ? __kmalloc_node+0x50/0x70 [ 848.263847] __list_lru_init+0x4d6/0x840 [ 848.267915] ? list_lru_destroy+0x500/0x500 [ 848.272258] ? up_write+0x7b/0x220 [ 848.275798] ? down_write_nested+0x130/0x130 [ 848.280221] ? down_read+0x120/0x120 [ 848.283958] ? init_wait_entry+0x1c0/0x1c0 [ 848.288200] ? prealloc_shrinker+0x172/0x340 [ 848.292662] sget_userns+0x975/0xed0 [ 848.296382] ? kill_litter_super+0x60/0x60 [ 848.300632] ? ns_test_super+0x50/0x50 [ 848.304537] ? grab_super+0x400/0x400 [ 848.308356] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 848.313907] ? apparmor_capable+0x355/0x6c0 [ 848.318272] ? apparmor_cred_transfer+0x590/0x590 [ 848.323123] ? cap_capable+0x1f9/0x260 [ 848.327019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.332551] ? security_capable+0x99/0xc0 [ 848.336717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.342254] ? ns_capable_common+0x13f/0x170 [ 848.346697] ? kill_litter_super+0x60/0x60 [ 848.350956] sget+0x10b/0x150 [ 848.354084] ? ns_test_super+0x50/0x50 [ 848.357986] mount_bdev+0x111/0x3e0 [ 848.361631] ? xfs_test_remount_options+0x90/0x90 [ 848.366499] xfs_fs_mount+0x34/0x40 [ 848.370129] mount_fs+0xae/0x31d [ 848.373532] vfs_kern_mount.part.35+0xdc/0x4f0 [ 848.378165] ? may_umount+0xb0/0xb0 [ 848.381792] ? _raw_read_unlock+0x2c/0x50 [ 848.385975] ? __get_fs_type+0x97/0xc0 [ 848.389878] do_mount+0x581/0x31f0 [ 848.393421] ? retint_kernel+0x1b/0x2d [ 848.397319] ? trace_hardirqs_on+0x310/0x310 [ 848.401737] ? copy_mount_string+0x40/0x40 [ 848.406013] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 848.410777] ? retint_kernel+0x2d/0x2d [ 848.414731] ? copy_mount_options+0x228/0x430 [ 848.419246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 848.424790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.430346] ? copy_mount_options+0x315/0x430 [ 848.434864] ksys_mount+0x12d/0x140 [ 848.438499] __x64_sys_mount+0xbe/0x150 [ 848.442482] do_syscall_64+0x1b9/0x820 [ 848.446368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 848.451763] ? syscall_return_slowpath+0x5e0/0x5e0 [ 848.456696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 848.461579] ? trace_hardirqs_on_caller+0x310/0x310 [ 848.466622] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 848.471648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.477204] ? prepare_exit_to_usermode+0x291/0x3b0 [ 848.482258] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 848.487119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 848.492318] RIP: 0033:0x459fda [ 848.495519] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 848.514425] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 848.522146] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda 03:33:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xff00]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:42 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) pipe2(0x0, 0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz1\x00') ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:33:42 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 03:33:42 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x4000000000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 848.529423] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 848.536698] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 848.543990] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 848.551265] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:42 executing program 4: r0 = epoll_create1(0x20080004) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) epoll_wait(r1, &(0x7f0000000100)=[{}, {}, {}], 0x3, 0x400) timerfd_settime(r2, 0x4001, &(0x7f00000001c0), 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0xffffffffffffff13, 0x20000) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x5) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x107280, 0x0) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000280)) connect$unix(r4, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x27a) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f0000000300), &(0x7f0000000200)=0xffffffffffffffa1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r4, &(0x7f0000000340)={0x2000}) setsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000240)={0x5c37125d, 0xffffffffffffff68}, 0x2) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x2) 03:33:42 executing program 3 (fault-call:3 fault-nth:50): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) [ 848.677012] input: syz1 as /devices/virtual/input/input12 03:33:42 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x803e0000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:42 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 03:33:42 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xd697]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 848.757744] FAULT_INJECTION: forcing a failure. [ 848.757744] name failslab, interval 1, probability 0, space 0, times 0 [ 848.769255] CPU: 1 PID: 24055 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 848.776661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 848.786064] Call Trace: [ 848.788669] dump_stack+0x244/0x39d [ 848.788694] ? dump_stack_print_info.cold.1+0x20/0x20 [ 848.788725] ? debug_smp_processor_id+0x1c/0x20 [ 848.797524] ? perf_trace_lock+0x14d/0x7a0 [ 848.797551] should_fail.cold.4+0xa/0x17 [ 848.797574] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 848.797603] ? save_stack+0x43/0xd0 [ 848.804487] input: syz1 as /devices/virtual/input/input13 [ 848.806478] ? kasan_kmalloc+0xc7/0xe0 [ 848.806494] ? kmem_cache_alloc_trace+0x152/0x750 [ 848.806516] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 848.838709] ? __list_lru_init+0x4d6/0x840 [ 848.842989] ? zap_class+0x640/0x640 [ 848.846721] ? xfs_fs_mount+0x34/0x40 [ 848.850538] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 848.855300] ? do_mount+0x581/0x31f0 [ 848.859039] ? ksys_mount+0x12d/0x140 [ 848.862972] ? __x64_sys_mount+0xbe/0x150 [ 848.867150] ? do_syscall_64+0x1b9/0x820 [ 848.871226] ? find_held_lock+0x36/0x1c0 [ 848.875362] ? __lock_is_held+0xb5/0x140 [ 848.879451] ? map_files_get_link+0x308/0x410 [ 848.884012] ? perf_trace_sched_process_exec+0x860/0x860 [ 848.889505] __should_failslab+0x124/0x180 [ 848.893771] should_failslab+0x9/0x14 [ 848.897584] kmem_cache_alloc_trace+0x2d7/0x750 [ 848.902261] ? __kmalloc_node+0x3c/0x70 [ 848.906245] ? __kmalloc_node+0x3c/0x70 [ 848.910230] ? rcu_read_lock_sched_held+0x14f/0x180 [ 848.915264] __memcg_init_list_lru_node+0x185/0x2d0 [ 848.920300] ? kvfree_rcu+0x20/0x20 [ 848.924041] ? __kmalloc_node+0x50/0x70 [ 848.928052] __list_lru_init+0x4d6/0x840 [ 848.932173] ? list_lru_destroy+0x500/0x500 [ 848.936524] ? up_write+0x7b/0x220 [ 848.940110] ? down_write_nested+0x130/0x130 [ 848.944532] ? down_read+0x120/0x120 [ 848.948295] ? init_wait_entry+0x1c0/0x1c0 [ 848.952557] ? prealloc_shrinker+0x172/0x340 [ 848.957005] sget_userns+0x975/0xed0 [ 848.960733] ? kill_litter_super+0x60/0x60 [ 848.964990] ? ns_test_super+0x50/0x50 [ 848.968884] ? grab_super+0x400/0x400 [ 848.972698] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 848.978253] ? apparmor_capable+0x355/0x6c0 [ 848.982588] ? apparmor_cred_transfer+0x590/0x590 [ 848.987457] ? cap_capable+0x1f9/0x260 [ 848.991358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 848.996928] ? security_capable+0x99/0xc0 [ 849.001124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.006665] ? ns_capable_common+0x13f/0x170 [ 849.011125] ? kill_litter_super+0x60/0x60 [ 849.015397] sget+0x10b/0x150 [ 849.018543] ? ns_test_super+0x50/0x50 [ 849.022471] mount_bdev+0x111/0x3e0 [ 849.026125] ? xfs_test_remount_options+0x90/0x90 [ 849.030981] xfs_fs_mount+0x34/0x40 [ 849.034626] mount_fs+0xae/0x31d [ 849.038022] vfs_kern_mount.part.35+0xdc/0x4f0 [ 849.042628] ? may_umount+0xb0/0xb0 [ 849.046274] ? _raw_read_unlock+0x2c/0x50 [ 849.050447] ? __get_fs_type+0x97/0xc0 [ 849.054368] do_mount+0x581/0x31f0 [ 849.057918] ? check_preemption_disabled+0x48/0x280 [ 849.062967] ? copy_mount_string+0x40/0x40 [ 849.067226] ? copy_mount_options+0x5f/0x430 [ 849.071642] ? rcu_read_lock_sched_held+0x14f/0x180 [ 849.076666] ? kmem_cache_alloc_trace+0x353/0x750 [ 849.081542] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 849.087082] ? _copy_from_user+0xdf/0x150 [ 849.091238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.096797] ? copy_mount_options+0x315/0x430 [ 849.101320] ksys_mount+0x12d/0x140 [ 849.104998] __x64_sys_mount+0xbe/0x150 [ 849.108991] do_syscall_64+0x1b9/0x820 [ 849.112881] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 849.118250] ? syscall_return_slowpath+0x5e0/0x5e0 [ 849.123183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 849.128036] ? trace_hardirqs_on_caller+0x310/0x310 [ 849.133054] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 849.138090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.143628] ? prepare_exit_to_usermode+0x291/0x3b0 [ 849.148653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 849.153503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.158735] RIP: 0033:0x459fda [ 849.161931] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 849.180850] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 849.188573] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 849.195859] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 03:33:43 executing program 2: syz_emit_ethernet(0x62, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) [ 849.203138] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 849.210412] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 849.217687] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x3f00000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:43 executing program 3 (fault-call:3 fault-nth:51): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:43 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x1000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:43 executing program 0: socketpair$unix(0x1, 0x200000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgsnd(0x0, 0xfffffffffffffffe, 0x0, 0x0) 03:33:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'sit0\x00', @dev}) 03:33:43 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x900]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 849.417309] FAULT_INJECTION: forcing a failure. [ 849.417309] name failslab, interval 1, probability 0, space 0, times 0 [ 849.466243] CPU: 0 PID: 24080 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 849.473630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 849.482983] Call Trace: [ 849.485601] dump_stack+0x244/0x39d [ 849.489253] ? dump_stack_print_info.cold.1+0x20/0x20 [ 849.494473] ? debug_smp_processor_id+0x1c/0x20 [ 849.499149] ? perf_trace_lock+0x14d/0x7a0 [ 849.503406] should_fail.cold.4+0xa/0x17 [ 849.507515] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 849.512646] ? save_stack+0x43/0xd0 [ 849.516274] ? kasan_kmalloc+0xc7/0xe0 [ 849.520160] ? kmem_cache_alloc_trace+0x152/0x750 [ 849.525001] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 849.530202] ? __list_lru_init+0x4d6/0x840 [ 849.534440] ? zap_class+0x640/0x640 [ 849.538157] ? xfs_fs_mount+0x34/0x40 [ 849.541987] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 849.546775] ? do_mount+0x581/0x31f0 [ 849.550505] ? ksys_mount+0x12d/0x140 [ 849.554325] ? __x64_sys_mount+0xbe/0x150 [ 849.558516] ? do_syscall_64+0x1b9/0x820 [ 849.562632] ? find_held_lock+0x36/0x1c0 [ 849.566799] ? __lock_is_held+0xb5/0x140 [ 849.570872] ? ah6_output+0x298/0x1333 [ 849.570908] ? perf_trace_sched_process_exec+0x860/0x860 [ 849.570939] __should_failslab+0x124/0x180 [ 849.570971] should_failslab+0x9/0x14 [ 849.570988] kmem_cache_alloc_trace+0x2d7/0x750 [ 849.571004] ? __kmalloc_node+0x3c/0x70 [ 849.571025] ? __kmalloc_node+0x3c/0x70 [ 849.601148] ? rcu_read_lock_sched_held+0x14f/0x180 [ 849.606174] __memcg_init_list_lru_node+0x185/0x2d0 [ 849.611202] ? kvfree_rcu+0x20/0x20 [ 849.614840] ? __kmalloc_node+0x50/0x70 [ 849.618841] __list_lru_init+0x4d6/0x840 [ 849.622920] ? list_lru_destroy+0x500/0x500 [ 849.627291] ? up_write+0x7b/0x220 [ 849.630835] ? down_write_nested+0x130/0x130 [ 849.635249] ? down_read+0x120/0x120 [ 849.638978] ? init_wait_entry+0x1c0/0x1c0 [ 849.643228] ? prealloc_shrinker+0x172/0x340 [ 849.647658] sget_userns+0x975/0xed0 [ 849.651379] ? kill_litter_super+0x60/0x60 [ 849.655623] ? ns_test_super+0x50/0x50 [ 849.659516] ? grab_super+0x400/0x400 [ 849.663338] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 849.668894] ? apparmor_capable+0x355/0x6c0 [ 849.673261] ? apparmor_cred_transfer+0x590/0x590 [ 849.678124] ? cap_capable+0x1f9/0x260 [ 849.682023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.687561] ? security_capable+0x99/0xc0 [ 849.691715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.697269] ? ns_capable_common+0x13f/0x170 [ 849.701694] ? kill_litter_super+0x60/0x60 [ 849.705930] sget+0x10b/0x150 [ 849.709044] ? ns_test_super+0x50/0x50 [ 849.712936] mount_bdev+0x111/0x3e0 [ 849.716595] ? xfs_test_remount_options+0x90/0x90 [ 849.721447] xfs_fs_mount+0x34/0x40 [ 849.725115] mount_fs+0xae/0x31d [ 849.728495] vfs_kern_mount.part.35+0xdc/0x4f0 [ 849.733089] ? may_umount+0xb0/0xb0 [ 849.736718] ? _raw_read_unlock+0x2c/0x50 [ 849.740868] ? __get_fs_type+0x97/0xc0 [ 849.744763] do_mount+0x581/0x31f0 [ 849.748301] ? check_preemption_disabled+0x48/0x280 [ 849.753321] ? copy_mount_string+0x40/0x40 [ 849.757580] ? copy_mount_options+0x5f/0x430 [ 849.761988] ? rcu_read_lock_sched_held+0x14f/0x180 [ 849.767022] ? kmem_cache_alloc_trace+0x353/0x750 [ 849.771896] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 849.777431] ? _copy_from_user+0xdf/0x150 [ 849.781603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.787155] ? copy_mount_options+0x315/0x430 [ 849.791667] ksys_mount+0x12d/0x140 [ 849.795322] __x64_sys_mount+0xbe/0x150 [ 849.799296] do_syscall_64+0x1b9/0x820 [ 849.803179] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 849.808539] ? syscall_return_slowpath+0x5e0/0x5e0 [ 849.813463] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 849.818306] ? trace_hardirqs_on_caller+0x310/0x310 [ 849.823327] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 849.828364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 849.833897] ? prepare_exit_to_usermode+0x291/0x3b0 [ 849.838936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 849.843805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 849.848996] RIP: 0033:0x459fda [ 849.852221] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 849.871116] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 849.878828] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 849.886107] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 849.893371] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 849.900641] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 849.907909] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:44 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 03:33:44 executing program 2: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_setup(0x72d2, &(0x7f0000000000)) 03:33:44 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) getdents(r0, &(0x7f0000000040)=""/46, 0x2e) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000240)=@req3={0x0, 0x200, 0x20}, 0x1c) socketpair$nbd(0x2, 0x1, 0x0, 0x0) getuid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003c00)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89fc, &(0x7f0000003f00)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 03:33:44 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0x3e80}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:44 executing program 3 (fault-call:3 fault-nth:52): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0xfc00]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x9]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet_mreq(r1, 0x0, 0x24, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'sit0\x00', @dev}) 03:33:44 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xebffffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 850.177454] FAULT_INJECTION: forcing a failure. [ 850.177454] name failslab, interval 1, probability 0, space 0, times 0 [ 850.241975] CPU: 0 PID: 24112 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 850.249354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.258726] Call Trace: [ 850.261332] dump_stack+0x244/0x39d [ 850.264984] ? dump_stack_print_info.cold.1+0x20/0x20 [ 850.270213] ? debug_smp_processor_id+0x1c/0x20 [ 850.274900] ? perf_trace_lock+0x14d/0x7a0 [ 850.279185] should_fail.cold.4+0xa/0x17 [ 850.283267] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 850.288389] ? find_held_lock+0x36/0x1c0 [ 850.292475] ? zap_class+0x640/0x640 [ 850.296201] ? zap_class+0x640/0x640 [ 850.299935] ? lock_downgrade+0x900/0x900 [ 850.304163] ? find_held_lock+0x36/0x1c0 [ 850.308253] ? __lock_is_held+0xb5/0x140 [ 850.312359] ? perf_trace_sched_process_exec+0x860/0x860 [ 850.317826] ? perf_trace_sched_process_exec+0x860/0x860 [ 850.323292] ? __kmalloc_node+0x3c/0x70 [ 850.327306] __should_failslab+0x124/0x180 [ 850.331559] should_failslab+0x9/0x14 [ 850.335370] __kmalloc+0x2e0/0x760 [ 850.338954] ? __list_lru_init+0x151/0x840 [ 850.343213] __list_lru_init+0x151/0x840 [ 850.347300] ? list_lru_destroy+0x500/0x500 [ 850.351639] ? up_write+0x7b/0x220 [ 850.355190] ? down_read+0x120/0x120 [ 850.358954] ? init_wait_entry+0x1c0/0x1c0 [ 850.363204] ? prealloc_shrinker+0x172/0x340 [ 850.367644] sget_userns+0x9a5/0xed0 [ 850.367682] ? kill_litter_super+0x60/0x60 [ 850.375645] ? ns_test_super+0x50/0x50 [ 850.375663] ? grab_super+0x400/0x400 [ 850.375692] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 850.388907] ? apparmor_capable+0x355/0x6c0 [ 850.393271] ? apparmor_cred_transfer+0x590/0x590 [ 850.398132] ? cap_capable+0x1f9/0x260 [ 850.402038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 850.407583] ? security_capable+0x99/0xc0 [ 850.411741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 850.417287] ? ns_capable_common+0x13f/0x170 [ 850.421713] ? kill_litter_super+0x60/0x60 [ 850.425974] sget+0x10b/0x150 [ 850.429104] ? ns_test_super+0x50/0x50 [ 850.433012] mount_bdev+0x111/0x3e0 [ 850.436652] ? xfs_test_remount_options+0x90/0x90 03:33:44 executing program 0: socketpair$unix(0x1, 0x200000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAPBSET_READ(0x17, 0x0) [ 850.441512] xfs_fs_mount+0x34/0x40 [ 850.445162] mount_fs+0xae/0x31d [ 850.448548] vfs_kern_mount.part.35+0xdc/0x4f0 [ 850.453156] ? may_umount+0xb0/0xb0 [ 850.456787] ? _raw_read_unlock+0x2c/0x50 [ 850.460963] ? __get_fs_type+0x97/0xc0 [ 850.464862] do_mount+0x581/0x31f0 [ 850.468413] ? check_preemption_disabled+0x48/0x280 [ 850.473437] ? copy_mount_string+0x40/0x40 [ 850.477703] ? copy_mount_options+0x5f/0x430 [ 850.482120] ? rcu_read_lock_sched_held+0x14f/0x180 [ 850.487152] ? kmem_cache_alloc_trace+0x353/0x750 [ 850.492003] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 850.497632] ? _copy_from_user+0xdf/0x150 [ 850.501822] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 850.507359] ? copy_mount_options+0x315/0x430 [ 850.511909] ksys_mount+0x12d/0x140 [ 850.515559] __x64_sys_mount+0xbe/0x150 [ 850.519668] do_syscall_64+0x1b9/0x820 [ 850.523595] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 850.528991] ? syscall_return_slowpath+0x5e0/0x5e0 [ 850.533938] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 850.538815] ? trace_hardirqs_on_caller+0x310/0x310 [ 850.543840] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 850.548866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 850.554407] ? prepare_exit_to_usermode+0x291/0x3b0 [ 850.559462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 850.564321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 850.569516] RIP: 0033:0x459fda [ 850.572714] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 850.591632] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 850.599551] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda [ 850.606818] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 850.614131] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 850.621398] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 850.628665] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:44 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x200000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x8, 0x8, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080), 0x0, 0x1}, 0x20) 03:33:44 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)={0x20000000}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x155555555555561f, 0xfffffffffffffff8, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) pselect6(0x40, &(0x7f0000000000)={0x0, 0x10000, 0x4, 0x3f, 0xc5e, 0x4, 0x8001, 0x4}, &(0x7f0000000040)={0x3ff, 0x80000000, 0x80, 0x945, 0x7, 0x8000, 0x5, 0x1}, &(0x7f0000000080)={0x100000001, 0x0, 0x2, 0xfffffffeffffffff, 0x2, 0xd8, 0x71e5, 0x3}, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000180)={&(0x7f0000000140)={0x2}, 0x8}) 03:33:44 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000400)='./file0\x00') 03:33:44 executing program 2: socketpair$unix(0x1, 0x200000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000280)='.dead\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 03:33:45 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xe03f030000000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 03:33:45 executing program 3 (fault-call:3 fault-nth:53): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000003700)={[{@uqnoenforce='uqnoenforce'}, {@noattr2='noattr2'}, {@bsdgroups='bsdgroups'}, {@logbsize={'logbsize', 0x3d, [0x6d, 0x77, 0x70, 0x78, 0x30, 0x77, 0x33, 0x3f, 0x78, 0x7f]}}, {@nolargeio='nolargeio'}, {@uquota='uquota'}, {@bsdgroups='bsdgroups'}, {@dax='dax'}, {@pqnoenforce='pqnoenforce'}], [{@euid_lt={'euid<'}}, {@obj_role={'obj_role', 0x3d, 'eth0mime_typecpuset]self!'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@obj_type={'obj_type'}}, {@euid_gt={'euid>'}}, {@smackfsdef={'smackfsdef', 0x3d, "65746831ec73797374656d40776c616e31656d3126657468312d2d7573657270726f6376626f786e65743073656c696e7578766d6e657430406d643573756d766d6e657431"}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 03:33:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x700000000000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) [ 850.873755] FAULT_INJECTION: forcing a failure. [ 850.873755] name failslab, interval 1, probability 0, space 0, times 0 [ 850.904447] CPU: 1 PID: 24157 Comm: syz-executor3 Not tainted 4.20.0-rc4+ #351 [ 850.911838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 850.921197] Call Trace: [ 850.923831] dump_stack+0x244/0x39d [ 850.927472] ? dump_stack_print_info.cold.1+0x20/0x20 [ 850.932693] ? debug_smp_processor_id+0x1c/0x20 [ 850.937411] ? perf_trace_lock+0x14d/0x7a0 [ 850.941680] should_fail.cold.4+0xa/0x17 [ 850.945755] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 850.950873] ? save_stack+0x43/0xd0 [ 850.954506] ? kasan_kmalloc+0xc7/0xe0 [ 850.958397] ? kmem_cache_alloc_trace+0x152/0x750 [ 850.963274] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 850.968463] ? __list_lru_init+0x4d6/0x840 [ 850.972712] ? zap_class+0x640/0x640 [ 850.976445] ? xfs_fs_mount+0x34/0x40 [ 850.980249] ? vfs_kern_mount.part.35+0xdc/0x4f0 [ 850.985006] ? do_mount+0x581/0x31f0 [ 850.988734] ? ksys_mount+0x12d/0x140 [ 850.992545] ? __x64_sys_mount+0xbe/0x150 [ 850.996701] ? do_syscall_64+0x1b9/0x820 [ 851.000820] ? find_held_lock+0x36/0x1c0 [ 851.004913] ? __lock_is_held+0xb5/0x140 [ 851.008979] ? clk_register+0x368/0x2210 [ 851.013055] ? perf_trace_sched_process_exec+0x860/0x860 [ 851.018531] __should_failslab+0x124/0x180 [ 851.022832] should_failslab+0x9/0x14 [ 851.026644] kmem_cache_alloc_trace+0x2d7/0x750 [ 851.031314] ? __kmalloc_node+0x3c/0x70 [ 851.035287] ? __kmalloc_node+0x3c/0x70 [ 851.039264] ? rcu_read_lock_sched_held+0x14f/0x180 [ 851.044288] __memcg_init_list_lru_node+0x185/0x2d0 [ 851.049307] ? kvfree_rcu+0x20/0x20 [ 851.052932] ? __kmalloc_node+0x50/0x70 [ 851.056956] __list_lru_init+0x4d6/0x840 [ 851.061059] ? list_lru_destroy+0x500/0x500 [ 851.065388] ? up_write+0x7b/0x220 [ 851.068967] ? down_write_nested+0x130/0x130 [ 851.073382] ? down_read+0x120/0x120 [ 851.077099] ? init_wait_entry+0x1c0/0x1c0 [ 851.081345] ? prealloc_shrinker+0x172/0x340 [ 851.085794] sget_userns+0x975/0xed0 [ 851.089505] ? kill_litter_super+0x60/0x60 [ 851.093780] ? ns_test_super+0x50/0x50 [ 851.097701] ? grab_super+0x400/0x400 [ 851.101560] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 851.107095] ? apparmor_capable+0x355/0x6c0 [ 851.111462] ? apparmor_cred_transfer+0x590/0x590 [ 851.116323] ? cap_capable+0x1f9/0x260 [ 851.120216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.125751] ? security_capable+0x99/0xc0 [ 851.129899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.135478] ? ns_capable_common+0x13f/0x170 [ 851.139891] ? kill_litter_super+0x60/0x60 [ 851.144126] sget+0x10b/0x150 [ 851.147230] ? ns_test_super+0x50/0x50 [ 851.151123] mount_bdev+0x111/0x3e0 [ 851.154796] ? xfs_test_remount_options+0x90/0x90 [ 851.159649] xfs_fs_mount+0x34/0x40 [ 851.163277] mount_fs+0xae/0x31d [ 851.166646] vfs_kern_mount.part.35+0xdc/0x4f0 [ 851.171229] ? may_umount+0xb0/0xb0 [ 851.174851] ? _raw_read_unlock+0x2c/0x50 [ 851.179007] ? __get_fs_type+0x97/0xc0 [ 851.182896] do_mount+0x581/0x31f0 [ 851.186463] ? check_preemption_disabled+0x48/0x280 [ 851.191506] ? copy_mount_string+0x40/0x40 [ 851.195754] ? copy_mount_options+0x5f/0x430 [ 851.200161] ? rcu_read_lock_sched_held+0x14f/0x180 [ 851.205187] ? kmem_cache_alloc_trace+0x353/0x750 [ 851.210057] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 851.215602] ? _copy_from_user+0xdf/0x150 [ 851.219767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.225317] ? copy_mount_options+0x315/0x430 [ 851.229812] ksys_mount+0x12d/0x140 [ 851.233472] __x64_sys_mount+0xbe/0x150 [ 851.237483] do_syscall_64+0x1b9/0x820 [ 851.241377] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 851.246757] ? syscall_return_slowpath+0x5e0/0x5e0 [ 851.251679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 851.256524] ? trace_hardirqs_on_caller+0x310/0x310 [ 851.261601] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 851.266631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 851.272218] ? prepare_exit_to_usermode+0x291/0x3b0 [ 851.277249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 851.282109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 851.287329] RIP: 0033:0x459fda [ 851.290527] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 851.309433] RSP: 002b:00007eff919e7a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 851.317145] RAX: ffffffffffffffda RBX: 00007eff919e7b30 RCX: 0000000000459fda 03:33:45 executing program 2: socketpair$unix(0x1, 0x200000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) signalfd(0xffffffffffffffff, 0x0, 0x0) 03:33:45 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x8) ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000100)) 03:33:45 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xf6ffffff00000000}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 851.324417] RDX: 00007eff919e7ad0 RSI: 0000000020000040 RDI: 00007eff919e7af0 [ 851.331696] RBP: 0000000020000040 R08: 00007eff919e7b30 R09: 00007eff919e7ad0 [ 851.338975] R10: 0000000000800000 R11: 0000000000000206 R12: 0000000000000007 [ 851.346268] R13: 0000000000800000 R14: 00000000004d90b8 R15: 0000000000000006 03:33:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000f6f000), 0x0, 0x20000004, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:33:45 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty={[0x3000000]}}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x398) 03:33:45 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x430000) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x8000, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000080)={0x27c, 0x8001, 0x6, 0xc875, 0x4, 0xffffffffffff0001, 0x10000, 0x8916, 0x7, 0x10000, 0x3, 0x10001}) 03:33:45 executing program 1: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}, 0xc00}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 1008.020268] INFO: task syz-executor0:24195 blocked for more than 140 seconds. [ 1008.027613] Not tainted 4.20.0-rc4+ #351 [ 1008.049614] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1008.057591] syz-executor0 D24800 24195 6045 0x00000004 [ 1008.079617] Call Trace: [ 1008.082232] __schedule+0x8cf/0x21d0 [ 1008.085996] ? __sched_text_start+0x8/0x8 [ 1008.099646] ? zap_class+0x640/0x640 [ 1008.103380] ? find_held_lock+0x36/0x1c0 [ 1008.107467] ? mark_held_locks+0xc7/0x130 [ 1008.129661] schedule+0xfe/0x460 [ 1008.133065] ? lock_downgrade+0x900/0x900 [ 1008.137240] ? __schedule+0x21d0/0x21d0 [ 1008.149655] ? kasan_check_read+0x11/0x20 [ 1008.153826] ? do_raw_spin_unlock+0xa7/0x330 [ 1008.158260] ? do_raw_spin_trylock+0x270/0x270 [ 1008.179640] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 1008.184956] d_alloc_parallel+0x1478/0x1f40 [ 1008.189306] ? __d_lookup_rcu+0xaa0/0xaa0 [ 1008.209690] ? __d_lookup+0x5b8/0x9e0 [ 1008.213572] ? wake_up_q+0x100/0x100 [ 1008.217302] ? d_alloc_parallel+0x1f40/0x1f40 [ 1008.229673] ? d_lookup+0x255/0x300 [ 1008.233324] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1008.237927] ? lookup_open+0x302/0x1b90 [ 1008.249679] ? trace_hardirqs_off_caller+0x310/0x310 [ 1008.254819] ? __lockdep_init_map+0x105/0x590 [ 1008.259349] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1008.279630] ? d_lookup+0x20d/0x300 [ 1008.283296] ? __d_lookup+0x9e0/0x9e0 [ 1008.287118] lookup_open+0x560/0x1b90 [ 1008.309691] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 1008.315633] path_openat+0x2464/0x5150 [ 1008.319545] ? lock_is_held_type+0x210/0x210 [ 1008.339698] ? unwind_dump+0x190/0x190 [ 1008.343627] ? path_lookupat.isra.43+0xc00/0xc00 [ 1008.348419] ? unwind_get_return_address+0x61/0xa0 [ 1008.359625] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1008.364651] ? expand_files.part.8+0x571/0x9a0 [ 1008.369240] ? find_held_lock+0x36/0x1c0 [ 1008.373409] ? __alloc_fd+0x347/0x6e0 [ 1008.377219] ? lock_downgrade+0x900/0x900 [ 1008.381461] ? getname+0x19/0x20 [ 1008.384845] ? kasan_check_read+0x11/0x20 [ 1008.389026] ? do_raw_spin_unlock+0xa7/0x330 [ 1008.393569] ? do_raw_spin_trylock+0x270/0x270 [ 1008.398180] ? __lock_is_held+0xb5/0x140 [ 1008.409697] ? __check_object_size+0xb1/0x782 [ 1008.414231] ? _raw_spin_unlock+0x2c/0x50 [ 1008.418393] ? __alloc_fd+0x347/0x6e0 [ 1008.439667] do_filp_open+0x255/0x380 [ 1008.443550] ? may_open_dev+0x100/0x100 [ 1008.447542] ? strncpy_from_user+0x411/0x5a0 [ 1008.469666] ? digsig_verify+0x1530/0x1530 [ 1008.473952] ? get_unused_fd_flags+0x122/0x1a0 [ 1008.478605] ? getname_flags+0x26e/0x590 [ 1008.489639] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1008.495214] do_sys_open+0x568/0x700 [ 1008.498947] ? filp_open+0x80/0x80 [ 1008.519656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1008.525246] ? trace_hardirqs_off_caller+0x310/0x310 [ 1008.539645] __x64_sys_openat+0x9d/0x100 [ 1008.543736] do_syscall_64+0x1b9/0x820 [ 1008.547629] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1008.569625] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1008.574604] ? trace_hardirqs_on_caller+0x310/0x310 [ 1008.589669] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1008.594706] ? post_copy_siginfo_from_user.isra.25.part.26+0x250/0x250 [ 1008.609654] ? __switch_to_asm+0x40/0x70 [ 1008.613725] ? __switch_to_asm+0x34/0x70 [ 1008.617797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1008.623079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1008.628325] RIP: 0033:0x457569 [ 1008.639631] Code: Bad RIP value. [ 1008.643007] RSP: 002b:00007f6baff9ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1008.659656] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457569 [ 1008.666936] RDX: 0000000000000002 RSI: 0000000020000200 RDI: 0000000000000004 [ 1008.689703] RBP: 000000000072c040 R08: 0000000000000000 R09: 0000000000000000 [ 1008.697011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6baff9f6d4 [ 1008.719646] R13: 00000000004c2e2f R14: 00000000004d4d98 R15: 00000000ffffffff [ 1008.726966] [ 1008.726966] Showing all locks held in the system: [ 1008.749682] 1 lock held by khungtaskd/1020: [ 1008.754023] #0: 0000000001571a5d (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 1008.769702] 1 lock held by rsyslogd/5915: [ 1008.773867] #0: 00000000480251dc (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 1008.799614] 2 locks held by getty/6005: [ 1008.803591] #0: 000000003681f27e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1008.829619] #1: 0000000064b5f113 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1008.838499] 2 locks held by getty/6006: [ 1008.849642] #0: 00000000cc777edb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1008.857894] #1: 00000000ed08ef34 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1008.889645] 2 locks held by getty/6007: [ 1008.893638] #0: 0000000064a5a3bc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1008.919609] #1: 00000000133762dc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1008.928488] 2 locks held by getty/6008: [ 1008.939610] #0: 000000008dbc47bc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1008.947926] #1: 0000000061f43b82 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1008.979642] 2 locks held by getty/6009: [ 1008.983624] #0: 00000000ffe2b59e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1008.999631] #1: 0000000029194069 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1009.008519] 2 locks held by getty/6010: [ 1009.029647] #0: 0000000024096952 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1009.037937] #1: 00000000c5490d89 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1009.059619] 2 locks held by getty/6011: [ 1009.063607] #0: 000000008a1359c1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 1009.089629] #1: 00000000a7a55aae (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 1009.098649] 4 locks held by syz-executor0/24155: [ 1009.119634] 2 locks held by syz-executor0/24195: [ 1009.124433] #0: 000000008a424498 (sb_writers#14){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 1009.139629] #1: 0000000090e76042 (&sb->s_type->i_mutex_key#23){++++}, at: path_openat+0x2444/0x5150 [ 1009.148953] [ 1009.159615] ============================================= [ 1009.159615] [ 1009.166655] NMI backtrace for cpu 0 [ 1009.170391] CPU: 0 PID: 1020 Comm: khungtaskd Not tainted 4.20.0-rc4+ #351 [ 1009.177412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.186777] Call Trace: [ 1009.189375] dump_stack+0x244/0x39d [ 1009.193022] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1009.198244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1009.203807] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 1009.208490] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 1009.213686] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 1009.218973] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1009.224189] watchdog+0xb51/0x1060 [ 1009.227755] ? hungtask_pm_notify+0xb0/0xb0 [ 1009.232089] ? __kthread_parkme+0xce/0x1a0 [ 1009.236333] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1009.241446] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1009.246588] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1009.251199] ? trace_hardirqs_on+0xbd/0x310 [ 1009.255530] ? kasan_check_read+0x11/0x20 [ 1009.259694] ? __kthread_parkme+0xce/0x1a0 [ 1009.263962] ? trace_hardirqs_off_caller+0x310/0x310 [ 1009.269070] ? trace_hardirqs_off_caller+0x310/0x310 [ 1009.274196] ? lockdep_init_map+0x9/0x10 [ 1009.278272] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1009.283382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1009.288930] ? __kthread_parkme+0xfb/0x1a0 [ 1009.293182] ? hungtask_pm_notify+0xb0/0xb0 [ 1009.297516] kthread+0x35a/0x440 [ 1009.300896] ? kthread_stop+0x900/0x900 [ 1009.304878] ret_from_fork+0x3a/0x50 [ 1009.308698] Sending NMI from CPU 0 to CPUs 1: [ 1009.313547] NMI backtrace for cpu 1 [ 1009.313554] CPU: 1 PID: 3715 Comm: udevd Not tainted 4.20.0-rc4+ #351 [ 1009.313561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.313566] RIP: 0010:__x86_indirect_thunk_rax+0x0/0x20 [ 1009.313578] Code: 0c c8 e9 ee 01 d9 ff 41 bf f2 ff ff ff 45 30 ed e9 92 06 d9 ff 41 bf f2 ff ff ff e9 a5 06 d9 ff 90 90 90 90 90 90 90 90 90 90 07 00 00 00 f3 90 0f ae e8 eb f9 48 89 04 24 c3 0f 1f 44 00 00 [ 1009.313583] RSP: 0018:ffff8881c2ebfe28 EFLAGS: 00000246 [ 1009.313592] RAX: ffffffff81e63640 RBX: 00000000000000e8 RCX: ffffffff8100c3eb [ 1009.313598] RDX: 1ffffffff104099c RSI: ffffffff8100c3f9 RDI: ffff8881c2ebff58 [ 1009.313604] RBP: ffff8881c2ebff48 R08: ffff8881c2eb2100 R09: 0000000000000000 [ 1009.313609] R10: 0000000000000000 R11: 0000000000000000 R12: 1ffff110385d7fc8 [ 1009.313615] R13: ffff8881c2ebff20 R14: ffff8881c2ebff58 R15: dffffc0000000000 [ 1009.313621] FS: 00007f3d94df97a0(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000 [ 1009.313626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1009.313632] CR2: ffffffffff600400 CR3: 00000001c2d60000 CR4: 00000000001406e0 [ 1009.313638] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1009.313644] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1009.313647] Call Trace: [ 1009.313651] ? do_syscall_64+0x1b9/0x820 [ 1009.313656] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1009.313660] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1009.313665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1009.313669] ? trace_hardirqs_on_caller+0x310/0x310 [ 1009.313674] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1009.313679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1009.313683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.313687] RIP: 0033:0x7f3d9450d943 [ 1009.313699] Code: 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 83 3d b5 dc 2a 00 00 75 13 49 89 ca b8 e8 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 3b c4 00 00 48 89 04 24 [ 1009.313703] RSP: 002b:00007ffcc6fa6208 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 [ 1009.313713] RAX: ffffffffffffffda RBX: 0000000000000bb8 RCX: 00007f3d9450d943 [ 1009.313719] RDX: 0000000000000008 RSI: 00007ffcc6fa6300 RDI: 000000000000000a [ 1009.313725] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 1009.313730] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 1009.313736] R13: 0000000000000000 R14: 0000000002019a90 R15: 0000000002018250 [ 1009.318056] Kernel panic - not syncing: hung_task: blocked tasks [ 1009.549713] CPU: 0 PID: 1020 Comm: khungtaskd Not tainted 4.20.0-rc4+ #351 [ 1009.556738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.566083] Call Trace: [ 1009.568680] dump_stack+0x244/0x39d [ 1009.572314] ? dump_stack_print_info.cold.1+0x20/0x20 [ 1009.577506] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1009.582549] panic+0x2ad/0x55c [ 1009.585768] ? add_taint.cold.5+0x16/0x16 [ 1009.589941] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 1009.595398] ? nmi_trigger_cpumask_backtrace+0x1f9/0x22a [ 1009.600854] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 1009.606335] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 1009.611806] watchdog+0xb62/0x1060 [ 1009.615372] ? hungtask_pm_notify+0xb0/0xb0 [ 1009.619754] ? __kthread_parkme+0xce/0x1a0 [ 1009.623992] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1009.629126] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1009.634249] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 1009.638835] ? trace_hardirqs_on+0xbd/0x310 [ 1009.643192] ? kasan_check_read+0x11/0x20 [ 1009.647344] ? __kthread_parkme+0xce/0x1a0 [ 1009.651583] ? trace_hardirqs_off_caller+0x310/0x310 [ 1009.656698] ? trace_hardirqs_off_caller+0x310/0x310 [ 1009.661827] ? lockdep_init_map+0x9/0x10 [ 1009.665906] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1009.671014] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1009.676570] ? __kthread_parkme+0xfb/0x1a0 [ 1009.680812] ? hungtask_pm_notify+0xb0/0xb0 [ 1009.685149] kthread+0x35a/0x440 [ 1009.688524] ? kthread_stop+0x900/0x900 [ 1009.692506] ret_from_fork+0x3a/0x50 [ 1009.697830] Kernel Offset: disabled [ 1009.701466] Rebooting in 86400 seconds..