x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:02 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8008]}}, 0x20) 05:22:02 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) epoll_create(0x800) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x280, 0x0) bind$unix(r1, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 05:22:02 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:02 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, r3, r4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:03 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:03 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x20}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={r2, 0x0, 0x1, [0x1ff]}, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) r3 = msgget(0x1, 0x25) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000200)=""/113) 05:22:03 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:03 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) epoll_create(0x800) open(&(0x7f00000001c0)='./file0\x00', 0x280, 0x0) 05:22:03 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:03 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:03 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:03 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000300)=@sha1={0x1, "7ec13a26f774be82a51b233c0c7fa1719fd68319"}, 0x15, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:03 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x4002) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffec6, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) getsockopt$inet6_dccp_int(r0, 0x21, 0xf, &(0x7f0000000000), &(0x7f0000000240)=0x4) 05:22:03 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xb000000]}}, 0x20) 05:22:03 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:03 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) epoll_create(0x800) 05:22:03 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:03 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:04 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000003c0)=0x87) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000000300)=[0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) getgroups(0x3, &(0x7f0000000340)=[r2, r3, r4]) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000080)={0x2, r0}) 05:22:04 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000300)=@sha1={0x1, "7ec13a26f774be82a51b233c0c7fa1719fd68319"}, 0x15, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:04 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000]}}, 0x20) 05:22:04 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:04 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:04 executing program 3: r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$autofs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/autofs\x00', 0x80000, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) ptrace$getregset(0x4204, r2, 0x203, &(0x7f0000000240)={&(0x7f0000000200)=""/23, 0x17}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000280)={0x0, @broadcast, @remote}, &(0x7f00000002c0)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x597fe71b6c35a440, &(0x7f0000000300)={@broadcast, @broadcast, r3}, 0xc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:04 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000300)=@sha1={0x1, "7ec13a26f774be82a51b233c0c7fa1719fd68319"}, 0x15, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:04 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:04 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000]}}, 0x20) 05:22:04 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:05 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:05 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:05 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$sock_ifreq(r1, 0x891c, &(0x7f0000000080)={'ip_vti0\x00', @ifru_addrs=@sco={0x1f, {0x7581ac26, 0x9, 0x7ff, 0x47ed, 0x9, 0x100000000}}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000200)={0x10001}, 0x4) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:05 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000300)=@sha1={0x1, "7ec13a26f774be82a51b233c0c7fa1719fd68319"}, 0x15, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:05 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x804]}}, 0x20) 05:22:05 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$alg(0x26, 0x5, 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:05 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:05 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:05 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:05 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x4b9e, 0x100, 0x7, 0x2, 0x1, [{0x8, 0x1ff, 0x10000, 0x0, 0x0, 0x8}]}) 05:22:05 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:05 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x20) 05:22:06 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:06 executing program 0: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(0xffffffffffffffff, &(0x7f0000000280)='\'\x00', 0x86) 05:22:06 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4002fc) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:06 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300000000000000]}}, 0x20) 05:22:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:06 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:07 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:07 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = fcntl$getown(r0, 0x9) capget(&(0x7f0000000080)={0x0, r1}, &(0x7f0000000200)={0x4, 0x7, 0x1000, 0x9, 0x5, 0x4}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e22, 0x7, @remote, 0xaf1c}}}, 0x90) ioctl$sock_netdev_private(r0, 0x89f8, &(0x7f00000003c0)="2ee20b6e11e1b49d89ce1803cadc1b0cabd3e6f7cdfe5f518cc632704120ba36d99f6e37a013158254b82105fbd0fc9d68aad6805fd49e2385bfeb7347dcbe19999a5dbe671615b32176d89710caa120beab46df58c6ae5afa3400533547a068d6fee4ca1ba79a331147790bd193b21f6318b0d31973de1faebb7c316bc522bbc747d2ddca560602c3ce3732c672509e17e806275e778b6f40292534a73b8cf5ea8cd4c262bbb9a472a2c2dca2bb38a4b04f88cc28a365bf91c0e130ccd5acbfec680121f9aaa06f37004b04c3") ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000300)={0xb1, &(0x7f0000000240)=""/177}) 05:22:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:07 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:07 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, 0x20) 05:22:07 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:07 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:07 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:07 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) pipe2(&(0x7f0000000080), 0x80800) r2 = request_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='md5sumnodev,)GPLwlan0}^.user./\x00', 0xfffffffffffffffc) r3 = shmget(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r3, 0xc) r4 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate(0xc, r2, 0x0, 0x0, r4) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000200)) 05:22:07 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10000000000000]}}, 0x20) 05:22:07 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:08 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:08 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:08 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:08 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8000a0]}}, 0x20) 05:22:08 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x28a, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xfffffffffffffe8a) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) r3 = geteuid() getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x1}}, 0x0, 0x400, 0x2, 0x2, 0x5}, &(0x7f00000003c0)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000400)={r4, 0x1d1}, &(0x7f0000000440)=0x8) write$P9_RSTATFS(r0, &(0x7f0000000240)={0x43, 0x9, 0x2, {0x20, 0x8, 0xa936, 0x2, 0xe6, 0x9, 0x1, 0x7ff, 0xe13a}}, 0x43) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x101, 0x4000000000}, {0xc1, 0x7fffffff}], r3}, 0x18, 0x3) 05:22:08 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:08 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:08 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:08 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:08 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x3, 0x0, [0x0, 0x0, 0x0]}) 05:22:08 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfffffffe]}}, 0x20) 05:22:08 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:09 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:09 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:09 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:09 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x144, 0xfa00, {0x0, &(0x7f0000000240)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:09 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0xa8) write$smack_current(0xffffffffffffffff, &(0x7f0000000280)='\'\x00', 0x86) 05:22:09 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x20) 05:22:09 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:09 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000003c0)={0x1, 0x80, 0x0, 0x2, 0x2}) fstat(0xffffffffffffff9c, &(0x7f0000000780)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000a00)="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", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)=',', 0x1}], 0x1, 0x4081806) sendfile(r1, r2, &(0x7f0000000000), 0x0) sendfile(r1, r3, &(0x7f00000000c0), 0x20020102000007) ftruncate(r3, 0x0) 05:22:09 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xf4ffffff]}}, 0x20) 05:22:09 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) bind$xdp(r0, &(0x7f0000000b00)={0x2c, 0x3, r2, 0x2e, r0}, 0x10) 05:22:09 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:09 executing program 3: r0 = creat(&(0x7f0000000200)='./file0\x00', 0xa1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x0, 0x2, 0x4, 0x6, 0x1, 0x1ff, 0x1f}, {0x6, 0x7, 0x5, 0x3, 0x6, 0x7fffffff, 0x1ff}, {0x40000004, 0xfe1, 0x2, 0x5, 0x6, 0x5, 0x400}, {0xc0000001, 0xda2, 0x0, 0x4, 0x7, 0x3f, 0x8}, {0x7, 0x6, 0x3, 0x0, 0x1, 0x80000001, 0x9}, {0x0, 0xfffffffffffffff7, 0x7, 0xfffffffffffffffe, 0x80000000, 0x4, 0x1}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0x7, 0x4, 0x0, 0x2, 0x3}) 05:22:10 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:10 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:10 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:10 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe0]}}, 0x20) 05:22:10 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000003c0)={0x1, 0x80, 0x0, 0x2, 0x2}) fstat(0xffffffffffffff9c, &(0x7f0000000780)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000a00)="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", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)=',', 0x1}], 0x1, 0x4081806) sendfile(r1, r2, &(0x7f0000000000), 0x0) sendfile(r1, r3, &(0x7f00000000c0), 0x20020102000007) ftruncate(r3, 0x0) 05:22:10 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:10 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:10 executing program 3: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000080)={0x5, 0x1, 0x3ff, 0xc24, 0x20}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0xfffffffffffffffd, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:10 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x13f}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:10 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x20) 05:22:10 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:10 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3f) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0x21) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$KIOCSOUND(r0, 0x4b2f, 0x6) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) setsockopt$inet_buf(r0, 0x0, 0x35, &(0x7f00000003c0)="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", 0x1000) 05:22:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:11 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:11 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000]}}, 0x20) 05:22:11 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:11 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000200)={0xe5, 0x5, 0x8001, 'queue1\x00', 0x1f}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, &(0x7f0000000580)=ANY=[]) r2 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980)={0x8, "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", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300), 0x13f, 0xd}}, 0x20) sendfile(r3, r3, &(0x7f0000000180)=0x28, 0x8080fffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:11 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000003c0)={0x1, 0x80, 0x0, 0x2, 0x2}) fstat(0xffffffffffffff9c, &(0x7f0000000780)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000a00)="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", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)=',', 0x1}], 0x1, 0x4081806) sendfile(r1, r2, &(0x7f0000000000), 0x0) sendfile(r1, r3, &(0x7f00000000c0), 0x20020102000007) ftruncate(r3, 0x0) 05:22:11 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:11 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:11 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x408]}}, 0x20) [ 678.122274] audit: type=1804 audit(1538889731.435:795): pid=14112 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir494717782/syzkaller.CbpiTx/2514/file0" dev="sda1" ino=16562 res=1 05:22:11 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000003c0)={0x1, 0x80, 0x0, 0x2, 0x2}) fstat(0xffffffffffffff9c, &(0x7f0000000780)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = memfd_create(&(0x7f0000000a00)="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", 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)=',', 0x1}], 0x1, 0x4081806) sendfile(r1, r2, &(0x7f0000000000), 0x0) sendfile(r1, r3, &(0x7f00000000c0), 0x20020102000007) ftruncate(r3, 0x0) 05:22:11 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) [ 678.265204] audit: type=1804 audit(1538889731.435:796): pid=14112 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir494717782/syzkaller.CbpiTx/2514/file0" dev="sda1" ino=16562 res=1 05:22:11 executing program 0: 05:22:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:11 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:11 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:11 executing program 0: [ 678.848419] audit: type=1804 audit(1538889732.165:797): pid=14112 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir494717782/syzkaller.CbpiTx/2514/file0" dev="sda1" ino=16562 res=1 [ 678.896962] audit: type=1804 audit(1538889732.165:798): pid=14113 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir494717782/syzkaller.CbpiTx/2514/file0" dev="sda1" ino=16562 res=1 [ 678.926581] audit: type=1804 audit(1538889732.165:799): pid=14113 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir494717782/syzkaller.CbpiTx/2514/file0" dev="sda1" ino=16562 res=1 05:22:12 executing program 0: 05:22:12 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, 0x20) 05:22:12 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:12 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:12 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_int(r0, 0x29, 0xd9, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000240)='+@proc.}\x00') 05:22:12 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2100000000000002, 0x0) r2 = socket(0xa, 0x1, 0xa000000000000000) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000580)=[{0x6, 0x3a}, {0xa, 0x7}], 0x2000000000000004) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000440)={'team_slave_1\x00', 0x80000002}) connect$inet6(r0, &(0x7f0000000640)={0xa, 0x4e21, 0x0, @remote, 0x401}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=ANY=[@ANYRES16], 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {0xd28d, 0x0, 0x1, 0x0, 0x0, 0x4}, {0xfffffffffffffffe}}, {{@in6=@mcast2, 0x4}, 0x0, @in6=@loopback}}, 0xe8) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x4000, &(0x7f0000000840)={0xa, 0x4e20, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x4}, 0x1c) r4 = socket$inet(0x2, 0x4000000000000001, 0x6) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000400)=@assoc_value={0x0, 0x1}, &(0x7f0000000000)=0x100000196) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000680)={r5, 0xbb80}, &(0x7f0000000800)=0x8) socket(0x0, 0x4, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@loopback, @in=@local}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xfffffffd) syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000880)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)=ANY=[]}}, 0x4085) connect$packet(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffdb6) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000740)={{0x0, @broadcast, 0x0, 0x0, 'none\x00'}, {@remote, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff0001}}, 0x44) sendto$inet(r4, &(0x7f0000a88f88), 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000a80)=ANY=[], &(0x7f0000000480)) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001340), &(0x7f00000004c0)=0x90) recvmsg(r4, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) unshare(0x0) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 05:22:12 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:12 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:12 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:12 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:12 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f000000]}}, 0x20) 05:22:12 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:12 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) r2 = getpid() ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f00000018c0)={0x8, &(0x7f0000000100)=""/183, &(0x7f0000001800)=[{0x3, 0x25, 0x8, &(0x7f0000000340)=""/37}, {0x5, 0xca, 0x2, &(0x7f00000003c0)=""/202}, {0x1ff, 0x6c, 0x100000001, &(0x7f00000004c0)=""/108}, {0x7f, 0xe8, 0x4, &(0x7f0000000540)=""/232}, {0x10000, 0x1000, 0x4, &(0x7f0000000640)=""/4096}, {0x1ff, 0xc2, 0x2f, &(0x7f0000001640)=""/194}, {0x7f, 0x5d, 0x4, &(0x7f0000001740)=""/93}, {0x8, 0xc, 0x4, &(0x7f00000017c0)=""/12}]}) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0xfff, 0x61, 0x6, 0x0, 0x0, 0xd82, 0x40, 0x8, 0x40, 0x9, 0x1c, 0xff, 0x4, 0xffff, 0x0, 0x9, 0x88, 0x9, 0x5, 0x9, 0x2, 0x3, 0x7, 0x40, 0x3679, 0xffffffffffff548f, 0x94cf, 0x2, 0xffff, 0x7, 0x7, 0x0, 0x69, 0x100000000, 0x81, 0x2, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000080), 0x3}, 0x400, 0x0, 0x0, 0x0, 0x5, 0x8a, 0x81}, r2, 0x10, r0, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000280)={0x14, 0x88, 0xfa00, {r3, 0x0, 0x0, @in6={0xa, 0x4e20, 0x10000, @mcast2, 0xfff}}}, 0x90) 05:22:12 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:12 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:12 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xb00]}}, 0x20) 05:22:12 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="f3440f2db04444b43fc421fde66cc066b933080000b8e98b0000ba000000000f300f01cf0f3266ba610066b8002066ef66baf80cb8ec7a3a8aef66bafc0c66b8b9fd66ef660f3808507865670f5e3746d9ee", 0x52}], 0x1, 0x0, &(0x7f0000000080), 0x100002e3) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_RUN(r4, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r6, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, &(0x7f0000000040), 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000003d00)=@assoc_value, 0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x0, 0x100000000}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r3, 0x8}, &(0x7f0000000380)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000240)={{0x0, 0x0, 0x1000, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000040)}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x7}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x160}, 0x8) 05:22:13 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:13 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:13 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:13 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3]}}, 0x20) 05:22:13 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x80400200) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x81e5, [0x93]}, &(0x7f0000000280)=0xffffffffffffff1c) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x3302, &(0x7f0000000000)) r3 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x8, 0x3, 0x7d, 0x3, 0x0, 0x1, 0x14000, 0x8, 0x31c, 0x0, 0x5, 0x94, 0x1, 0x1, 0x5b6, 0x6, 0x0, 0x4, 0x9, 0x28, 0x1, 0x3, 0x8, 0x70cc, 0x5, 0x9, 0x7168844, 0x6, 0x4, 0x3ff, 0x1000, 0x800, 0x9, 0x54, 0x8, 0x5, 0x0, 0x27349ca9, 0x4, @perf_config_ext={0x0, 0x2}, 0x20000, 0x3, 0x3ff, 0x7, 0x5, 0x1, 0x5}, r3, 0x5, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:13 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) getsockopt$llc_int(r0, 0x10c, 0x3, &(0x7f0000000080), &(0x7f0000000200)=0x4) 05:22:13 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:13 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x4000) 05:22:13 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 05:22:13 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000000000000]}}, 0x20) 05:22:13 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) [ 680.378694] sctp: [Deprecated]: syz-executor0 (pid 14225) Use of struct sctp_assoc_value in delayed_ack socket option. [ 680.378694] Use struct sctp_sack_info instead 05:22:13 executing program 0: [ 680.574070] sctp: [Deprecated]: syz-executor0 (pid 14207) Use of struct sctp_assoc_value in delayed_ack socket option. [ 680.574070] Use struct sctp_sack_info instead 05:22:14 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f"], 0x1) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000000140)=""/129, 0x81}], 0x1, &(0x7f0000000340)=""/148, 0x94}, 0x0) 05:22:14 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) eventfd2(0x1, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$UHID_CREATE2(r0, &(0x7f0000000200)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x50, 0x7, 0x96, 0x8, 0x0, 0x1, "74b74b84647b49f227235a5e9b70c54df9cd872ab82590a3643e00078379c8edf8002bb75092d0786e09d9c3a780f2e7e51c558e3c963e652059f894fa3fe08e1cc09c084ca794639a1557080a939e79"}, 0x168) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000003c0)='reiserfs\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffffffff001, 0x1, &(0x7f0000001440)=[{&(0x7f0000000440)="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", 0x1000, 0x7}], 0x800000, &(0x7f0000001480)=ANY=[@ANYBLOB="626c6f636b2d616c6c6f6361746f723d626f726465722c726573697a653d6175746f2c67727071756f74612c6572726f72733d636f6e74696e75652c6f626a5f747970653d2d3a262f2c5508ef7675e559f3b6140b81d15ae706548a9dacdeb8c5222968f3100733781cf93feb1298bee2"]) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) accept$alg(r0, 0x0, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000080)={0x2, 0x3, 0x3f, 0xff, 0x20, 0x7fff}) accept4$alg(r0, 0x0, 0x0, 0x80800) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:14 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1a0ffffffff]}}, 0x20) 05:22:14 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:14 executing program 0: 05:22:14 executing program 0: 05:22:14 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:14 executing program 5: [ 681.264351] REISERFS warning (device loop3): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 681.264351] 05:22:14 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe00000]}}, 0x20) 05:22:14 executing program 0: 05:22:14 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000002c0)={@mcast1, 0x2e, r1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000200)={0x4, r0}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x1}, 0x4) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:15 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:15 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa, 0x0}, 0x0) 05:22:15 executing program 5: 05:22:15 executing program 0: 05:22:15 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4010040c000]}}, 0x20) 05:22:15 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x2000000000000100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f0000000200)=0x4) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r3 = getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) sendmsg$nl_generic(r0, &(0x7f0000001880)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001840)={&(0x7f0000000480)={0x1384, 0x11, 0x30, 0x70bd2b, 0x25dfdbfe, {0x1c}, [@nested={0x130c, 0x8d, [@generic="13891a3f5a3979a8f5b0ddfc9d12540ab16441a3b2c410f02aaa0ccc2c4b998d17d88dab90fcf81f588c6e06e52739b09bc6d08b8b44e077527b8933b590479dfefe3e3446cd155e306172098797a0bfda0f775942a81cbe8cd97e6d7c1e5f713008cdb3726986aa963c3d526de6db14f855eff9eb50abd25c6f21aa748ecd8091127ca5a94b3fd4a4dac61ad26fa05a0b4ef7c1c473b77316e77e8c86bd537189955f8d465e19d78e27e8759819db88101daff106b6411b31ed28d277cb43f9d0c019625d8038237e31f95c32084d5b5cf1937579efd8a2dd0711b080c2c60fa0c479e64ece0b0e04137a", @typed={0x8, 0x22, @ipv4=@local}, @generic="1f131edf14be2c05d961641db7758a787d7249c33e7ac3e153be8d0b9823d742671b448f71658fc639906678a60d4144ab492270e852ae56ccad30c1642d4b48d68a2e9165ed8b50590d450e78fc4dccd6ad41332f4f541db129d353964f0881ad530bbb9e1c5af000a3111867cfb88d76b243ed8aef4e79477885926b6051214bccc0a5306274195431f295db0b95c60456dd44f0433370ddeeb7b205f12e4cd176e8810c73b2b9649f8fc4973ba542bfe0211bc186c3749e229d6bd45fa9cae790df3f578bba89469977de3dba41f3613a0f6e7d7098d8651a20d6ebcff11d11a37c1df1", @typed={0x8, 0x63, @fd=r1}, @typed={0xc, 0x79, @u64=0x6}, @typed={0x8, 0x4c, @pid=r3}, @generic="77369b4447078a60e9e128fc4fc0f94bc58b35fc8416ee5c735ddcf55c66ffa4406087b51cadc7ca546f7431f4d20814414be1c7a8e51118d47c1ffe9b3b3f550441628f31347e93aa9b10fd4740313b4313aed0c9b1765e310759b17165a264e5b4ca2bdfa8b821be0f19d688dc90200530236758707ad83bc68a589c25b41a017d201fec0d187fe011f9808ad06fdb2decf9d2068d7c33e8f209a31371947316e807405864cf985e8f98dfe634a4a7f051de3de5536123cd31ad3d66cf829b8971c98d661350d05bbae20b3d196a7897c57f360fc6c2ec6a97f06081497d20e775ec5f6b0a", @generic="302f306f4703ec1f67cf38fa9714223af4d1f0ec90ee0357f028eeab5ceb2830986bb614ac55d600d9941b", @generic="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"]}, @typed={0x8, 0x45, @fd=r2}, @nested={0x44, 0x37, [@generic="285ea6110876be4d9bf5b038d3a87c1f1adc0769c031a2bdeeef0ace96b1f1159a888c8eca1058c1c342dc12c409e5c41e2962537bc94e", @typed={0x8, 0x1a, @uid=r4}]}, @nested={0x18, 0x96, [@typed={0x8, 0x67, @u32=0x4}, @typed={0x8, 0x1b, @pid=r5}, @typed={0x4, 0x6c}]}]}, 0x1384}, 0x1, 0x0, 0x0, 0x4004080}, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:15 executing program 0: 05:22:15 executing program 5: 05:22:15 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xeffdffff00000000) 05:22:15 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x290, 0x4000) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000200)={0x1, 0x0, 0x100000000}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0xe5, 0x7, 0x40, "9a5a49b131ca2bc4ad32b288291bd714", "3ab83aaff2f1f29632e32a74185c2cf3138dc954f77d3bf6ab2af7082fd99d9598f48c3dfcbd955fc2aa585058b253e75187c89e9490fb030dc0d52f5726e06efb2204143287addcb2d9c8ef3a1e74aa867adfdb86acbfa16d2d0782b96c1c2e4f5898a542d04fde3ebcc631cd6aac8ee2e74ea90d458afa8a1db307727841f369abb235933f68d5dfe79e245c3149273f4698128bb404ff490b3323c45c3f19506fd05a9ab06afd711d82276485413f1957b8903f8e869f79be4f0c6f203d3123c18d0d315d5e7074708c69b79ec914"}, 0xe5, 0x3) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:15 executing program 0: 05:22:15 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000]}}, 0x20) 05:22:16 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:16 executing program 5: 05:22:16 executing program 0: 05:22:16 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xb0fd3f00) 05:22:16 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x20) 05:22:16 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000080)) 05:22:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000400)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x0) fcntl$getown(r2, 0x9) keyctl$update(0x2, r1, &(0x7f0000000600)="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", 0x139) bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r1, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 05:22:16 executing program 0: syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x802) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000001c0)={0x0, 0x0, 0xffffffffffffff9c}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) 05:22:16 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x2f00) 05:22:16 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff010000]}}, 0x20) 05:22:16 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f0000000240), r2, 0x100000001}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) truncate(&(0x7f0000000200)='./file1\x00', 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0xffffffffffffffc8, 0xfa00, {0x1, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:16 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) fstat(0xffffffffffffff9c, &(0x7f0000000780)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000a00)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r1, &(0x7f00000000c0), 0x20020102000007) ftruncate(r1, 0x0) 05:22:17 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:17 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x20) 05:22:17 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xd000) 05:22:17 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$TCFLSH(r0, 0x540b, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:17 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) fstat(0xffffffffffffff9c, &(0x7f0000000780)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000a00)="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", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)=',', 0x1}], 0x1, 0x4081806) sendfile(r0, r1, &(0x7f00000000c0), 0x20020102000007) ftruncate(r1, 0x0) 05:22:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgsnd(0x0, &(0x7f0000000240)=ANY=[], 0x0, 0x0) msgsnd(0x0, &(0x7f0000000340), 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000e1880b9c0c6c277300cf0100000000501dc5c1fb00d6de220021b0acf50000000000000000000000000000000000000000000000000014847ebb0a207917a1008b0be44d00000000000000000000a13f88dc0000000000000000000000"], 0x1, 0x1, 0xa4a3ad41a879dddd) 05:22:18 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x8000a0ffffffff) 05:22:18 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x4e, 0x8000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:18 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000002c0)) ptrace$peek(0x1, 0x0, &(0x7f0000000300)) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000140)) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) setsockopt$inet_tcp_int(r2, 0x6, 0xc0000000000002, &(0x7f0000000100)=0x75, 0xd91867c93dd35724) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) semget(0x2, 0x3, 0x201) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r2, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0x395b}], 0x1, &(0x7f0000000200)=""/20, 0xfffffffffffffec4}, 0x100) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x218) 05:22:18 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10]}}, 0x20) 05:22:18 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x80000000, 0x2e051409f4166182, 0x4, 0x6, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x4, 0x957}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:18 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:19 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:19 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xa0008000) 05:22:19 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfffffff4]}}, 0x20) 05:22:19 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x400000004002) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x63c0, 0x30, 0x7, 0x1}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1, 0x5}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:19 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000200)={0xe5, 0x5, 0x8001, 'queue1\x00', 0x1f}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, &(0x7f0000000580)=ANY=[]) r2 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980)={0x8, "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", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300), 0x13f, 0xd}}, 0x20) sendfile(r3, r3, &(0x7f0000000180)=0x28, 0x8080fffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:19 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:19 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xa0010000) 05:22:19 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:19 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x20) [ 686.073655] audit: type=1804 audit(1538889739.385:800): pid=14378 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir818367771/syzkaller.TNnZgs/272/file0" dev="sda1" ino=16558 res=1 05:22:19 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xa00100) [ 686.127218] audit: type=1804 audit(1538889739.385:801): pid=14378 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir818367771/syzkaller.TNnZgs/272/file0" dev="sda1" ino=16558 res=1 05:22:19 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xffffffffa0010000) 05:22:19 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3f00]}}, 0x20) 05:22:20 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:20 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sysinfo(&(0x7f0000000080)=""/36) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) socket$inet(0x2, 0xb, 0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:20 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x1a000) 05:22:20 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff01]}}, 0x20) 05:22:20 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000200)={0xe5, 0x5, 0x8001, 'queue1\x00', 0x1f}) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x18, &(0x7f0000000580)=ANY=[]) r2 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) write$UHID_INPUT(r3, &(0x7f0000000980)={0x8, "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", 0x1000}, 0x1006) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000300), 0x13f, 0xd}}, 0x20) sendfile(r3, r3, &(0x7f0000000180)=0x28, 0x8080fffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:20 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:20 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x100000000000) 05:22:20 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe000]}}, 0x20) 05:22:20 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) ptrace$getsig(0x4202, r2, 0xa56, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:20 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x40000000) [ 687.261958] audit: type=1804 audit(1538889740.575:802): pid=14417 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir818367771/syzkaller.TNnZgs/273/file0" dev="sda1" ino=16563 res=1 [ 687.302855] audit: type=1804 audit(1538889740.605:803): pid=14417 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir818367771/syzkaller.TNnZgs/273/file0" dev="sda1" ino=16563 res=1 05:22:20 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xd00000) 05:22:20 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, r3, r4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:21 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:21 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xd0) 05:22:21 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, r3, r4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:21 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x400008) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="a77bf3cfe821d4e1989f0ff5c7dee456", 0x10) open(&(0x7f00000001c0)='./file0\x00', 0x280, 0x0) 05:22:21 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x1000000) 05:22:21 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, r3, r4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:21 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x3ffdb0) 05:22:24 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x20) 05:22:24 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x4e23, 0x4, @empty, 0xffffffffffffffb6}}}, 0xfffffffffffffe9c) getsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000080), &(0x7f0000000200)=0x4) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000240), 0x10, &(0x7f0000000340)={&(0x7f00000002c0)={0x3, 0x0, 0xfffffffffffff001, {r2, r3/1000+10000}, {}, {0x1, 0x6, 0xfffffffffffffffb, 0xb1}, 0x1, @canfd={{0x3, 0x1000, 0x0, 0xfff}, 0xa, 0x2, 0x0, 0x0, "5d9a9d192458eda2ee479c3c55a1354d7475706107f33a29ef55b35660e9db63e4ded13ccb7c6361dbe047842a8c98602b1dbd4d46b26aa0642d43cfbd806f09"}}, 0x80}, 0x1, 0x0, 0x0, 0x20000004}, 0x24000040) 05:22:24 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, r3, r4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:24 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xe0) 05:22:24 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:24 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, r3, r4) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000003c0)=0x4000) 05:22:24 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x400008) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="a77bf3cfe821d4e1989f0ff5c7dee456", 0x10) open(&(0x7f00000001c0)='./file0\x00', 0x280, 0x0) 05:22:24 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) [ 691.000022] audit: type=1804 audit(1538889744.315:804): pid=14467 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir283695598/syzkaller.DpxX4L/1287/file0" dev="sda1" ino=16555 res=1 05:22:24 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xffffffffa0008000) 05:22:24 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa0010000]}}, 0x20) 05:22:24 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x6, @ipv4={[], [], @multicast2}, 0x5}, {0xa, 0x4e21, 0x1, @mcast1, 0x7}, r2, 0x68ca}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) [ 691.085698] audit: type=1804 audit(1538889744.395:805): pid=14475 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir283695598/syzkaller.DpxX4L/1288/file0" dev="sda1" ino=16543 res=1 05:22:24 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x400008) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="a77bf3cfe821d4e1989f0ff5c7dee456", 0x10) open(&(0x7f00000001c0)='./file0\x00', 0x280, 0x0) 05:22:24 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, r2, r3) 05:22:24 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xfffffdef) 05:22:24 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x2, &(0x7f0000000200)}}, 0xfffffc85) 05:22:24 executing program 1: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:22:24 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r2, 0xffff}}, 0x10) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000200)=ANY=[@ANYBLOB="05ff0000060000000000000104000000000000000200000000000020000000000000001d04000000000000020000000000000006000000000000008cffffff000000003faf00000000000000000000"]) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) write$input_event(r0, &(0x7f0000000340)={{r3, r4/1000+30000}, 0x17, 0x9, 0x14}, 0x18) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000280)) 05:22:24 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) fchown(r0, r2, 0x0) 05:22:24 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300]}}, 0x20) [ 691.224920] audit: type=1804 audit(1538889744.535:806): pid=14496 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir283695598/syzkaller.DpxX4L/1289/file0" dev="sda1" ino=16562 res=1 05:22:24 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x400008) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="a77bf3cfe821d4e1989f0ff5c7dee456", 0x10) 05:22:24 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x10) 05:22:24 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff0f0000]}}, 0x20) 05:22:24 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 05:22:24 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x400008) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:24 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) fchown(r0, r2, 0x0) 05:22:24 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xa0010000000000) 05:22:24 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:25 executing program 0: write$smack_current(0xffffffffffffffff, &(0x7f0000000280)='\'\x00', 0x86) 05:22:25 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}}}, &(0x7f0000000080)=0xe8) fchown(r0, r2, 0x0) 05:22:25 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1bc30200]}}, 0x20) 05:22:25 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400201) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x5, 0x8, 0x9, 0x1000000000000000, 0x6}, 0x14) 05:22:25 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x100000000000000) 05:22:25 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x2fb, @mcast2, 0x6}}}, 0x28) time(&(0x7f0000000440)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000180)='wlan0\x00', 0xffffffffffffffff}, 0x30) ptrace$pokeuser(0x6, r2, 0x101, 0x10) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x6, 0x2) 05:22:25 executing program 0: creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(0xffffffffffffffff, &(0x7f0000000280)='\'\x00', 0x86) 05:22:25 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r2) 05:22:25 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x10000000]}}, 0x20) 05:22:25 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xd0000000000000) 05:22:25 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, r2, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x4810) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:25 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r1) 05:22:25 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) open(&(0x7f00000001c0)='./file0\x00', 0x280, 0x68000000) 05:22:25 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x2f00000000000000) 05:22:25 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) ioprio_get$uid(0x3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0x90) 05:22:25 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1000000000000000]}}, 0x20) 05:22:25 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r1) [ 692.431892] audit: type=1804 audit(1538889745.745:807): pid=14562 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir283695598/syzkaller.DpxX4L/1295/file0" dev="sda1" ino=16551 res=1 [ 692.712043] EXT4-fs (sda1): re-mounted. Opts: lazytime,min_batch_time=0x0000000000000001,,errors=continue 05:22:26 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x2fb, @mcast2, 0x6}}}, 0x28) time(&(0x7f0000000440)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000180)='wlan0\x00', 0xffffffffffffffff}, 0x30) ptrace$pokeuser(0x6, r2, 0x101, 0x10) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x6, 0x2) 05:22:26 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xe000000000) 05:22:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005dc0)={'ip_vti0\x00'}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000001240)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100000000000000, 0x4) close(r1) r2 = accept4(r0, &(0x7f0000660ff4)=@nl=@unspec, &(0x7f0000000040)=0xf5b19b4c0b1ce647, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip6gretap0\x00', 0x10) recvfrom$inet(r2, &(0x7f0000000200)=""/12, 0x2, 0x0, 0x0, 0x53) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000240)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)=ANY=[@ANYBLOB="6c617a7901040000000600005f62617463685f74696d653d3078303030303030303030303030303001302c00"]) 05:22:26 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r1) 05:22:26 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xb00000000000000]}}, 0x20) 05:22:26 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback}}}, 0xfffffea2) 05:22:26 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x2f) 05:22:26 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r1) 05:22:26 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x804000000000000]}}, 0x20) 05:22:26 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xeffdffff) 05:22:26 executing program 0: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) open(&(0x7f00000001c0)='./file0\x00', 0x280, 0xffffffffa0008000) [ 693.013355] EXT4-fs (sda1): re-mounted. Opts: lazytime,min_batch_time=0x0000000000000001,,errors=continue 05:22:26 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r1) 05:22:26 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x2fb, @mcast2, 0x6}}}, 0x28) time(&(0x7f0000000440)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000180)='wlan0\x00', 0xffffffffffffffff}, 0x30) ptrace$pokeuser(0x6, r2, 0x101, 0x10) syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x6, 0x2) 05:22:26 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x3e00) 05:22:26 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x100000000000000]}}, 0x20) 05:22:26 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r1) [ 693.197359] audit: type=1804 audit(1538889746.515:808): pid=14611 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir283695598/syzkaller.DpxX4L/1297/file0" dev="sda1" ino=16564 res=1 05:22:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0xae, 0x280000) ioctl$KDADDIO(r0, 0x4b34, 0xfffffffffffffff8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 693.243151] EXT4-fs (sda1): re-mounted. Opts: lazytime,min_batch_time=0x0000000000000001,,errors=continue [ 693.313788] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:27 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) open(&(0x7f00000001c0)='./file0\x00', 0x280, 0x600) 05:22:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0xae, 0x280000) ioctl$KDADDIO(r0, 0x4b34, 0xfffffffffffffff8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:27 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x2fb, @mcast2, 0x6}}}, 0x28) time(&(0x7f0000000440)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000180)='wlan0\x00', 0xffffffffffffffff}, 0x30) ptrace$pokeuser(0x6, r2, 0x101, 0x10) 05:22:27 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x4) 05:22:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(0xffffffffffffffff, 0x0, r1) 05:22:27 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xfbffffff]}}, 0x20) 05:22:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r2) 05:22:27 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x1a0) [ 693.947925] EXT4-fs (sda1): re-mounted. Opts: lazytime,min_batch_time=0x0000000000000001,,errors=continue [ 693.968364] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:27 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x40000) 05:22:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r2) 05:22:27 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x2fb, @mcast2, 0x6}}}, 0x28) time(&(0x7f0000000440)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000180)='wlan0\x00', 0xffffffffffffffff}, 0x30) 05:22:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r2) [ 694.111779] audit: type=1804 audit(1538889747.425:809): pid=14656 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir494717782/syzkaller.CbpiTx/2542/file0" dev="sda1" ino=16564 res=1 05:22:27 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000100)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @loopback, [0x0, 0x0, 0x2000]}}}, 0x90) 05:22:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0xae, 0x280000) ioctl$KDADDIO(r0, 0x4b34, 0xfffffffffffffff8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:27 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x100000) 05:22:27 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8040000]}}, 0x20) 05:22:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r1) 05:22:27 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x1000000000000000) 05:22:27 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000ffffffffa00100"], 0xa}, 0x0) 05:22:27 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff0f]}}, 0x20) [ 694.203721] EXT4-fs (sda1): re-mounted. Opts: lazytime,min_batch_time=0x0000000000000001,,errors=continue [ 694.228494] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:27 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x2fb, @mcast2, 0x6}}}, 0x28) time(&(0x7f0000000440)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) 05:22:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r1) 05:22:27 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) open(&(0x7f00000001c0)='./file0\x00', 0x280, 0x700) 05:22:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0xae, 0x280000) ioctl$KDADDIO(r0, 0x4b34, 0xfffffffffffffff8) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:27 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x1a0ffffffff) [ 694.365003] EXT4-fs (sda1): re-mounted. Opts: lazytime,min_batch_time=0x0000000000000001,,errors=continue 05:22:27 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000]}}, 0x20) 05:22:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@max_batch_time={'max_batch_time'}}]}) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x4, 0xb4080) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000180)={0x1, 0x7, 0x6fe8, 0x1, 0x80000000, 0x3ff}) 05:22:27 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x8000a0) 05:22:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r1) [ 694.423045] audit: type=1804 audit(1538889747.735:810): pid=14694 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir494717782/syzkaller.CbpiTx/2545/file0" dev="sda1" ino=16553 res=1 05:22:27 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x2fb, @mcast2, 0x6}}}, 0x28) time(&(0x7f0000000440)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) [ 694.483893] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:27 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x20000000]}}, 0x20) 05:22:27 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x3e000000) 05:22:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r2) 05:22:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0xae, 0x280000) ioctl$KDADDIO(r0, 0x4b34, 0xfffffffffffffff8) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:27 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x40000]}}, 0x20) 05:22:27 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xe0000000) 05:22:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r2) 05:22:28 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x2fb, @mcast2, 0x6}}}, 0x28) time(&(0x7f0000000440)) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) 05:22:28 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x20) 05:22:28 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r2) 05:22:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$usb(&(0x7f00000006c0)='/dev/bus/usb/00#/00#\x00', 0xae, 0x280000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:28 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getgroups(0xa, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, r2) 05:22:28 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0xb0fd3f0000000000) 05:22:28 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000380)={r1, @in6={{0xa, 0x4e24, 0x2fb, @mcast2, 0x6}}}, 0x28) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) 05:22:28 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff0f000000000000]}}, 0x20) 05:22:28 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) open(&(0x7f00000001c0)='./file0\x00', 0x280, 0x2ad4c) 05:22:28 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x4000000000000) 05:22:28 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x9, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0]) fchown(r0, 0x0, r2) 05:22:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:28 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x3e00000000000000) 05:22:28 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x8, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0, 0xffffffffffffffff]) fchown(r0, 0x0, r2) 05:22:28 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000180)='./file0\x00', 0x61fce76e, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="f2a45949e8bbdc58381f90c3e7355b3c581a02346c93914a556c6442d19ea22416427215e99ff968b95f5a25231edb37b2e42f", 0x33, 0x40}, {&(0x7f0000000200)="808217ddb80542add073aecae941f5975f9d33d13b1b6888cdda79d2d6af59a1943b0bea22a3a2a6598990944fe929815b270a4011ad0ac39789540a6ce78886d71c953770f4a824e06c16f8d2fcd576782b7f2008f33989026ac76a7e55333933ff7120108dcc4dabab62315335c6bb982e291841c3b0adf072be4c014d67e610c8b45308c62aa7f652", 0x8a, 0x1}], 0x0, &(0x7f0000000540)={[{@quota_off='quota=off'}, {@noloccookie='noloccookie'}, {@data_ordered='data=ordered'}, {@meta='meta'}, {@acl='acl'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@smackfsfloor={'smackfsfloor'}}, {@euid_lt={'euid<', r1}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@max_batch_time={'max_batch_time'}}]}) 05:22:28 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x227945e2, @dev={0xfe, 0x80, [], 0x15}, 0x8}}, 0x6, 0x8df}, &(0x7f0000000340)=0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) [ 694.926503] audit: type=1804 audit(1538889748.235:811): pid=14756 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir494717782/syzkaller.CbpiTx/2549/file0" dev="sda1" ino=16564 res=1 05:22:28 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xc0400001040000]}}, 0x20) 05:22:28 executing program 0: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:28 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x7, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0, 0x0]) fchown(r0, 0x0, r2) 05:22:28 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x4000000000000000) 05:22:28 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x3000000]}}, 0x20) [ 695.048799] gfs2: invalid mount option: fowner=00000000000000000000 [ 695.067267] gfs2: can't parse mount arguments 05:22:28 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x4, 0x2200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) 05:22:28 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x6, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0, 0x0]) fchown(r0, 0x0, r2) 05:22:28 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x2f000000) 05:22:28 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x80000]}}, 0x20) 05:22:28 executing program 3 (fault-call:1 fault-nth:0): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) [ 695.241391] FAULT_INJECTION: forcing a failure. [ 695.241391] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 695.265872] CPU: 0 PID: 14798 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #48 [ 695.273206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.282566] Call Trace: [ 695.282598] dump_stack+0x1c4/0x2b4 [ 695.282625] ? dump_stack_print_info.cold.2+0x52/0x52 [ 695.282659] should_fail.cold.4+0xa/0x17 [ 695.294048] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 695.294067] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.294087] ? __radix_tree_lookup+0x358/0x4c0 [ 695.313347] ? __radix_tree_insert+0x8f0/0x8f0 [ 695.317939] ? kasan_check_read+0x11/0x20 [ 695.322100] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 695.327395] ? fs_reclaim_acquire+0x20/0x20 [ 695.331727] ? lock_downgrade+0x900/0x900 [ 695.335883] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 695.341695] ? ___might_sleep+0x1ed/0x300 [ 695.345854] ? lock_release+0x970/0x970 [ 695.349836] ? arch_local_save_flags+0x40/0x40 [ 695.354430] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 695.359478] ? __might_sleep+0x95/0x190 [ 695.363466] __alloc_pages_nodemask+0x34b/0xde0 [ 695.368140] ? lock_acquire+0x1ed/0x520 [ 695.372122] ? smack_d_instantiate+0x136/0xea0 [ 695.376714] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 695.381738] ? mark_held_locks+0x130/0x130 [ 695.385980] ? lock_release+0x970/0x970 [ 695.389964] ? arch_local_save_flags+0x40/0x40 [ 695.394559] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 695.399845] ? unwind_dump+0x190/0x190 [ 695.403751] ? trace_hardirqs_on+0xbd/0x310 [ 695.408086] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.413638] ? check_preemption_disabled+0x48/0x200 [ 695.418665] ? __mutex_lock+0x85e/0x1700 [ 695.422739] ? __find_get_block+0x3be/0xf20 [ 695.427074] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 695.432626] alloc_pages_current+0x10c/0x210 [ 695.437050] __page_cache_alloc+0x38f/0x5b0 [ 695.441381] ? ___might_sleep+0x1ed/0x300 [ 695.445540] ? arch_local_save_flags+0x40/0x40 [ 695.450133] ? __filemap_set_wb_err+0x3b0/0x3b0 [ 695.454815] ? __wake_up_common_lock+0x1d0/0x330 [ 695.459676] pagecache_get_page+0x396/0xf00 [ 695.464017] ? find_get_pages_contig+0x15b0/0x15b0 [ 695.468955] ? lock_downgrade+0x900/0x900 [ 695.473108] ? do_raw_spin_lock+0xc1/0x200 [ 695.477358] ? __find_get_block+0xf20/0xf20 [ 695.481697] ? __wake_up_common_lock+0x1d0/0x330 [ 695.486469] ? __wake_up_common+0x7d0/0x7d0 [ 695.490796] ? __lockdep_init_map+0x105/0x590 [ 695.495315] ? mark_held_locks+0x130/0x130 [ 695.499560] ? mark_held_locks+0x130/0x130 [ 695.503809] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 695.508838] ? ext4_get_group_desc+0x1c6/0x2c0 [ 695.513446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.518997] ? ext4_ext_index_trans_blocks+0x11f/0x150 [ 695.524285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.529832] ? ext4_meta_trans_blocks+0x25f/0x310 [ 695.534689] grab_cache_page_write_begin+0x75/0xa0 [ 695.539632] ext4_write_begin+0x336/0x1830 [ 695.543885] ? ext4_truncate+0x1650/0x1650 [ 695.548131] ? ext4_xattr_get+0x1a8/0xb30 [ 695.552284] ? lock_downgrade+0x900/0x900 [ 695.556438] ? ext4_xattr_ibody_get+0x107/0x630 [ 695.561121] ? ext4_xattr_inode_set_class+0x60/0x60 [ 695.566161] ? current_time+0x72/0x1b0 [ 695.570065] ? lock_downgrade+0x900/0x900 [ 695.574243] ? trace_hardirqs_on+0xbd/0x310 [ 695.578571] ? current_time+0x72/0x1b0 [ 695.582467] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 695.587924] ? ext4_xattr_ibody_get+0x630/0x630 [ 695.592600] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.598143] ? iov_iter_fault_in_readable+0x22a/0x450 [ 695.603337] ? copy_page_from_iter+0x8e0/0x8e0 [ 695.607927] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 695.612958] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 695.618153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.618169] ? timespec64_trunc+0xea/0x180 [ 695.618192] ? inode_init_owner+0x340/0x340 [ 695.618222] generic_perform_write+0x3aa/0x6a0 [ 695.627995] ? page_endio+0xb60/0xb60 [ 695.628009] ? file_update_time+0xe4/0x640 [ 695.628025] ? current_time+0x1b0/0x1b0 [ 695.628041] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 695.628057] ? generic_write_checks+0x382/0x5d0 [ 695.628078] ? wait_on_page_locked_killable+0x520/0x520 [ 695.664402] ? ext4_file_write_iter+0x2a1/0x1420 [ 695.669171] __generic_file_write_iter+0x26e/0x630 [ 695.674143] ext4_file_write_iter+0x390/0x1420 [ 695.678745] ? ext4_file_mmap+0x410/0x410 [ 695.682909] ? ksys_dup3+0x680/0x680 [ 695.686638] ? __f_unlock_pos+0x19/0x20 [ 695.690622] ? lock_downgrade+0x900/0x900 [ 695.694780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 695.700323] ? proc_fail_nth_write+0x9e/0x210 [ 695.704825] ? proc_cwd_link+0x1d0/0x1d0 [ 695.708898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.714443] ? iov_iter_init+0xc2/0x1e0 [ 695.718433] __vfs_write+0x6b8/0x9f0 [ 695.722161] ? kernel_read+0x120/0x120 [ 695.726064] ? lock_release+0x970/0x970 [ 695.730043] ? arch_local_save_flags+0x40/0x40 [ 695.734635] ? check_preemption_disabled+0x48/0x200 [ 695.739750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.745305] ? check_preemption_disabled+0x48/0x200 [ 695.750331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.755871] ? __sb_start_write+0x1b2/0x370 [ 695.760222] vfs_write+0x1fc/0x560 [ 695.763784] ksys_write+0x101/0x260 [ 695.767426] ? __ia32_sys_read+0xb0/0xb0 [ 695.771502] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 695.776989] __x64_sys_write+0x73/0xb0 [ 695.780887] do_syscall_64+0x1b9/0x820 [ 695.784781] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 695.790152] ? syscall_return_slowpath+0x5e0/0x5e0 [ 695.795109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 695.799963] ? trace_hardirqs_on_caller+0x310/0x310 [ 695.804987] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 695.810012] ? prepare_exit_to_usermode+0x291/0x3b0 [ 695.815038] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 695.819897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.825097] RIP: 0033:0x457579 05:22:29 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x10000000) 05:22:29 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x5, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0x0]) fchown(r0, 0x0, r2) [ 695.828304] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 695.847224] RSP: 002b:00007f19d53c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 695.854940] RAX: ffffffffffffffda RBX: 00007f19d53c1c90 RCX: 0000000000457579 [ 695.862230] RDX: 0000000000000086 RSI: 0000000020000280 RDI: 0000000000000003 [ 695.869501] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 695.876776] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f19d53c26d4 [ 695.884045] R13: 00000000004c5688 R14: 00000000004d9000 R15: 0000000000000004 05:22:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:29 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x20) 05:22:29 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x2200) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) 05:22:29 executing program 3 (fault-call:1 fault-nth:1): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:29 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x4, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00, 0xee01]) fchown(r0, 0x0, r2) 05:22:29 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x4000) 05:22:29 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffffffa0008000]}}, 0x20) [ 696.061001] FAULT_INJECTION: forcing a failure. [ 696.061001] name failslab, interval 1, probability 0, space 0, times 0 05:22:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 696.130055] CPU: 0 PID: 14829 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #48 [ 696.137371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.146728] Call Trace: [ 696.149341] dump_stack+0x1c4/0x2b4 [ 696.152991] ? dump_stack_print_info.cold.2+0x52/0x52 [ 696.158206] ? lock_release+0x970/0x970 [ 696.162206] ? arch_local_save_flags+0x40/0x40 [ 696.166809] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 696.172103] should_fail.cold.4+0xa/0x17 [ 696.176172] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 696.181300] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.186849] ? check_preemption_disabled+0x48/0x200 [ 696.191876] ? __mutex_lock+0x85e/0x1700 [ 696.195954] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 696.201499] ? alloc_pages_current+0x114/0x210 [ 696.206089] ? __page_cache_alloc+0x191/0x5b0 [ 696.210593] ? ___might_sleep+0x1ed/0x300 [ 696.214747] ? arch_local_save_flags+0x40/0x40 [ 696.219339] ? __filemap_set_wb_err+0x3b0/0x3b0 [ 696.224025] ? ___might_sleep+0x1ed/0x300 [ 696.228182] ? arch_local_save_flags+0x40/0x40 [ 696.232792] ? find_get_pages_contig+0x15b0/0x15b0 [ 696.237730] __should_failslab+0x124/0x180 [ 696.241976] should_failslab+0x9/0x14 [ 696.245783] kmem_cache_alloc+0x2be/0x730 [ 696.249942] ? __wake_up_common+0x7d0/0x7d0 [ 696.254266] ? __lockdep_init_map+0x105/0x590 [ 696.258772] jbd2__journal_start+0x1e7/0xa90 [ 696.263195] ? arch_local_save_flags+0x40/0x40 [ 696.267789] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 696.273514] ? __might_sleep+0x95/0x190 [ 696.277502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.283046] __ext4_journal_start_sb+0x1a5/0x5f0 [ 696.287803] ? ext4_write_begin+0x3ab/0x1830 [ 696.292236] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 696.297958] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.303498] ? ext4_meta_trans_blocks+0x25f/0x310 [ 696.308353] ext4_write_begin+0x3ab/0x1830 [ 696.312606] ? ext4_truncate+0x1650/0x1650 [ 696.316854] ? ext4_xattr_get+0x1a8/0xb30 [ 696.321012] ? lock_downgrade+0x900/0x900 [ 696.325163] ? ext4_xattr_ibody_get+0x107/0x630 [ 696.329859] ? ext4_xattr_inode_set_class+0x60/0x60 [ 696.334887] ? current_time+0x72/0x1b0 [ 696.338779] ? lock_downgrade+0x900/0x900 [ 696.342941] ? trace_hardirqs_on+0xbd/0x310 [ 696.347267] ? current_time+0x72/0x1b0 [ 696.351158] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 696.356631] ? ext4_xattr_ibody_get+0x630/0x630 [ 696.361307] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.366845] ? iov_iter_fault_in_readable+0x22a/0x450 [ 696.372039] ? copy_page_from_iter+0x8e0/0x8e0 [ 696.376626] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 696.381652] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 696.386854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.392398] ? timespec64_trunc+0xea/0x180 [ 696.396663] ? inode_init_owner+0x340/0x340 [ 696.401011] generic_perform_write+0x3aa/0x6a0 [ 696.405611] ? page_endio+0xb60/0xb60 [ 696.409432] ? file_update_time+0xe4/0x640 [ 696.413676] ? current_time+0x1b0/0x1b0 [ 696.417659] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 696.422681] ? generic_write_checks+0x382/0x5d0 [ 696.427359] ? wait_on_page_locked_killable+0x520/0x520 [ 696.432738] ? ext4_file_write_iter+0x2a1/0x1420 [ 696.437502] __generic_file_write_iter+0x26e/0x630 [ 696.442444] ext4_file_write_iter+0x390/0x1420 [ 696.447034] ? ext4_file_mmap+0x410/0x410 [ 696.451206] ? ksys_dup3+0x680/0x680 [ 696.454936] ? __f_unlock_pos+0x19/0x20 [ 696.458917] ? lock_downgrade+0x900/0x900 [ 696.463071] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 696.468616] ? proc_fail_nth_write+0x9e/0x210 [ 696.473116] ? proc_cwd_link+0x1d0/0x1d0 [ 696.477201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.482764] ? iov_iter_init+0xc2/0x1e0 [ 696.486748] __vfs_write+0x6b8/0x9f0 [ 696.490472] ? kernel_read+0x120/0x120 [ 696.494366] ? lock_release+0x970/0x970 [ 696.498348] ? arch_local_save_flags+0x40/0x40 [ 696.502941] ? check_preemption_disabled+0x48/0x200 [ 696.507968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.513515] ? check_preemption_disabled+0x48/0x200 [ 696.518568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.524114] ? __sb_start_write+0x1b2/0x370 [ 696.528446] vfs_write+0x1fc/0x560 [ 696.532033] ksys_write+0x101/0x260 [ 696.535674] ? __ia32_sys_read+0xb0/0xb0 [ 696.539746] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 696.545240] __x64_sys_write+0x73/0xb0 [ 696.549139] do_syscall_64+0x1b9/0x820 [ 696.553056] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 696.558427] ? syscall_return_slowpath+0x5e0/0x5e0 [ 696.563360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.568227] ? trace_hardirqs_on_caller+0x310/0x310 [ 696.573253] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 696.578283] ? prepare_exit_to_usermode+0x291/0x3b0 [ 696.583311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 696.588168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.593382] RIP: 0033:0x457579 [ 696.596582] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.615490] RSP: 002b:00007f19d53c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 696.623225] RAX: ffffffffffffffda RBX: 00007f19d53c1c90 RCX: 0000000000457579 05:22:29 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x3, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, 0x0) 05:22:30 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x3e) [ 696.630582] RDX: 0000000000000086 RSI: 0000000020000280 RDI: 0000000000000003 [ 696.637868] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 696.645142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f19d53c26d4 [ 696.652410] R13: 00000000004c5688 R14: 00000000004d9000 R15: 0000000000000004 05:22:30 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) 05:22:30 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x3, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee00]) fchown(r0, 0x0, 0x0) 05:22:30 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xf4ffffff00000000]}}, 0x20) 05:22:30 executing program 3 (fault-call:1 fault-nth:2): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:30 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0xfffffffffffffffc) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x61, 0x6f, &(0x7f0000000040)=0x9}) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}, {&(0x7f0000000540)="d3de54da0f7f326e8834529c49b38cafeae0378f5d5408d918abf344d34fb3a093adb30cbfdba4ff4c91866b3eb5ac108b6fcd042258603dcfc3f229145e3b8082c528bb1c1404994d18e2ff3ae9fd14a61978022737074274c584a73c554f67b1aabe4f45eab94fe6f652ec8b90b610cadf66a3ff4ac8fbfe82f548ed5f0b12ce70b065edf13b8e86098b4892c1c90b", 0x90, 0x5236}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 696.815509] FAULT_INJECTION: forcing a failure. [ 696.815509] name failslab, interval 1, probability 0, space 0, times 0 [ 696.837076] CPU: 0 PID: 14859 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #48 [ 696.844383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.853738] Call Trace: [ 696.856343] dump_stack+0x1c4/0x2b4 [ 696.860000] ? dump_stack_print_info.cold.2+0x52/0x52 [ 696.865222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.870780] should_fail.cold.4+0xa/0x17 [ 696.874851] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 696.879956] ? memcg_check_events+0x93/0x550 [ 696.884372] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 696.889396] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 696.894165] ? is_bpf_text_address+0xac/0x170 [ 696.898679] ? lock_downgrade+0x900/0x900 [ 696.902841] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 696.908647] ? kasan_check_read+0x11/0x20 [ 696.912806] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 696.918086] ? unwind_dump+0x190/0x190 [ 696.921979] ? ___might_sleep+0x1ed/0x300 [ 696.926129] ? arch_local_save_flags+0x40/0x40 [ 696.930715] ? kernel_text_address+0x79/0xf0 [ 696.935140] __should_failslab+0x124/0x180 [ 696.939386] should_failslab+0x9/0x14 [ 696.943205] __kmalloc+0x2d4/0x760 [ 696.946762] ? ext4_find_extent+0x757/0x9b0 [ 696.951099] ext4_find_extent+0x757/0x9b0 [ 696.955254] ? alloc_page_buffers+0x1cd/0x6b0 [ 696.959768] ? ext4_block_write_begin+0x11ed/0x1870 [ 696.964786] ? ext4_write_begin+0x6bb/0x1830 [ 696.969207] ? memremap+0x70/0x430 [ 696.972767] ext4_ext_map_blocks+0x2ad/0x6330 [ 696.977267] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.982643] ? lock_release+0x970/0x970 [ 696.986619] ? memcg_kmem_get_cache+0x3a9/0x9d0 [ 696.991291] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 696.996310] ? lock_downgrade+0x900/0x900 [ 697.000465] ? lock_release+0x970/0x970 [ 697.004448] ? percpu_ref_put_many+0x13e/0x260 [ 697.009033] ? trace_hardirqs_on+0xbd/0x310 [ 697.013356] ? mem_cgroup_charge_statistics+0x780/0x780 [ 697.018725] ? ext4_es_lookup_extent+0x446/0xde0 [ 697.023496] ? lock_downgrade+0x900/0x900 [ 697.027661] ? lock_release+0x970/0x970 [ 697.031719] ? lock_downgrade+0x900/0x900 [ 697.035890] ? lock_acquire+0x1ed/0x520 [ 697.039878] ? ext4_map_blocks+0x487/0x1b50 [ 697.044224] ? lock_release+0x970/0x970 [ 697.048221] ? arch_local_save_flags+0x40/0x40 [ 697.052817] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.058354] ? ext4_es_lookup_extent+0x499/0xde0 [ 697.063126] ? down_read+0xb0/0x1d0 [ 697.066760] ? ext4_map_blocks+0x487/0x1b50 [ 697.071100] ? __down_interruptible+0x700/0x700 [ 697.075770] ? _raw_spin_unlock+0x2c/0x50 [ 697.079919] ? create_empty_buffers+0x928/0xdb0 [ 697.084605] ext4_map_blocks+0xe35/0x1b50 [ 697.088764] ? ext4_issue_zeroout+0x190/0x190 [ 697.093271] ? jbd2_journal_free_reserved+0x110/0x110 [ 697.098470] ? __page_cache_alloc+0x191/0x5b0 [ 697.102976] ? ___might_sleep+0x1ed/0x300 [ 697.107132] _ext4_get_block+0x226/0x6d0 [ 697.111222] ? ext4_map_blocks+0x1b50/0x1b50 [ 697.115639] ? ___might_sleep+0x1ed/0x300 [ 697.119792] ext4_get_block_unwritten+0x2a/0x40 [ 697.124475] ext4_block_write_begin+0x6f9/0x1870 [ 697.129251] ? ext4_block_zero_page_range+0x1a50/0x1a50 [ 697.134625] ? __check_block_validity.constprop.80+0x210/0x210 [ 697.140602] ? arch_local_save_flags+0x40/0x40 [ 697.145220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.150769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.156313] ? wait_for_stable_page+0x1a5/0x570 [ 697.160993] ? ___might_sleep+0x1ed/0x300 [ 697.165151] ? set_page_dirty_lock+0x190/0x190 [ 697.169754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.175297] ? ext4_meta_trans_blocks+0x25f/0x310 [ 697.180149] ? __might_sleep+0x95/0x190 [ 697.184142] ext4_write_begin+0x6bb/0x1830 [ 697.188400] ? ext4_truncate+0x1650/0x1650 [ 697.192647] ? ext4_xattr_get+0x1a8/0xb30 [ 697.196810] ? lock_downgrade+0x900/0x900 [ 697.200962] ? ext4_xattr_ibody_get+0x107/0x630 [ 697.205643] ? ext4_xattr_inode_set_class+0x60/0x60 [ 697.210674] ? current_time+0x72/0x1b0 [ 697.214573] ? lock_downgrade+0x900/0x900 [ 697.218734] ? trace_hardirqs_on+0xbd/0x310 [ 697.223061] ? current_time+0x72/0x1b0 [ 697.226954] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 697.232425] ? ext4_xattr_ibody_get+0x630/0x630 [ 697.237104] ? iov_iter_fault_in_readable+0x22a/0x450 [ 697.242303] ? copy_page_from_iter+0x8e0/0x8e0 [ 697.246891] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 697.251919] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 697.257124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.262673] ? timespec64_trunc+0xea/0x180 [ 697.266917] ? inode_init_owner+0x340/0x340 [ 697.271263] generic_perform_write+0x3aa/0x6a0 [ 697.275862] ? page_endio+0xb60/0xb60 [ 697.279670] ? file_update_time+0xe4/0x640 [ 697.283910] ? current_time+0x1b0/0x1b0 [ 697.287899] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 697.292923] ? generic_write_checks+0x382/0x5d0 [ 697.297600] ? wait_on_page_locked_killable+0x520/0x520 [ 697.302973] ? ext4_file_write_iter+0x2a1/0x1420 [ 697.307744] __generic_file_write_iter+0x26e/0x630 [ 697.312693] ext4_file_write_iter+0x390/0x1420 [ 697.317289] ? ext4_file_mmap+0x410/0x410 [ 697.321449] ? ksys_dup3+0x680/0x680 [ 697.325174] ? __f_unlock_pos+0x19/0x20 [ 697.329177] ? lock_downgrade+0x900/0x900 [ 697.333357] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.338899] ? proc_fail_nth_write+0x9e/0x210 [ 697.343402] ? proc_cwd_link+0x1d0/0x1d0 [ 697.347472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.353018] ? iov_iter_init+0xc2/0x1e0 [ 697.357005] __vfs_write+0x6b8/0x9f0 [ 697.360732] ? kernel_read+0x120/0x120 [ 697.364630] ? lock_release+0x970/0x970 [ 697.368616] ? arch_local_save_flags+0x40/0x40 [ 697.373228] ? check_preemption_disabled+0x48/0x200 [ 697.378259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.383804] ? check_preemption_disabled+0x48/0x200 [ 697.388834] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.394380] ? __sb_start_write+0x1b2/0x370 [ 697.398711] vfs_write+0x1fc/0x560 [ 697.402272] ksys_write+0x101/0x260 [ 697.405906] ? __ia32_sys_read+0xb0/0xb0 [ 697.409980] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 697.415443] __x64_sys_write+0x73/0xb0 [ 697.419345] do_syscall_64+0x1b9/0x820 [ 697.423248] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 697.428624] ? syscall_return_slowpath+0x5e0/0x5e0 [ 697.433560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 697.438413] ? trace_hardirqs_on_caller+0x310/0x310 [ 697.443440] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 697.448463] ? prepare_exit_to_usermode+0x291/0x3b0 [ 697.453494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 697.458349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.463543] RIP: 0033:0x457579 [ 697.466740] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.485646] RSP: 002b:00007f19d53c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 697.493360] RAX: ffffffffffffffda RBX: 00007f19d53c1c90 RCX: 0000000000457579 [ 697.500634] RDX: 0000000000000086 RSI: 0000000020000280 RDI: 0000000000000003 [ 697.507908] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 05:22:30 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x80000) getsockopt$inet_int(r1, 0x0, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:30 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) 05:22:30 executing program 3 (fault-call:1 fault-nth:3): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 697.515178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f19d53c26d4 [ 697.522465] R13: 00000000004c5688 R14: 00000000004d9000 R15: 0000000000000004 05:22:30 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x3, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:30 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8000000000000]}}, 0x20) 05:22:30 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vhci\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000a80)={0x45b, 0x6, 0x4, 0x7fff, 0x7, 0x6, 0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000b00)={0x91, 0x820c, 0x1, 0x6, r2}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xa}, 0x0) sendmsg$rds(r0, &(0x7f0000000a00)={&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000040)=""/28, 0x1c}, {&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f00000001c0)=""/181, 0xb5}, {&(0x7f0000000440)=""/135, 0x87}, {&(0x7f0000000500)=""/118, 0x76}, {&(0x7f0000000580)=""/137, 0x89}], 0x6, &(0x7f0000000880)=[@mask_fadd={0x58, 0x114, 0x8, {{0x2, 0x9}, &(0x7f0000000140)=0xff, &(0x7f00000006c0)=0xffff, 0x5, 0x5, 0x6a8, 0x3, 0x4, 0xfffffffffffffff8}}, @cswp={0x58, 0x114, 0x7, {{0x8, 0x2991}, &(0x7f0000000700)=0xeead, &(0x7f0000000740)=0x4, 0x1, 0x6, 0x6, 0x9, 0x0, 0x8}}, @mask_cswp={0x58, 0x114, 0x9, {{0x409c, 0x7}, &(0x7f0000000780)=0x4, &(0x7f00000007c0)=0x8, 0xfffffffffffffff8, 0x4, 0x9, 0x7ff, 0x23, 0x5c1}}, @mask_fadd={0x58, 0x114, 0x8, {{0x9, 0xfb3}, &(0x7f0000000800)=0x40, &(0x7f0000000840)=0x5, 0x1, 0x2, 0xd7d, 0x6, 0x24, 0x4}}], 0x160, 0x84}, 0x40040d4) [ 697.627590] FAULT_INJECTION: forcing a failure. [ 697.627590] name failslab, interval 1, probability 0, space 0, times 0 [ 697.638910] CPU: 0 PID: 14875 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #48 [ 697.646210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.646223] Call Trace: [ 697.646249] dump_stack+0x1c4/0x2b4 [ 697.646272] ? dump_stack_print_info.cold.2+0x52/0x52 [ 697.646295] ? lock_release+0x970/0x970 [ 697.646322] should_fail.cold.4+0xa/0x17 05:22:31 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 697.646344] ? start_stop_khugepaged.cold.47+0x49/0x49 [ 697.646364] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 697.646380] ? mark_held_locks+0x130/0x130 [ 697.646402] ? percpu_ref_put_many+0x13e/0x260 [ 697.694561] ? mark_held_locks+0x130/0x130 [ 697.698807] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 697.698829] ? is_bpf_text_address+0xac/0x170 [ 697.698845] ? lock_downgrade+0x900/0x900 [ 697.698866] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 697.698890] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 697.712270] ? rcu_bh_qs+0xc0/0xc0 05:22:31 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000001c0)) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000340)={r2, r1, 0x7, 0xb68, &(0x7f0000000280)="289895558493430f8c93f9f52d1867e276e359b5c764b47aa3e673bee382328a7ca4ce3939996d4b14e51cd875fab0019f63f0ee0b16751b223f349ff62230c3d204ff7a8631e6cb521cf1dd813cc9e50559ea2d04189169de5aa9fd1b3bee57933fe559b387f51533021d2ff9539ce89eac2085d6fe9487c16b1bdf4d14ee058e86c84d5c466a5ed1f38be744541de2064e42ed65181d4b", 0x9, 0x2, 0x6, 0x7, 0x764, 0x1, 0x800, "4dcc9e8d803790bc91f6658853a4ec0685180ffecbde71989494b7f91aaddf923df9c93c06fc747a62c5cbfd30b4159edfb885bfbec5939508b6e91c56830a9bf3b2ea30b48288a590d093edc6960772e5ec92775ff27b6bd56ed19f3704ded3539849729b215c19611f978ba25c632b1705edefcfad0d4e63a887954524281c15589c2cda9c9cc234a734eb790f00abab40ae5c5c419caec15f"}) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000100)) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f0000000200), &(0x7f0000000040)=0x68) flock(r2, 0xb) [ 697.712285] ? unwind_dump+0x190/0x190 [ 697.712313] ? is_bpf_text_address+0xd3/0x170 [ 697.736049] __should_failslab+0x124/0x180 [ 697.740289] should_failslab+0x9/0x14 [ 697.740307] kmem_cache_alloc+0x47/0x730 [ 697.740326] ? __es_tree_search.isra.12+0x1ba/0x220 [ 697.740345] __es_insert_extent+0x30c/0x1120 [ 697.753234] ? ext4_es_free_extent+0x790/0x790 [ 697.753251] ? lock_release+0x970/0x970 [ 697.753273] ? __generic_file_write_iter+0x26e/0x630 [ 697.771334] ? ext4_file_write_iter+0x390/0x1420 05:22:31 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x242000, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0xffffff3e, &(0x7f00000001c0)={@link_local, @broadcast, [{[], {0x8100, 0x101, 0x7ff, 0xffffffffffffffff}}], {@ipv6={0x86dd, {0x0, 0x6, "f1414b", 0x18, 0x0, 0x0, @local, @ipv4={[], [], @multicast1}, {[@hopopts={0x0, 0x1, [], [@generic={0x1ff}, @jumbo]}], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000140)={0x8be, 0x0, {0xffffffffffffffff, 0x1, 0x9, 0x1, 0x1000}}) bind$rds(r0, &(0x7f0000000100)={0x2, 0x40000004e1e, @dev={0xac, 0x14, 0x14, 0x1a}}, 0xfffffffffffffe51) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 697.771352] ? ksys_write+0x101/0x260 [ 697.771366] ? __x64_sys_write+0x73/0xb0 [ 697.771386] ? do_syscall_64+0x1b9/0x820 [ 697.779949] ? kasan_check_write+0x14/0x20 [ 697.779979] ? do_raw_write_lock+0xbd/0x1b0 [ 697.779999] ext4_es_insert_extent+0x316/0x810 [ 697.792334] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 697.792352] ? ___might_sleep+0x1ed/0x300 [ 697.792372] ? trace_hardirqs_on+0xbd/0x310 [ 697.807047] ? kernel_text_address+0x79/0xf0 [ 697.807062] ? ext4_find_extent+0x757/0x9b0 [ 697.807079] ? kasan_unpoison_shadow+0x35/0x50 [ 697.807093] ? kasan_kmalloc+0xc7/0xe0 [ 697.807115] ext4_ext_put_gap_in_cache+0x158/0x1f0 [ 697.807130] ? ext4_zeroout_es+0x160/0x160 [ 697.807147] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 697.807166] ? alloc_page_buffers+0x1cd/0x6b0 [ 697.832809] ? ext4_block_write_begin+0x11ed/0x1870 [ 697.847494] ext4_ext_map_blocks+0x256a/0x6330 [ 697.847511] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.847533] ? lock_release+0x970/0x970 [ 697.847550] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 697.847577] ? lock_downgrade+0x900/0x900 [ 697.847592] ? lock_release+0x970/0x970 [ 697.847623] ? percpu_ref_put_many+0x13e/0x260 [ 697.888755] ? trace_hardirqs_on+0xbd/0x310 [ 697.893089] ? mem_cgroup_charge_statistics+0x780/0x780 [ 697.898468] ? ext4_es_lookup_extent+0x446/0xde0 [ 697.903236] ? lock_downgrade+0x900/0x900 [ 697.903254] ? lock_release+0x970/0x970 [ 697.903273] ? lock_downgrade+0x900/0x900 [ 697.915523] ? lock_acquire+0x1ed/0x520 [ 697.919506] ? ext4_map_blocks+0x487/0x1b50 [ 697.923842] ? lock_release+0x970/0x970 [ 697.927827] ? arch_local_save_flags+0x40/0x40 [ 697.932422] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.932440] ? ext4_es_lookup_extent+0x499/0xde0 [ 697.932466] ? down_read+0xb0/0x1d0 [ 697.932485] ? ext4_map_blocks+0x487/0x1b50 [ 697.950696] ? __down_interruptible+0x700/0x700 [ 697.955379] ? _raw_spin_unlock+0x2c/0x50 [ 697.955395] ? create_empty_buffers+0x928/0xdb0 [ 697.955419] ext4_map_blocks+0xe35/0x1b50 [ 697.955440] ? ext4_issue_zeroout+0x190/0x190 [ 697.972884] ? jbd2_journal_free_reserved+0x110/0x110 [ 697.972902] ? __page_cache_alloc+0x191/0x5b0 [ 697.972924] ? ___might_sleep+0x1ed/0x300 [ 697.986744] _ext4_get_block+0x226/0x6d0 [ 697.990824] ? ext4_map_blocks+0x1b50/0x1b50 [ 697.995245] ? ___might_sleep+0x1ed/0x300 [ 697.995267] ext4_get_block_unwritten+0x2a/0x40 [ 697.995283] ext4_block_write_begin+0x6f9/0x1870 [ 697.995302] ? ext4_block_zero_page_range+0x1a50/0x1a50 [ 698.008864] ? __check_block_validity.constprop.80+0x210/0x210 [ 698.008885] ? arch_local_save_flags+0x40/0x40 [ 698.024830] ? wb_io_lists_depopulated+0x133/0x390 [ 698.029772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.035325] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.040873] ? wait_for_stable_page+0x1a5/0x570 [ 698.045553] ? ___might_sleep+0x1ed/0x300 [ 698.049714] ? set_page_dirty_lock+0x190/0x190 [ 698.054311] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.054327] ? ext4_meta_trans_blocks+0x25f/0x310 [ 698.054346] ? __might_sleep+0x95/0x190 [ 698.054365] ext4_write_begin+0x6bb/0x1830 [ 698.064775] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 698.064795] ? ext4_truncate+0x1650/0x1650 [ 698.064817] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 698.088123] ? __mark_inode_dirty+0x4b2/0x1510 [ 698.092723] ? __inode_attach_wb+0x13f0/0x13f0 [ 698.097324] ? ext4_xattr_inode_set_class+0x60/0x60 [ 698.102360] ? current_time+0x72/0x1b0 [ 698.106457] ? lock_downgrade+0x900/0x900 [ 698.111573] ? trace_hardirqs_on+0xbd/0x310 [ 698.116680] ? current_time+0x72/0x1b0 [ 698.121103] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 698.127083] ? ext4_xattr_ibody_get+0x630/0x630 [ 698.131760] ? iov_iter_fault_in_readable+0x22a/0x450 [ 698.136960] ? copy_page_from_iter+0x8e0/0x8e0 [ 698.141554] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 698.146578] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 698.151780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.157328] ? timespec64_trunc+0xea/0x180 [ 698.161570] ? inode_init_owner+0x340/0x340 [ 698.165910] generic_perform_write+0x3aa/0x6a0 [ 698.170513] ? page_endio+0xb60/0xb60 [ 698.174321] ? file_update_time+0xe4/0x640 [ 698.178565] ? current_time+0x1b0/0x1b0 [ 698.182550] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 698.187579] ? generic_write_checks+0x382/0x5d0 [ 698.192262] ? wait_on_page_locked_killable+0x520/0x520 [ 698.192280] ? ext4_file_write_iter+0x2a1/0x1420 [ 698.192301] __generic_file_write_iter+0x26e/0x630 [ 698.202424] ext4_file_write_iter+0x390/0x1420 [ 698.202447] ? ext4_file_mmap+0x410/0x410 [ 698.202468] ? ksys_dup3+0x680/0x680 [ 698.219809] ? __f_unlock_pos+0x19/0x20 [ 698.224142] ? lock_downgrade+0x900/0x900 [ 698.228739] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 698.234287] ? proc_fail_nth_write+0x9e/0x210 [ 698.238797] ? proc_cwd_link+0x1d0/0x1d0 [ 698.242883] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 698.248430] ? iov_iter_init+0xc2/0x1e0 [ 698.252418] __vfs_write+0x6b8/0x9f0 [ 698.256144] ? kernel_read+0x120/0x120 [ 698.260043] ? lock_release+0x970/0x970 [ 698.264021] ? arch_local_save_flags+0x40/0x40 [ 698.268614] ? check_preemption_disabled+0x48/0x200 [ 698.273644] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.279200] ? check_preemption_disabled+0x48/0x200 [ 698.284245] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.289791] ? __sb_start_write+0x1b2/0x370 [ 698.294126] vfs_write+0x1fc/0x560 [ 698.297678] ksys_write+0x101/0x260 [ 698.301318] ? __ia32_sys_read+0xb0/0xb0 [ 698.305387] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 698.310850] __x64_sys_write+0x73/0xb0 [ 698.315011] do_syscall_64+0x1b9/0x820 [ 698.319166] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 698.324549] ? syscall_return_slowpath+0x5e0/0x5e0 [ 698.329488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 698.334337] ? trace_hardirqs_on_caller+0x310/0x310 [ 698.339359] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 698.344383] ? prepare_exit_to_usermode+0x291/0x3b0 [ 698.349408] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 698.354269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.359460] RIP: 0033:0x457579 05:22:31 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0xffffffffffffffff, 0xee01]) fchown(r0, 0x0, r2) 05:22:31 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = dup3(r0, r0, 0x80000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)=0x7ff, 0x4) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}, {&(0x7f0000000480)="2faa08d90af15d1707488947b7ff7dd8b47995e860aa6368f51abf9859140f0486f9f3a89ae3706b0f09bb37ae8e09d75b4c1d2eac1a11ca84622e341d49d0f9a787d67b3f9442fae72c01700f3472b1cddd39857a9179f8f852b6d33640cce4755ddf9605c5e3427d27a41c804ef899093b651dfef6b841a711658e9f79dd578f3aeda2997eae483568da69672db1b3def30a4a13fdf40cfe5b1746044ec2f400e4830019445b6e9b73601f92d194ac", 0xb0, 0x1}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:31 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0x1, 0xa, 0x1000}) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 698.362661] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 698.381572] RSP: 002b:00007f19d53c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 698.389287] RAX: ffffffffffffffda RBX: 00007f19d53c1c90 RCX: 0000000000457579 [ 698.396563] RDX: 0000000000000086 RSI: 0000000020000280 RDI: 0000000000000003 [ 698.403836] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 698.412146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f19d53c26d4 [ 698.420716] R13: 00000000004c5688 R14: 00000000004d9000 R15: 0000000000000004 05:22:31 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}]}) 05:22:31 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x400, 0x0) bind$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x2, 0x7, 0x2, 0x3, "63355b1bbe90518269519dae586efb0298d302f1f7e836e6a5609a265a094b546f6c0d77b98af1c8def827a6fba0299b76f7f19f634b707d2899bd8b5a2d73", 0x12}, 0x60) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x81, 0x2800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='vboxnet1\x00', r2}, 0x10) 05:22:31 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:31 executing program 3 (fault-call:1 fault-nth:4): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:31 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xe0000000000000]}}, 0x20) [ 698.484077] EXT4-fs: 10 callbacks suppressed [ 698.484087] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acce8d68bef6bf7000a86c1f0c698dad6d8ff7129d195d4b4b247826c38bc39fdd990f85a542caad4624f73fd6aa6312484505d7e49f2919ecb03a48fd7bebdfcee1395790c2d780af2535b4f72608ff3af0c6bec26bb19b82cc40be1cd79", 0xba, 0x9f24}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:31 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(0xffffffffffffffff, 0x0, r1) [ 698.536405] FAULT_INJECTION: forcing a failure. [ 698.536405] name failslab, interval 1, probability 0, space 0, times 0 [ 698.554185] CPU: 0 PID: 14912 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #48 [ 698.561482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.571801] Call Trace: [ 698.575018] dump_stack+0x1c4/0x2b4 [ 698.579019] ? dump_stack_print_info.cold.2+0x52/0x52 [ 698.584241] ? kasan_check_read+0x11/0x20 [ 698.588404] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 698.593695] should_fail.cold.4+0xa/0x17 [ 698.597774] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 698.602889] ? kernel_text_address+0x79/0xf0 [ 698.607753] ? __kernel_text_address+0xd/0x40 [ 698.612266] ? __save_stack_trace+0x8d/0xf0 [ 698.616604] ? save_stack+0xa9/0xd0 [ 698.620241] ? save_stack+0x43/0xd0 [ 698.623873] ? __kasan_slab_free+0x102/0x150 [ 698.628286] ? kasan_slab_free+0xe/0x10 [ 698.632271] ? kfree+0xcf/0x230 05:22:31 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, 0x0) [ 698.635559] ? ext4_ext_map_blocks+0xe26/0x6330 [ 698.640239] ? ext4_map_blocks+0xe35/0x1b50 [ 698.644566] ? _ext4_get_block+0x226/0x6d0 [ 698.648808] ? ext4_get_block_unwritten+0x2a/0x40 [ 698.653832] ? ext4_block_write_begin+0x6f9/0x1870 [ 698.653846] ? ext4_write_begin+0x6bb/0x1830 [ 698.653867] ? generic_perform_write+0x3aa/0x6a0 [ 698.668023] ? __generic_file_write_iter+0x26e/0x630 [ 698.668041] ? __vfs_write+0x6b8/0x9f0 [ 698.668054] ? vfs_write+0x1fc/0x560 [ 698.668067] ? ksys_write+0x101/0x260 05:22:32 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, 0x0) [ 698.668081] ? __x64_sys_write+0x73/0xb0 [ 698.668095] ? do_syscall_64+0x1b9/0x820 [ 698.668110] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.668131] ? ___might_sleep+0x1ed/0x300 [ 698.702199] ? trace_hardirqs_on+0x310/0x310 [ 698.706798] ? arch_local_save_flags+0x40/0x40 [ 698.712165] ? kasan_check_write+0x14/0x20 [ 698.716442] __should_failslab+0x124/0x180 [ 698.720681] should_failslab+0x9/0x14 [ 698.724490] __kmalloc+0x2d4/0x760 [ 698.728036] ? trace_hardirqs_on+0xbd/0x310 [ 698.732368] ? ext4_ext_map_blocks+0xe26/0x6330 05:22:32 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x40) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000001c0)={0x9, 0x3, 'client0\x00', 0xffffffff80000006, "55a9ea2f90267624", "699ec01df2cebbc8396d1d9a9ec3702370d7d9eeeb4fd35cadc39bcf2e7cc7d7", 0xfffffffffffffff8, 0x6}) r1 = socket$rds(0x15, 0x5, 0x0) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r2) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[], 0xfddc, 0x20000000}, 0xfffffffffffffffe) [ 698.737038] ? ext4_find_extent+0x757/0x9b0 [ 698.737054] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 698.737078] ext4_find_extent+0x757/0x9b0 [ 698.750974] ? ext4_ext_map_blocks+0xe26/0x6330 [ 698.755660] ext4_ext_map_blocks+0x2ad/0x6330 [ 698.760346] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.760375] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 698.770749] ? lock_downgrade+0x900/0x900 [ 698.770773] ? lock_release+0x970/0x970 [ 698.778891] ? percpu_ref_put_many+0x13e/0x260 [ 698.783479] ? trace_hardirqs_on+0xbd/0x310 05:22:32 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20a001, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(0xffffffffffffffff, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/21) [ 698.787804] ? mem_cgroup_charge_statistics+0x780/0x780 [ 698.793177] ? ext4_es_lookup_extent+0x446/0xde0 [ 698.798124] ? lock_downgrade+0x900/0x900 [ 698.802280] ? lock_release+0x970/0x970 [ 698.806257] ? lock_downgrade+0x900/0x900 [ 698.810417] ? lock_acquire+0x1ed/0x520 [ 698.814395] ? ext4_map_blocks+0x487/0x1b50 [ 698.818742] ? lock_acquire+0x1ed/0x520 [ 698.822720] ? ext4_map_blocks+0x88f/0x1b50 [ 698.827054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 698.832596] ? lock_release+0x970/0x970 05:22:32 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, 0x0) [ 698.836574] ? arch_local_save_flags+0x40/0x40 [ 698.836590] ? ext4_map_blocks+0x66e/0x1b50 [ 698.836605] ? lock_downgrade+0x900/0x900 [ 698.836630] ? down_write+0x8a/0x130 [ 698.836648] ? ext4_map_blocks+0x88f/0x1b50 [ 698.845552] ? down_read+0x1d0/0x1d0 [ 698.845575] ext4_map_blocks+0x8f7/0x1b50 [ 698.865581] ? ext4_issue_zeroout+0x190/0x190 [ 698.870090] ? jbd2_journal_free_reserved+0x110/0x110 [ 698.870111] ? __page_cache_alloc+0x191/0x5b0 [ 698.879784] ? ___might_sleep+0x1ed/0x300 [ 698.883946] _ext4_get_block+0x226/0x6d0 [ 698.888017] ? ext4_map_blocks+0x1b50/0x1b50 [ 698.892436] ? ___might_sleep+0x1ed/0x300 [ 698.896595] ext4_get_block_unwritten+0x2a/0x40 [ 698.901273] ext4_block_write_begin+0x6f9/0x1870 [ 698.906039] ? ext4_block_zero_page_range+0x1a50/0x1a50 [ 698.911420] ? __check_block_validity.constprop.80+0x210/0x210 [ 698.917406] ? arch_local_save_flags+0x40/0x40 [ 698.922005] ? wb_io_lists_depopulated+0x133/0x390 [ 698.926949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.932847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.938394] ? wait_for_stable_page+0x1a5/0x570 [ 698.943071] ? ___might_sleep+0x1ed/0x300 [ 698.947237] ? set_page_dirty_lock+0x190/0x190 [ 698.951828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.957383] ? ext4_meta_trans_blocks+0x25f/0x310 [ 698.962244] ? __might_sleep+0x95/0x190 [ 698.966231] ext4_write_begin+0x6bb/0x1830 [ 698.970484] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 698.975073] ? ext4_truncate+0x1650/0x1650 [ 698.979332] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 698.985662] ? __mark_inode_dirty+0x4b2/0x1510 [ 698.991038] ? __inode_attach_wb+0x13f0/0x13f0 [ 698.996588] ? ext4_xattr_inode_set_class+0x60/0x60 [ 699.001660] ? current_time+0x72/0x1b0 [ 699.005559] ? lock_downgrade+0x900/0x900 [ 699.009717] ? trace_hardirqs_on+0xbd/0x310 [ 699.014048] ? current_time+0x72/0x1b0 [ 699.017955] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 699.023417] ? ext4_xattr_ibody_get+0x630/0x630 [ 699.028129] ? iov_iter_fault_in_readable+0x22a/0x450 [ 699.033330] ? copy_page_from_iter+0x8e0/0x8e0 [ 699.037919] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 699.042944] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 699.048150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.054477] ? timespec64_trunc+0xea/0x180 [ 699.058717] ? inode_init_owner+0x340/0x340 [ 699.063059] generic_perform_write+0x3aa/0x6a0 [ 699.067657] ? page_endio+0xb60/0xb60 [ 699.071467] ? file_update_time+0xe4/0x640 [ 699.075708] ? current_time+0x1b0/0x1b0 [ 699.079694] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 699.084720] ? generic_write_checks+0x382/0x5d0 [ 699.089398] ? wait_on_page_locked_killable+0x520/0x520 [ 699.094768] ? ext4_file_write_iter+0x2a1/0x1420 [ 699.099540] __generic_file_write_iter+0x26e/0x630 [ 699.099567] ext4_file_write_iter+0x390/0x1420 [ 699.110032] ? ext4_file_mmap+0x410/0x410 [ 699.110053] ? ksys_dup3+0x680/0x680 [ 699.110072] ? __f_unlock_pos+0x19/0x20 [ 699.110092] ? lock_downgrade+0x900/0x900 [ 699.126132] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 699.131678] ? proc_fail_nth_write+0x9e/0x210 [ 699.136182] ? proc_cwd_link+0x1d0/0x1d0 [ 699.140261] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 699.145804] ? iov_iter_init+0xc2/0x1e0 [ 699.149790] __vfs_write+0x6b8/0x9f0 [ 699.153512] ? kernel_read+0x120/0x120 [ 699.157411] ? lock_release+0x970/0x970 [ 699.161393] ? arch_local_save_flags+0x40/0x40 [ 699.165982] ? check_preemption_disabled+0x48/0x200 [ 699.171014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.176560] ? check_preemption_disabled+0x48/0x200 [ 699.181589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.187144] ? __sb_start_write+0x1b2/0x370 [ 699.191472] vfs_write+0x1fc/0x560 [ 699.195022] ksys_write+0x101/0x260 [ 699.198682] ? __ia32_sys_read+0xb0/0xb0 [ 699.202781] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 699.208249] __x64_sys_write+0x73/0xb0 [ 699.212150] do_syscall_64+0x1b9/0x820 [ 699.216044] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.221416] ? syscall_return_slowpath+0x5e0/0x5e0 [ 699.226353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.231206] ? trace_hardirqs_on_caller+0x310/0x310 [ 699.236246] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 699.241275] ? prepare_exit_to_usermode+0x291/0x3b0 [ 699.246306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 699.251163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.256353] RIP: 0033:0x457579 [ 699.259578] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.279695] RSP: 002b:00007f19d53c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 699.287415] RAX: ffffffffffffffda RBX: 00007f19d53c1c90 RCX: 0000000000457579 [ 699.294684] RDX: 0000000000000086 RSI: 0000000020000280 RDI: 0000000000000003 [ 699.301964] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 699.309255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f19d53c26d4 [ 699.316526] R13: 00000000004c5688 R14: 00000000004d9000 R15: 0000000000000004 [ 699.373495] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 699.380975] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:32 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}]}) 05:22:32 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='attr/keycreate\x00') connect$bt_sco(r0, &(0x7f0000000400)={0x1f, {0x9, 0x1, 0xb, 0x40, 0x81, 0x40}}, 0x8) write$UHID_INPUT2(r0, &(0x7f0000000380)={0xc, 0x40, "7a90e64e28ed0a0026af6d908e0aab75f105ff6290569f7f880c380f97784427985ed4edb8b414346ce499781a47c5921d9f40d8712b9bcb2c7af4869058f6c9"}, 0x46) r1 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x180000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x58, r3, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x51eb}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x84}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000100)=""/190, &(0x7f0000000000)=0xbe) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000440)=0x800) 05:22:32 executing program 5 (fault-call:4 fault-nth:0): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:32 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x20) 05:22:32 executing program 3 (fault-call:1 fault-nth:5): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 699.546021] FAULT_INJECTION: forcing a failure. [ 699.546021] name failslab, interval 1, probability 0, space 0, times 0 [ 699.547524] FAULT_INJECTION: forcing a failure. [ 699.547524] name failslab, interval 1, probability 0, space 0, times 0 [ 699.562282] CPU: 0 PID: 14944 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #48 [ 699.575766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.585120] Call Trace: [ 699.587715] dump_stack+0x1c4/0x2b4 [ 699.591352] ? dump_stack_print_info.cold.2+0x52/0x52 [ 699.596548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 699.602090] ? __mark_inode_dirty+0xfc4/0x1510 [ 699.606685] should_fail.cold.4+0xa/0x17 [ 699.610758] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 699.615866] ? do_raw_spin_unlock+0xa7/0x2f0 [ 699.620279] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 699.624870] ? do_raw_spin_lock+0xc1/0x200 [ 699.629112] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 699.634653] ? __mark_inode_dirty+0x4b2/0x1510 [ 699.639246] ? __inode_attach_wb+0x13f0/0x13f0 [ 699.643831] ? kasan_check_read+0x11/0x20 [ 699.647983] ? do_raw_spin_unlock+0xa7/0x2f0 [ 699.652829] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 699.657420] ? kasan_check_write+0x14/0x20 [ 699.661661] ? do_raw_spin_lock+0xc1/0x200 [ 699.665904] ? ___might_sleep+0x1ed/0x300 [ 699.670053] ? inode_add_bytes+0xd3/0xf0 [ 699.674120] ? arch_local_save_flags+0x40/0x40 [ 699.678709] ? __dquot_alloc_space+0x4b9/0x8c0 [ 699.683297] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 699.688321] __should_failslab+0x124/0x180 [ 699.692566] should_failslab+0x9/0x14 [ 699.696370] kmem_cache_alloc+0x2be/0x730 [ 699.700531] ext4_mb_new_blocks+0x787/0x4840 [ 699.704954] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 699.709997] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 699.714771] ? ext4_discard_preallocations+0x13c0/0x13c0 [ 699.720250] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 699.726057] ? kasan_check_read+0x11/0x20 [ 699.730231] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 699.735517] ? rcu_bh_qs+0xc0/0xc0 [ 699.739066] ? unwind_dump+0x190/0x190 [ 699.742969] ? is_bpf_text_address+0xd3/0x170 [ 699.747470] ? kernel_text_address+0x79/0xf0 [ 699.751882] ? __kernel_text_address+0xd/0x40 [ 699.756379] ? unwind_get_return_address+0x61/0xa0 [ 699.761496] ? __save_stack_trace+0x8d/0xf0 [ 699.765832] ? save_stack+0xa9/0xd0 [ 699.769463] ? save_stack+0x43/0xd0 [ 699.773096] ? kasan_kmalloc+0xc7/0xe0 [ 699.776987] ? __kmalloc+0x14e/0x760 [ 699.780705] ? ext4_find_extent+0x757/0x9b0 [ 699.785028] ? ext4_ext_map_blocks+0x2ad/0x6330 [ 699.789703] ? ext4_map_blocks+0x8f7/0x1b50 [ 699.794027] ? _ext4_get_block+0x226/0x6d0 [ 699.798262] ? ext4_get_block_unwritten+0x2a/0x40 [ 699.803110] ? ext4_block_write_begin+0x6f9/0x1870 [ 699.808041] ? ext4_write_begin+0x6bb/0x1830 [ 699.812454] ? generic_perform_write+0x3aa/0x6a0 [ 699.817232] ? __generic_file_write_iter+0x26e/0x630 [ 699.822344] ? ext4_file_write_iter+0x390/0x1420 [ 699.827108] ? __vfs_write+0x6b8/0x9f0 [ 699.831003] ? vfs_write+0x1fc/0x560 [ 699.834721] ? ksys_write+0x101/0x260 [ 699.838528] ? __x64_sys_write+0x73/0xb0 [ 699.842595] ? do_syscall_64+0x1b9/0x820 [ 699.846658] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.852381] ? save_stack+0xa9/0xd0 [ 699.856009] ? save_stack+0x43/0xd0 [ 699.859636] ? __kasan_slab_free+0x102/0x150 [ 699.864047] ? kasan_slab_free+0xe/0x10 [ 699.868023] ? kfree+0xcf/0x230 [ 699.871310] ? ext4_ext_map_blocks+0xe26/0x6330 [ 699.875977] ? ext4_map_blocks+0xe35/0x1b50 [ 699.880298] ? _ext4_get_block+0x226/0x6d0 [ 699.884536] ? ext4_get_block_unwritten+0x2a/0x40 [ 699.889383] ? ext4_block_write_begin+0x6f9/0x1870 [ 699.894320] ? ext4_write_begin+0x6bb/0x1830 [ 699.898734] ? generic_perform_write+0x3aa/0x6a0 [ 699.903494] ? __generic_file_write_iter+0x26e/0x630 [ 699.908599] ? ext4_file_write_iter+0x390/0x1420 [ 699.913360] ? __vfs_write+0x6b8/0x9f0 [ 699.917249] ? vfs_write+0x1fc/0x560 [ 699.920962] ? ksys_write+0x101/0x260 [ 699.924768] ? __x64_sys_write+0x73/0xb0 [ 699.928837] ? do_syscall_64+0x1b9/0x820 [ 699.933160] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.938551] ? ___might_sleep+0x1ed/0x300 [ 699.942877] ? trace_hardirqs_on+0x310/0x310 [ 699.947292] ? trace_hardirqs_on+0xbd/0x310 [ 699.951792] ? kasan_check_write+0x14/0x20 [ 699.956034] ? ext4_find_extent+0x757/0x9b0 [ 699.960368] ? kasan_unpoison_shadow+0x35/0x50 [ 699.964959] ? kasan_kmalloc+0xc7/0xe0 [ 699.968860] ? __kmalloc+0x31c/0x760 [ 699.972579] ? trace_hardirqs_on+0xbd/0x310 [ 699.976907] ? ext4_ext_map_blocks+0xe26/0x6330 [ 699.981929] ? ext4_find_extent+0x757/0x9b0 [ 699.986259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.991803] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 699.996831] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 700.001858] ext4_ext_map_blocks+0x2f14/0x6330 [ 700.006447] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.011824] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 700.016844] ? lock_downgrade+0x900/0x900 [ 700.020995] ? lock_release+0x970/0x970 [ 700.025155] ? percpu_ref_put_many+0x13e/0x260 [ 700.030032] ? mem_cgroup_charge_statistics+0x780/0x780 [ 700.035402] ? ext4_es_lookup_extent+0x446/0xde0 [ 700.040164] ? lock_downgrade+0x900/0x900 [ 700.044328] ? lock_downgrade+0x900/0x900 [ 700.048485] ? lock_acquire+0x1ed/0x520 [ 700.052476] ? ext4_map_blocks+0x487/0x1b50 [ 700.056802] ? lock_acquire+0x1ed/0x520 [ 700.060782] ? ext4_map_blocks+0x88f/0x1b50 [ 700.065113] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 700.071613] ? lock_release+0x970/0x970 [ 700.075594] ? arch_local_save_flags+0x40/0x40 [ 700.080182] ? ext4_map_blocks+0x66e/0x1b50 [ 700.084531] ? lock_downgrade+0x900/0x900 [ 700.088696] ? down_write+0x8a/0x130 [ 700.092418] ? ext4_map_blocks+0x88f/0x1b50 [ 700.096742] ? down_read+0x1d0/0x1d0 [ 700.100470] ext4_map_blocks+0x8f7/0x1b50 [ 700.104633] ? ext4_issue_zeroout+0x190/0x190 [ 700.109143] ? jbd2_journal_free_reserved+0x110/0x110 [ 700.114432] ? __page_cache_alloc+0x191/0x5b0 [ 700.118936] ? ___might_sleep+0x1ed/0x300 [ 700.123087] _ext4_get_block+0x226/0x6d0 [ 700.127159] ? ext4_map_blocks+0x1b50/0x1b50 [ 700.131587] ? ___might_sleep+0x1ed/0x300 [ 700.135747] ext4_get_block_unwritten+0x2a/0x40 [ 700.140426] ext4_block_write_begin+0x6f9/0x1870 [ 700.145206] ? ext4_block_zero_page_range+0x1a50/0x1a50 [ 700.151725] ? __check_block_validity.constprop.80+0x210/0x210 [ 700.157877] ? arch_local_save_flags+0x40/0x40 [ 700.162480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.168026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.173665] ? wait_for_stable_page+0x1a5/0x570 [ 700.178833] ? ___might_sleep+0x1ed/0x300 [ 700.183173] ? set_page_dirty_lock+0x190/0x190 [ 700.187773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.193666] ? ext4_meta_trans_blocks+0x25f/0x310 [ 700.198514] ? __might_sleep+0x95/0x190 [ 700.202499] ext4_write_begin+0x6bb/0x1830 [ 700.206755] ? ext4_truncate+0x1650/0x1650 [ 700.210998] ? ext4_xattr_get+0x1a8/0xb30 [ 700.215151] ? lock_downgrade+0x900/0x900 [ 700.219319] ? ext4_xattr_ibody_get+0x107/0x630 [ 700.224003] ? ext4_xattr_inode_set_class+0x60/0x60 [ 700.229037] ? current_time+0x72/0x1b0 [ 700.232933] ? lock_downgrade+0x900/0x900 [ 700.237094] ? trace_hardirqs_on+0xbd/0x310 [ 700.241857] ? current_time+0x72/0x1b0 [ 700.246622] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 700.252949] ? ext4_xattr_ibody_get+0x630/0x630 [ 700.257981] ? iov_iter_fault_in_readable+0x22a/0x450 [ 700.263178] ? copy_page_from_iter+0x8e0/0x8e0 [ 700.267777] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 700.273149] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 700.279244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.284796] ? timespec64_trunc+0xea/0x180 [ 700.289226] ? inode_init_owner+0x340/0x340 [ 700.293567] generic_perform_write+0x3aa/0x6a0 [ 700.298169] ? page_endio+0xb60/0xb60 [ 700.301981] ? file_update_time+0xe4/0x640 [ 700.306234] ? current_time+0x1b0/0x1b0 [ 700.310235] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 700.315519] ? generic_write_checks+0x382/0x5d0 [ 700.320206] ? wait_on_page_locked_killable+0x520/0x520 [ 700.325586] ? ext4_file_write_iter+0x2a1/0x1420 [ 700.330352] __generic_file_write_iter+0x26e/0x630 [ 700.335298] ext4_file_write_iter+0x390/0x1420 [ 700.339892] ? ext4_file_mmap+0x410/0x410 [ 700.344055] ? ksys_dup3+0x680/0x680 [ 700.347774] ? __f_unlock_pos+0x19/0x20 [ 700.351780] ? lock_downgrade+0x900/0x900 [ 700.355941] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 700.361743] ? proc_fail_nth_write+0x9e/0x210 [ 700.367738] ? proc_cwd_link+0x1d0/0x1d0 [ 700.371981] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.377529] ? iov_iter_init+0xc2/0x1e0 [ 700.381988] __vfs_write+0x6b8/0x9f0 [ 700.385716] ? kernel_read+0x120/0x120 [ 700.389610] ? lock_release+0x970/0x970 [ 700.393593] ? arch_local_save_flags+0x40/0x40 [ 700.398182] ? check_preemption_disabled+0x48/0x200 [ 700.403235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.409735] ? check_preemption_disabled+0x48/0x200 [ 700.414938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.420481] ? __sb_start_write+0x1b2/0x370 [ 700.424811] vfs_write+0x1fc/0x560 [ 700.428365] ksys_write+0x101/0x260 [ 700.432002] ? __ia32_sys_read+0xb0/0xb0 [ 700.436779] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 700.442683] __x64_sys_write+0x73/0xb0 [ 700.446574] do_syscall_64+0x1b9/0x820 [ 700.450466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 700.455851] ? syscall_return_slowpath+0x5e0/0x5e0 [ 700.460955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 700.465807] ? trace_hardirqs_on_caller+0x310/0x310 [ 700.470830] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 700.475852] ? prepare_exit_to_usermode+0x291/0x3b0 [ 700.480878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 700.485730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.491269] RIP: 0033:0x457579 [ 700.494472] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.513548] RSP: 002b:00007f19d53c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 700.521867] RAX: ffffffffffffffda RBX: 00007f19d53c1c90 RCX: 0000000000457579 [ 700.529136] RDX: 0000000000000086 RSI: 0000000020000280 RDI: 0000000000000003 [ 700.536405] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 700.543850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f19d53c26d4 [ 700.551117] R13: 00000000004c5688 R14: 00000000004d9000 R15: 0000000000000004 [ 700.558408] CPU: 1 PID: 14941 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #48 [ 700.565697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.575063] Call Trace: [ 700.577667] dump_stack+0x1c4/0x2b4 [ 700.581313] ? dump_stack_print_info.cold.2+0x52/0x52 [ 700.586514] ? arch_local_save_flags+0x40/0x40 [ 700.586539] should_fail.cold.4+0xa/0x17 [ 700.586558] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 700.586576] ? __getblk_gfp+0x11b/0xd50 [ 700.595212] ? mark_held_locks+0x130/0x130 [ 700.595230] ? ima_add_template_entry.cold.4+0x3c/0x3c [ 700.595252] ? __find_get_block+0xf20/0xf20 [ 700.618830] ? trace_hardirqs_on_caller+0xc0/0x310 [ 700.623780] ? mark_held_locks+0x130/0x130 [ 700.628031] ? mark_held_locks+0x130/0x130 [ 700.632278] ? mark_held_locks+0x130/0x130 [ 700.632301] ? ___might_sleep+0x1ed/0x300 [ 700.632318] ? arch_local_save_flags+0x40/0x40 [ 700.632341] __should_failslab+0x124/0x180 [ 700.640708] should_failslab+0x9/0x14 [ 700.640733] kmem_cache_alloc+0x2be/0x730 [ 700.640763] jbd2__journal_start+0x1e7/0xa90 [ 700.661929] ? arch_local_save_flags+0x40/0x40 [ 700.666527] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 700.672242] ? kasan_check_write+0x14/0x20 [ 700.676489] ? __might_sleep+0x95/0x190 [ 700.680642] ? __dquot_initialize+0x629/0xdd0 [ 700.685152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.690699] __ext4_journal_start_sb+0x1a5/0x5f0 [ 700.695653] ? ext4_setattr+0x580/0x28f0 [ 700.699731] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 700.705456] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.711003] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 700.716122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.721671] ext4_setattr+0x580/0x28f0 [ 700.725578] ? smack_privileged+0xd0/0xd0 [ 700.729743] ? current_time+0x72/0x1b0 [ 700.733647] ? ext4_journalled_write_end+0x1680/0x1680 [ 700.738935] ? smk_curacc+0x7f/0xa0 [ 700.742575] ? smack_inode_setattr+0xb3/0x270 [ 700.747078] ? smack_inode_rename+0x370/0x370 [ 700.751581] ? __vfs_getxattr+0xf6/0x150 [ 700.755657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.761665] ? evm_verify_current_integrity+0x8c/0xf0 [ 700.761691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.772398] ? evm_inode_setattr+0x6f/0x170 [ 700.772419] ? ext4_journalled_write_end+0x1680/0x1680 [ 700.772442] notify_change+0xbde/0x1110 [ 700.785987] ? setattr_prepare+0x830/0x830 [ 700.790233] ? lock_release+0x970/0x970 [ 700.794227] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.799777] chown_common+0x5e1/0x730 [ 700.803593] ? chmod_common+0x590/0x590 [ 700.807594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.813151] ? check_preemption_disabled+0x48/0x200 [ 700.818201] ? __mnt_want_write_file+0xa2/0xc0 [ 700.822798] ksys_fchown+0x117/0x170 [ 700.826520] __x64_sys_fchown+0x73/0xb0 [ 700.830505] do_syscall_64+0x1b9/0x820 [ 700.834401] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 700.839794] ? syscall_return_slowpath+0x5e0/0x5e0 [ 700.844748] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 700.849598] ? trace_hardirqs_on_caller+0x310/0x310 [ 700.854633] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 700.859940] ? prepare_exit_to_usermode+0x291/0x3b0 [ 700.864967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 700.869852] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.875044] RIP: 0033:0x457579 [ 700.878272] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.897184] RSP: 002b:00007fa151676c78 EFLAGS: 00000246 ORIG_RAX: 000000000000005d [ 700.905789] RAX: ffffffffffffffda RBX: 00007fa151676c90 RCX: 0000000000457579 [ 700.913761] RDX: 000000000000ee01 RSI: 0000000000000000 RDI: 0000000000000003 [ 700.921037] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 700.928318] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1516776d4 [ 700.935600] R13: 00000000004bdc59 R14: 00000000004cc8f8 R15: 0000000000000006 05:22:34 executing program 3 (fault-call:1 fault-nth:6): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:34 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffc01, 0x100) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000140)={0xff, 0x100000000, r2, 0xfffffffffffffff7, r3, 0x80000001, 0x8, 0x9}) [ 700.949710] EXT4-fs error (device sda1) in ext4_setattr:5631: Out of memory [ 700.968521] EXT4-fs (sda1): re-mounted. Opts: lazytime,,errors=continue [ 701.008259] FAULT_INJECTION: forcing a failure. [ 701.008259] name failslab, interval 1, probability 0, space 0, times 0 [ 701.019653] CPU: 0 PID: 14960 Comm: syz-executor3 Not tainted 4.19.0-rc6+ #48 [ 701.026938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.036330] Call Trace: [ 701.038947] dump_stack+0x1c4/0x2b4 [ 701.042592] ? dump_stack_print_info.cold.2+0x52/0x52 [ 701.047800] ? __generic_file_write_iter+0x26e/0x630 [ 701.052917] should_fail.cold.4+0xa/0x17 [ 701.056992] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 701.062098] ? kasan_check_write+0x14/0x20 [ 701.066352] ? mark_held_locks+0x130/0x130 [ 701.070595] ? debug_check_no_obj_freed+0x305/0x58d [ 701.075620] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.081174] ? check_preemption_disabled+0x48/0x200 [ 701.086202] ? trace_hardirqs_on+0xbd/0x310 [ 701.090542] ? ext4_ext_map_blocks+0xe26/0x6330 [ 701.095229] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 701.100692] ? __kasan_slab_free+0x119/0x150 [ 701.105113] ? ext4_ext_map_blocks+0xe26/0x6330 [ 701.109793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.115342] ? ext4_ext_map_blocks+0xf14/0x6330 [ 701.120021] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.125403] __should_failslab+0x124/0x180 [ 701.129654] should_failslab+0x9/0x14 [ 701.133822] kmem_cache_alloc+0x47/0x730 [ 701.138064] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 701.143092] ? ext4_es_can_be_merged+0x23d/0x2a0 [ 701.147860] ? __es_tree_search.isra.12+0x1ba/0x220 [ 701.152915] __es_insert_extent+0x30c/0x1120 [ 701.152937] ? ext4_es_free_extent+0x790/0x790 [ 701.152958] ? lock_release+0x970/0x970 [ 701.162210] ? ext4_es_init_tree+0x70/0x70 [ 701.162231] ? ext4_map_blocks+0x487/0x1b50 [ 701.162255] ? kasan_check_write+0x14/0x20 [ 701.179012] ? do_raw_write_lock+0xbd/0x1b0 [ 701.183353] ext4_es_insert_extent+0x316/0x810 [ 701.187954] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 701.193763] ? lock_downgrade+0x900/0x900 [ 701.197925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.203471] ? ext4_find_delalloc_range+0x14b/0x1c0 05:22:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0), 0x0, 0x9f24}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:34 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00e6ff000000f6000000"], 0xa}, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3e, 0x101000) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)={0x40000000}) [ 701.208497] ? ext4_ext_release+0x10/0x10 [ 701.212828] ? down_write+0x8a/0x130 [ 701.216728] ? ext4_map_blocks+0x88f/0x1b50 [ 701.221060] ext4_map_blocks+0xb0c/0x1b50 [ 701.225233] ? ext4_issue_zeroout+0x190/0x190 [ 701.229744] ? jbd2_journal_free_reserved+0x110/0x110 [ 701.235120] ? __page_cache_alloc+0x191/0x5b0 [ 701.239631] ? ___might_sleep+0x1ed/0x300 [ 701.243793] _ext4_get_block+0x226/0x6d0 [ 701.247868] ? ext4_map_blocks+0x1b50/0x1b50 [ 701.252284] ? ___might_sleep+0x1ed/0x300 [ 701.256444] ext4_get_block_unwritten+0x2a/0x40 [ 701.261122] ext4_block_write_begin+0x6f9/0x1870 [ 701.261141] ? ext4_block_zero_page_range+0x1a50/0x1a50 [ 701.261163] ? __check_block_validity.constprop.80+0x210/0x210 [ 701.277692] ? arch_local_save_flags+0x40/0x40 [ 701.277721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.277740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.277756] ? wait_for_stable_page+0x1a5/0x570 [ 701.277771] ? ___might_sleep+0x1ed/0x300 [ 701.277790] ? set_page_dirty_lock+0x190/0x190 05:22:34 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x5) [ 701.307093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.312647] ? ext4_meta_trans_blocks+0x25f/0x310 [ 701.317510] ? __might_sleep+0x95/0x190 [ 701.321499] ext4_write_begin+0x6bb/0x1830 [ 701.326101] ? ext4_truncate+0x1650/0x1650 [ 701.330523] ? ext4_xattr_get+0x1a8/0xb30 [ 701.330541] ? lock_downgrade+0x900/0x900 [ 701.330561] ? ext4_xattr_ibody_get+0x107/0x630 [ 701.343513] ? ext4_xattr_inode_set_class+0x60/0x60 [ 701.348540] ? current_time+0x72/0x1b0 [ 701.348556] ? lock_downgrade+0x900/0x900 05:22:34 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 701.348575] ? trace_hardirqs_on+0xbd/0x310 [ 701.348588] ? current_time+0x72/0x1b0 [ 701.348609] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 701.370569] ? ext4_xattr_ibody_get+0x630/0x630 [ 701.375260] ? iov_iter_fault_in_readable+0x22a/0x450 [ 701.380459] ? copy_page_from_iter+0x8e0/0x8e0 [ 701.385054] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 701.390084] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 701.395809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.401355] ? timespec64_trunc+0xea/0x180 [ 701.401370] ? inode_init_owner+0x340/0x340 [ 701.401393] generic_perform_write+0x3aa/0x6a0 [ 701.409944] ? page_endio+0xb60/0xb60 [ 701.409958] ? file_update_time+0xe4/0x640 [ 701.409972] ? current_time+0x1b0/0x1b0 [ 701.409988] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 701.410003] ? generic_write_checks+0x382/0x5d0 [ 701.410020] ? wait_on_page_locked_killable+0x520/0x520 [ 701.410037] ? ext4_file_write_iter+0x2a1/0x1420 [ 701.410056] __generic_file_write_iter+0x26e/0x630 [ 701.410075] ext4_file_write_iter+0x390/0x1420 [ 701.410095] ? ext4_file_mmap+0x410/0x410 [ 701.410115] ? ksys_dup3+0x680/0x680 [ 701.410132] ? __f_unlock_pos+0x19/0x20 [ 701.410148] ? lock_downgrade+0x900/0x900 [ 701.410164] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 701.410177] ? proc_fail_nth_write+0x9e/0x210 [ 701.410190] ? proc_cwd_link+0x1d0/0x1d0 [ 701.410207] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 701.410230] ? iov_iter_init+0xc2/0x1e0 [ 701.410248] __vfs_write+0x6b8/0x9f0 [ 701.410266] ? kernel_read+0x120/0x120 [ 701.410281] ? lock_release+0x970/0x970 [ 701.410296] ? arch_local_save_flags+0x40/0x40 [ 701.410314] ? check_preemption_disabled+0x48/0x200 [ 701.410338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.432261] ? check_preemption_disabled+0x48/0x200 [ 701.432283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.432305] ? __sb_start_write+0x1b2/0x370 [ 701.442330] vfs_write+0x1fc/0x560 [ 701.442351] ksys_write+0x101/0x260 [ 701.442372] ? __ia32_sys_read+0xb0/0xb0 [ 701.479449] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 701.479478] __x64_sys_write+0x73/0xb0 [ 701.488061] do_syscall_64+0x1b9/0x820 [ 701.488078] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 701.488095] ? syscall_return_slowpath+0x5e0/0x5e0 [ 701.488110] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 701.488131] ? trace_hardirqs_on_caller+0x310/0x310 [ 701.573913] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 701.588757] ? prepare_exit_to_usermode+0x291/0x3b0 [ 701.588777] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 701.588799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.588810] RIP: 0033:0x457579 [ 701.588829] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.603852] RSP: 002b:00007f19d53c1c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 701.603868] RAX: ffffffffffffffda RBX: 00007f19d53c1c90 RCX: 0000000000457579 [ 701.603877] RDX: 0000000000000086 RSI: 0000000020000280 RDI: 0000000000000003 [ 701.603885] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 701.603899] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f19d53c26d4 [ 701.626591] R13: 00000000004c5688 R14: 00000000004d9000 R15: 0000000000000004 05:22:35 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@lazytime='lazytime'}, {@min_batch_time={'min_batch_time'}}]}) 05:22:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:35 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xff01000000000000]}}, 0x20) 05:22:35 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:35 executing program 3 (fault-call:1 fault-nth:7): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)="7d8fb7443647fe82e384601f2f898a268a5dcf0a07b7c71be4631ce2ac830ac4254ece4480bb55fff1a4146eab1667e97c52a4f8f36acdd566c666a1f2226f1f11cf31ee97ae6accf64ac6b903c6145e11a1b31e543079fc74fb074acc", 0x5d, 0x9f24}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:35 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:35 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2) fchown(r0, 0x0, r2) 05:22:35 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1a0]}}, 0x20) [ 701.807419] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4e, 0x2000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@broadcast, @multicast2, 0x0}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vcan0\x00', r2}) 05:22:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0), 0x0, 0x9f24}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) [ 701.858007] EXT4-fs (sda1): re-mounted. Opts: lazytime,min_batch_time=0x0000000000000000,,errors=continue [ 701.973763] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:35 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x80800) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=@deltfilter={0x524, 0x2d, 0x1c, 0x70bd29, 0x25dfdbff, {0x0, r2, {0xffe0, 0xd}, {0x0, 0xf}, {0xfff9, 0xb}}, [@TCA_RATE={0x8, 0x5, {0x8000, 0x5}}, @TCA_RATE={0x8, 0x5, {0x8e, 0x2}}, @TCA_RATE={0x8, 0x5, {0x6, 0x200}}, @TCA_CHAIN={0x8, 0xb, 0x8001}, @TCA_CHAIN={0x8, 0xb, 0x3}, @filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x4c0, 0x2, [@TCA_U32_FLAGS={0x8, 0xb, 0x6}, @TCA_U32_SEL={0x4b4, 0x5, {0xd, 0x1, 0x7f, 0x1, 0xfff, 0x0, 0x18, 0x0, [{0x0, 0xfffffffffffffffc, 0x4, 0x9}, {0x0, 0x3, 0x8000, 0x1}, {0x0, 0x9, 0x71, 0xffffffffffffffff}, {0xb4ee, 0x8, 0xd80, 0x80}, {0x9, 0x9, 0x2, 0x1}, {0x7, 0x0, 0x7, 0x200}, {0x5, 0x732, 0x4, 0x2}, {0x5, 0x1, 0x8, 0x2}, {0x3, 0x6, 0x8}, {0x10000000000000, 0x7, 0x3f, 0x9}, {0x1, 0x76b, 0x8, 0x1}, {0xfffffffffffff800, 0x5, 0x1000000}, {0x3, 0x4, 0x8, 0xe0c}, {0x54, 0x8, 0x8, 0x17}, {0xcbc, 0x6, 0x1, 0x2}, {0x8, 0xffffffffffff7fff, 0x9, 0x2}, {0xfffffffffffff680, 0x49c, 0x4, 0xb8d0}, {0x5, 0x0, 0x7ff, 0x7}, {0xff, 0xfff, 0x7fffffff, 0x1}, {0xfffffffffffff801, 0x10001, 0x1b5}, {0xedae, 0x4b4, 0x7, 0x2}, {0xffffffff, 0x2, 0x80000000, 0x9}, {0x6, 0xfffffffffffffffe, 0x6, 0xa}, {0x6, 0x8, 0x5, 0xfffffffffffffffc}, {0x1, 0x9, 0x2, 0x2}, {0xf37, 0x9, 0xffffffff, 0x401}, {0xffffffffffffffc1, 0x5, 0x8001, 0x3ff}, {0x14, 0x4, 0x200, 0x800}, {0xe2, 0x7, 0x0, 0x2}, {0xfffffffffffffffb, 0x8, 0x1000, 0x6}, {0xba5, 0x24, 0x3, 0x1}, {0x600, 0x6, 0x41, 0x1d1e6408}, {0x0, 0x200, 0x6, 0x4}, {0x1, 0x7f, 0x6, 0x1}, {0x8, 0x6892, 0x3, 0xffffffff}, {0x9, 0x3, 0xffffffffffffffff, 0x1}, {0x4, 0x81, 0x0, 0x7}, {0x43c, 0x7fffffff, 0xfffffffffffff800, 0xfffffffffffffff7}, {0xff, 0x180000000000000, 0xc91, 0x2}, {0x9, 0x7, 0x8, 0x7fff}, {0x4a5, 0xc9, 0x597, 0xd4}, {0x9, 0x1, 0x6830, 0xff}, {0x3, 0x3, 0x6}, {0x7fffffff, 0x3f, 0xffffffff, 0x4}, {0x0, 0x9, 0x6, 0x6}, {0x7, 0x7ff, 0x8c24, 0x8}, {0x1f, 0xbf54, 0x6, 0x10001}, {0x9, 0xe626, 0x100000000, 0xef}, {0x1f95, 0x800, 0x7fff, 0x81}, {0x0, 0x0, 0x15f8, 0x9}, {0xfffffffffffffff9, 0x5, 0x8001, 0x9}, {0x20, 0x101, 0x1, 0x6}, {0xba, 0x7, 0xc8d6, 0xffff}, {0x5a, 0x6, 0x2, 0x11c0}, {0x0, 0x400, 0x2}, {0x6, 0x4, 0xb4, 0x3}, {0x6, 0x19, 0x35f5, 0x18}, {0x4, 0x7, 0x5, 0x9}, {0xac, 0x100000001, 0x8, 0xf96}, {0x8, 0x4, 0x7fffffff, 0x2}, {0x3, 0xea9b, 0x9, 0xffffffff}, {0xb16, 0x40, 0xb221, 0x5}, {0x7f, 0x100000001, 0x7ff2694c, 0x10001}, {0xff, 0x7fffffff, 0x0, 0x6}, {0x1, 0x10000, 0x7ff, 0x200}, {0x401, 0xf3, 0x7, 0x3}, {0x1f, 0x81, 0x3f, 0xf79}, {0x1, 0x7, 0x1ff, 0x36aeeefc}, {0x7fffffff, 0x7d5, 0x5010, 0x5}, {0x20, 0x8, 0x1ff, 0x6}, {0x7fffffff, 0x7, 0x5, 0x1}, {0x9, 0x4, 0xd, 0x8}, {0x5, 0x7fffffff, 0xffffffff, 0x7}, {0x5, 0x0, 0x80, 0x9}]}}]}}, @TCA_RATE={0x8, 0x5, {0x4, 0x193}}, @TCA_RATE={0x8, 0x5, {0x20, 0x9}}]}, 0x524}, 0x1, 0x0, 0x0, 0x10}, 0x8080) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r3) 05:22:35 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27e0", 0x86) 05:22:35 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x900, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:35 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x20) 05:22:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:35 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:35 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f000088f000)='\r\x00\x00', 0x4) ftruncate(r1, 0xfffffffffffffff9) lseek(r3, 0x0, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r4) 05:22:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x100020500) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6efa2b7d0d6100003fd0cce4c5853490d9e85f6945ede9841c253cf01544e191920794f986555504a78b7178d4ae547d8a562ca021359e77ec82"], 0xa}, 0x0) 05:22:35 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x1bc3020000000000]}}, 0x20) [ 702.117116] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:22:35 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 702.168721] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:35 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:35 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x400003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) socket$inet6_dccp(0xa, 0x6, 0x0) 05:22:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x4, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000001c0)="15a9fda83eda09eb93ebd4fbcab33c71394ac75497ae2e029aa43858826c6cd00311953c3edd0de78660e7fea0c38eaf9d7d1ca44605210d4f53d9058960745e6ed070a67f0671a24792926609110ac3c891df67a858f75e6ce7c570f8389e70daaf97723ff03ec43fa8bd12d65d397bda63a4907d969548f49e09819ee3d56f59ddfdd7c67151d4b591a4ba6d97963b03970c19d8c9c92cacace2fdda6da6177b2162c760d1a399575a002a54897f101e0c52a3d2fbfbfda52226395e9bd01fcd32b847a642456a49555e80c44744a07e1cb32d52fb9403e7f3ac0ed6acb40904a5485424cf8b8a", 0xe8, 0x1}, {&(0x7f00000002c0)="4d745465b5fd065469e5ad9d9ad4820b1add7bcf75ed07a7960200db2e4449a3d1d5e40d6f6f2962af4192b26eaec582c7aeddee528f80ba6fa84c32c4c4d09fcdc5ebdbf08e151c502fed488095eb1ef3581b84826fb680178bda91879c1554fd347b45755392b606bca3014f681e9d73f6a856656777718840b26fe7ef7e6e4efab7712f5d05a05b31b98c007d3130fb75921cf1c88e0d23e1d226ce35aa6a3980b79801d7e7ff256c17cea26fd11fcecbfbc09c22602b714e9e0b4d5b82cdea4cfe2b1fcbf6f806d0f701fe12a1534976814ceecce53f7f404e5bc4b167", 0xdf, 0x1f}, {&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:35 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}}, 0x20) 05:22:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f00000003c0)={0x2, 0x4e24, @broadcast}, 0xecf5c49206d2dd41) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x1000000000000213, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000f6d47534e23ff6de2eea929c5a07beefceb7e7cb108f50d153b9570664e55f820000000400000008c9529e1cb19bd587ff9aacf157d692f5d3a7bbed77f02af0d3b0e8b0b0f4090c65d37d252b"], 0x51}, 0x0) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x800) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000380)={0x0, 0x1000, 0x6, [0x0, 0x9, 0xff, 0xeec5, 0xfff, 0x10000]}, &(0x7f0000000400)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000440)={0x1, 0x5, 0x200, 0x83e, 0x7, 0x400, 0x1, 0x9, r2}, &(0x7f0000000480)=0x20) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x580, 0x0) shutdown(r0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f00000004c0)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r3, &(0x7f00000002c0)={0xa0, 0x19, 0x1, {0x58, {0xfa, 0x0, 0x6}, 0x100, r4, r5, 0x7, 0x81, 0xca, 0xfff, 0x2, 0x0, 0x7c, 0x8, 0xffffffffffffff65, 0x4, 0xfffffffffffff000, 0x83, 0x8f1, 0x3e, 0x3}}, 0xa0) 05:22:35 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 702.294874] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue [ 702.329612] EXT4-fs (sda1): re-mounted. Opts: dioread_nolock,,errors=continue 05:22:35 executing program 1 (fault-call:3 fault-nth:0): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:35 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r2) 05:22:35 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 702.362949] QAT: Invalid ioctl [ 702.377106] QAT: Invalid ioctl 05:22:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f0000000180)="e213b544a5c66ac6ec801ac9e0e154", 0xf, 0x7bba}, {&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:35 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x800800000000]}}, 0x20) 05:22:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x100) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000480)=0x0) fcntl$lock(r2, 0x7, &(0x7f00000004c0)={0x0, 0x1, 0x9, 0x3f, r3}) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="000000008000000004a790fd47a58b02"], 0xa}, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000540)={'filter\x00'}, &(0x7f00000000c0)=0x78) sendmsg$rds(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/239, 0xef}, {&(0x7f00000002c0)=""/124, 0x7c}, {&(0x7f0000000340)=""/34, 0x22}, {&(0x7f0000000380)=""/118, 0x76}], 0x4, 0x0, 0x0, 0x40}, 0x40001) ioctl$KVM_RUN(r1, 0xae80, 0x0) gettid() 05:22:35 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 702.434133] FAULT_INJECTION: forcing a failure. [ 702.434133] name failslab, interval 1, probability 0, space 0, times 0 [ 702.496753] CPU: 0 PID: 15063 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 702.504075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.513435] Call Trace: [ 702.516039] dump_stack+0x1c4/0x2b4 [ 702.519684] ? dump_stack_print_info.cold.2+0x52/0x52 [ 702.524910] ? lock_downgrade+0x900/0x900 [ 702.529085] should_fail.cold.4+0xa/0x17 [ 702.533158] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 702.538283] ? __f_unlock_pos+0x19/0x20 [ 702.542267] ? lock_downgrade+0x900/0x900 05:22:35 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x1) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0006003c000000000066"], 0xa}, 0x0) 05:22:35 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000000)=""/127) r3 = getpid() ptrace$peekuser(0x3, r3, 0x6) fchown(r0, 0x0, r2) [ 702.546424] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 702.551975] ? proc_fail_nth_write+0x9e/0x210 [ 702.556738] ? proc_cwd_link+0x1d0/0x1d0 [ 702.560817] ? kasan_check_read+0x11/0x20 [ 702.564975] ? do_raw_spin_unlock+0xa7/0x2f0 [ 702.565001] ? fs_reclaim_acquire+0x20/0x20 [ 702.565020] ? lock_downgrade+0x900/0x900 [ 702.573749] ? wait_for_completion+0x8a0/0x8a0 [ 702.582470] ? ___might_sleep+0x1ed/0x300 [ 702.586627] ? fsnotify_first_mark+0x350/0x350 [ 702.591240] ? arch_local_save_flags+0x40/0x40 [ 702.595834] ? fsnotify+0x12f0/0x12f0 [ 702.599904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.599925] __should_failslab+0x124/0x180 [ 702.599943] should_failslab+0x9/0x14 [ 702.614102] __kmalloc+0x2d4/0x760 [ 702.614120] ? strncpy_from_user+0x510/0x510 [ 702.614138] ? fput+0x130/0x1a0 [ 702.625365] ? __x64_sys_memfd_create+0x142/0x4f0 [ 702.630238] __x64_sys_memfd_create+0x142/0x4f0 [ 702.634922] ? memfd_fcntl+0x1230/0x1230 [ 702.638997] do_syscall_64+0x1b9/0x820 05:22:36 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) getgroups(0x40000193, &(0x7f0000000000)=[0x0, 0xee01]) getsockopt(r1, 0x2, 0x400, &(0x7f00000003c0)=""/4096, &(0x7f0000000040)=0x1000) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x8001) fchown(r0, 0x0, r2) 05:22:36 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 702.639013] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 702.639029] ? syscall_return_slowpath+0x5e0/0x5e0 [ 702.639046] ? trace_hardirqs_on_caller+0x310/0x310 [ 702.639061] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 702.639077] ? recalc_sigpending_tsk+0x180/0x180 [ 702.639097] ? kasan_check_write+0x14/0x20 [ 702.663793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 702.663815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.683166] RIP: 0033:0x457579 [ 702.686811] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 702.706150] RSP: 002b:00007f1bc1b10a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 702.706167] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457579 [ 702.706175] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 702.706198] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 702.735783] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1bc1b116d4 05:22:36 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 702.735793] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000004 05:22:36 executing program 1 (fault-call:3 fault-nth:1): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:36 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = getgid() getgroups(0x2, &(0x7f0000000300)=[r2, 0xee01]) fchown(r0, 0x0, r3) 05:22:36 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x20) 05:22:36 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) socketpair$inet(0x2, 0x80f, 0x7fffffff, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000096e842450000000a"], 0xa}, 0x0) 05:22:36 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27ff", 0x86) 05:22:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:36 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:36 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1000) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r1) 05:22:36 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001ac0)={&(0x7f00000000c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/178, 0xb2}, {&(0x7f0000000280)=""/148, 0x94}, {&(0x7f0000000100)=""/41, 0x29}, {&(0x7f0000000140)=""/34, 0x22}, {&(0x7f0000000340)=""/34, 0x22}, {&(0x7f0000000380)=""/149, 0x95}], 0x6, &(0x7f00000019c0)=ANY=[@ANYBLOB="30000000000000001401000003000000", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='=\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000500)=ANY=[@ANYBLOB='\x00'], @ANYBLOB="2000000000000000580000000000000014010000080000002d00000006000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB="0300000000000000"], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB="0300000000000000"], @ANYBLOB="0000008000000000ce000000000000000300000000000000800000000000000002000000000000007700000000000000480000000000000014010000010000000400000002000000", @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="9700000000000000", @ANYPTR=&(0x7f0000001900)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000", @ANYPTR=&(0x7f0000001680)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='i\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001700)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='a\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000001f80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000", @ANYPTR=&(0x7f0000001780)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000002f80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000", @ANYPTR=&(0x7f0000003f80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000", @ANYPTR=&(0x7f0000004f80)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0010000000000000", @ANYPTR=&(0x7f00000017c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="f300000000000000", @ANYPTR=&(0x7f00000018c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='=\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0a000000000000004400000000000000ff00000000000000"], 0xd0, 0x805}, 0x20000000) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000001780)={0x2, 0x4e23, @rand_addr=0xffff}, 0x10) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="fa936c532ef81f88e51691f682acb0f86eda3ba92f16750b30997e0b7c4d6283ddd7c096e00b4b82ff1589199bca9f7a4d929ed40e48c18c4e2b5cdaa944ba48a4935d2b"], 0xa}, 0x0) 05:22:36 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xffffffff000) 05:22:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x0, &(0x7f0000000100)={[{@dioread_nolock='dioread_nolock'}]}) 05:22:36 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 702.988110] FAULT_INJECTION: forcing a failure. [ 702.988110] name failslab, interval 1, probability 0, space 0, times 0 [ 703.020101] RDS: rds_bind could not find a transport for ::ffff:0.0.255.255, load rds_tcp or rds_rdma? [ 703.044912] CPU: 0 PID: 15110 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 703.052263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.061822] Call Trace: [ 703.064962] dump_stack+0x1c4/0x2b4 [ 703.068612] ? dump_stack_print_info.cold.2+0x52/0x52 [ 703.074137] should_fail.cold.4+0xa/0x17 [ 703.078225] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 703.083343] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 703.088723] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 703.093500] ? is_bpf_text_address+0xac/0x170 [ 703.098007] ? lock_downgrade+0x900/0x900 [ 703.102172] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 703.107990] ? kasan_check_read+0x11/0x20 [ 703.108647] RDS: rds_bind could not find a transport for ::ffff:0.0.255.255, load rds_tcp or rds_rdma? [ 703.112157] ? fs_reclaim_acquire+0x20/0x20 [ 703.112181] ? lock_downgrade+0x900/0x900 [ 703.130454] ? ___might_sleep+0x1ed/0x300 [ 703.134617] ? expand_files.part.8+0x571/0x9a0 [ 703.139233] ? arch_local_save_flags+0x40/0x40 [ 703.143830] ? iterate_fd+0x4b0/0x4b0 [ 703.147639] ? __save_stack_trace+0x8d/0xf0 [ 703.151973] __should_failslab+0x124/0x180 [ 703.156238] should_failslab+0x9/0x14 [ 703.160242] kmem_cache_alloc+0x2be/0x730 [ 703.164411] ? shmem_destroy_callback+0xc0/0xc0 [ 703.169084] shmem_alloc_inode+0x1b/0x40 [ 703.173149] alloc_inode+0x63/0x190 [ 703.177566] new_inode_pseudo+0x71/0x1a0 [ 703.181634] ? prune_icache_sb+0x1c0/0x1c0 [ 703.185885] ? _raw_spin_unlock+0x2c/0x50 [ 703.190041] new_inode+0x1c/0x40 [ 703.193585] shmem_get_inode+0xf1/0x920 [ 703.193604] ? shmem_encode_fh+0x340/0x340 [ 703.193624] ? lock_downgrade+0x900/0x900 [ 703.201824] ? lock_release+0x970/0x970 [ 703.201840] ? arch_local_save_flags+0x40/0x40 [ 703.201858] ? usercopy_warn+0x110/0x110 [ 703.218776] __shmem_file_setup.part.45+0x83/0x2a0 [ 703.223726] shmem_file_setup+0x65/0x90 [ 703.227721] __x64_sys_memfd_create+0x2af/0x4f0 [ 703.232400] ? memfd_fcntl+0x1230/0x1230 [ 703.236480] do_syscall_64+0x1b9/0x820 [ 703.240374] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 703.245746] ? syscall_return_slowpath+0x5e0/0x5e0 [ 703.250688] ? trace_hardirqs_on_caller+0x310/0x310 [ 703.255712] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 703.260737] ? recalc_sigpending_tsk+0x180/0x180 [ 703.265500] ? kasan_check_write+0x14/0x20 [ 703.269748] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 703.274608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.279799] RIP: 0033:0x457579 [ 703.282997] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.301903] RSP: 002b:00007f1bc1b10a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 703.309614] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457579 [ 703.316889] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 703.324159] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 703.324168] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1bc1b116d4 [ 703.324177] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000004 [ 703.353801] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 05:22:36 executing program 1 (fault-call:3 fault-nth:2): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:36 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x80002, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r1, 0x4) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x3ffff, 0x0) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e24, @broadcast}, 0x10) write$P9_RFSYNC(r2, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x1ea) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="68adfec021262b007452ac60c66a00ba50a36acd9e7bf25c9688d54eb93c2d5ada07097e62f23216c554eed020e0e98334c5b60900e0616e"], 0xa}, 0x0) 05:22:36 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) ioctl$void(r1, 0x5451) fchown(r0, 0x0, r3) 05:22:36 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:36 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 703.526809] EXT4-fs: 1 callbacks suppressed [ 703.526823] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:22:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000140)={r1, 0x6}, 0x8) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000e0000000000000000b29a2f17ab0b6ea9dd2fca0cca9d19ab244e374a720c02378102fa2ef3e65bb9555c74fa6cf1983394e3ff2da8acc2372854c384b79a3616b6ccfc355991d889fbedccb47fb1e6d94e8f550abf6c08f70b41a04afec476e673ebf9098871112d0106a405005968b330fed6ab3fc6ca14ccf91758a6a15267f53918391462b0501124af4381206c301319de63"], 0xa}, 0x0) 05:22:36 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x5, 0x4) fchown(r0, 0x0, r2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000440)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) stat(&(0x7f0000000340)='.\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffff73a, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000080)="3c9c371645c13cdc31cf9f4144ce174beb", 0x11, 0xff}, {&(0x7f00000000c0)="8d86d4204c8bd0d9f9146695dde3ba70b05250949598095028e70ac5f36ca1f61d73653adf1cc4580c5169c86ba08d4552e4016985d649de2971659dfebee8fb49ff63a7e3915eb7070c0c8d9c4e56e284d64a88b3485e6bddf3a6eb334486a699305f085794a0f96b3838fd995d1c156b3b3ef81f6f86354053e849917eeffcce626332bb7d4ad0eed81028b83a5655d3133f31a2d80aff8717487d3567af3ffceb1f92b02af4e32747c437750cc2ec05409129d3a265fbc2b2a5aa198d4b", 0xbf, 0xff}, {&(0x7f0000000200)="068b4b943d074e6eed88c6af6155724807bbcb21c07642f7842f73f4574545ca78a8da88a3126441d4b5e5ed631c6c6cdf1e73cf11d6f3f1168a18bf876bc4594177cc930a0cbffd1af74aff3111e37e54e2fba02e44b21ec7aa2b934a12ca63f23b548909f360297457a5be4b933c11fde4da5bdee59556b0e0a38ee8f61ac9576654eda31af11e42576f1994e334ad294cb48bbdfe1f8ca0af8257b5160df51c19ecff1bcea6beae42e46e08c46b6d5db87c061ed6513b4d428fdb576b3ca0920886eea9b39bf9e583e59366b5d8bce3c189676858e8d935632dcf8cab1b251b7b525542d6c1c499ce6043d68a", 0xee, 0x9}], 0x8001, &(0x7f0000000700)={[{@iocharset={'iocharset', 0x3d, 'cp1255'}}, {@nonumtail='nnonumtail=1'}, {@utf8no='utf8=0'}, {@numtail='nonumtail=0'}, {@utf8='utf8=1'}, {@shortname_win95='shortname=win95'}, {@shortname_winnt='shortname=winnt'}, {@utf8no='utf8=0'}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fowner_lt={'fowner<', r3}}, {@smackfsdef={'smackfsdef', 0x3d, '+em0ppp0cgroup[nodev'}}, {@obj_user={'obj_user', 0x3d, '{'}}, {@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@obj_user={'obj_user', 0x3d, 'keyringeth0'}}, {@euid_gt={'euid>', r4}}, {@subj_role={'subj_role', 0x3d, '\''}}, {@fowner_lt={'fowner<', r5}}]}) [ 703.576052] FAULT_INJECTION: forcing a failure. [ 703.576052] name failslab, interval 1, probability 0, space 0, times 0 [ 703.599918] CPU: 0 PID: 15138 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 703.607235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.616599] Call Trace: [ 703.619208] dump_stack+0x1c4/0x2b4 05:22:36 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0xffffffa7, &(0x7f0000000500), 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=r0], 0xa}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x19d013862a485aa6) ioctl$VT_RELDISP(r1, 0x5605) ioctl$VT_ACTIVATE(r1, 0x5606, 0xeec5) [ 703.622874] ? dump_stack_print_info.cold.2+0x52/0x52 [ 703.628093] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 703.632879] should_fail.cold.4+0xa/0x17 [ 703.636962] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 703.642090] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 703.647924] ? kasan_check_read+0x11/0x20 [ 703.652590] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 703.652607] ? rcu_bh_qs+0xc0/0xc0 [ 703.652626] ? unwind_dump+0x190/0x190 [ 703.665321] ? is_bpf_text_address+0xd3/0x170 [ 703.669831] ? kernel_text_address+0x79/0xf0 [ 703.674261] ? __kernel_text_address+0xd/0x40 [ 703.678772] ? unwind_get_return_address+0x61/0xa0 [ 703.683726] ? __save_stack_trace+0x8d/0xf0 [ 703.683753] ? ___might_sleep+0x1ed/0x300 [ 703.683770] ? arch_local_save_flags+0x40/0x40 [ 703.683788] ? save_stack+0x43/0xd0 [ 703.700439] ? kasan_kmalloc+0xc7/0xe0 [ 703.704338] ? kasan_slab_alloc+0x12/0x20 [ 703.709112] ? kmem_cache_alloc+0x12e/0x730 [ 703.714567] ? shmem_alloc_inode+0x1b/0x40 [ 703.714587] __should_failslab+0x124/0x180 [ 703.714605] should_failslab+0x9/0x14 [ 703.727124] kmem_cache_alloc+0x2be/0x730 [ 703.731282] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 703.736307] ? map_id_range_down+0x1ee/0x430 [ 703.740734] new_inode_smack+0x20/0xb0 [ 703.744636] smack_inode_alloc_security+0x92/0x100 [ 703.744655] security_inode_alloc+0x73/0xd0 [ 703.744675] inode_init_always+0x68f/0xd80 [ 703.758144] ? __address_space_init_once+0x240/0x240 [ 703.763257] ? mem_cgroup_charge_statistics+0x780/0x780 [ 703.768631] ? kasan_unpoison_shadow+0x35/0x50 [ 703.768645] ? kasan_kmalloc+0xc7/0xe0 [ 703.768663] ? kasan_slab_alloc+0x12/0x20 [ 703.768679] ? kmem_cache_alloc+0x306/0x730 [ 703.768704] ? shmem_alloc_inode+0x1b/0x40 [ 703.781482] ? shmem_destroy_callback+0xc0/0xc0 [ 703.781501] alloc_inode+0x80/0x190 [ 703.781517] new_inode_pseudo+0x71/0x1a0 [ 703.781536] ? prune_icache_sb+0x1c0/0x1c0 [ 703.798356] ? _raw_spin_unlock+0x2c/0x50 [ 703.798375] new_inode+0x1c/0x40 [ 703.798392] shmem_get_inode+0xf1/0x920 [ 703.798409] ? shmem_encode_fh+0x340/0x340 [ 703.798424] ? lock_downgrade+0x900/0x900 [ 703.798440] ? lock_release+0x970/0x970 [ 703.798455] ? arch_local_save_flags+0x40/0x40 [ 703.798469] ? usercopy_warn+0x110/0x110 [ 703.798493] __shmem_file_setup.part.45+0x83/0x2a0 [ 703.798511] shmem_file_setup+0x65/0x90 [ 703.798527] __x64_sys_memfd_create+0x2af/0x4f0 [ 703.798543] ? memfd_fcntl+0x1230/0x1230 [ 703.798566] do_syscall_64+0x1b9/0x820 [ 703.798585] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 703.866882] ? syscall_return_slowpath+0x5e0/0x5e0 [ 703.871836] ? trace_hardirqs_on_caller+0x310/0x310 [ 703.876871] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 703.881898] ? recalc_sigpending_tsk+0x180/0x180 [ 703.886671] ? kasan_check_write+0x14/0x20 [ 703.890928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 703.895791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.900989] RIP: 0033:0x457579 [ 703.904205] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.923294] RSP: 002b:00007f1bc1b10a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 703.923310] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457579 [ 703.923319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 703.923327] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 703.923335] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1bc1b116d4 [ 703.923343] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000004 05:22:37 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x200000e0) 05:22:37 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/187, 0xbb}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x100000) 05:22:37 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:37 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r4, r3) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000080)=0x9, 0x4) 05:22:37 executing program 1 (fault-call:3 fault-nth:3): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:37 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = dup2(r0, r0) setsockopt$inet_dccp_int(r1, 0x21, 0xf, &(0x7f0000000000)=0x37729c3c, 0x4) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:37 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:37 executing program 0 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 704.135658] FAULT_INJECTION: forcing a failure. [ 704.135658] name failslab, interval 1, probability 0, space 0, times 0 [ 704.181351] CPU: 1 PID: 15163 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 704.181538] FAULT_INJECTION: forcing a failure. [ 704.181538] name failslab, interval 1, probability 0, space 0, times 0 [ 704.188680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.188687] Call Trace: [ 704.188722] dump_stack+0x1c4/0x2b4 [ 704.188757] ? dump_stack_print_info.cold.2+0x52/0x52 [ 704.221367] ? mark_held_locks+0x130/0x130 [ 704.225617] ? alloc_inode+0x80/0x190 [ 704.229526] should_fail.cold.4+0xa/0x17 [ 704.233613] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 704.238734] ? __kernel_text_address+0xd/0x40 [ 704.243249] ? unwind_get_return_address+0x61/0xa0 [ 704.243272] ? __save_stack_trace+0x8d/0xf0 [ 704.253057] ? __lockdep_init_map+0x105/0x590 [ 704.257567] ? lockdep_init_map+0x9/0x10 [ 704.261637] ? debug_mutex_init+0x2d/0x60 [ 704.265792] ? __mutex_init+0x1f7/0x290 [ 704.265807] ? trace_hardirqs_on+0xbd/0x310 [ 704.265826] ? __lockdep_init_map+0x105/0x590 [ 704.278793] ? fs_reclaim_acquire+0x20/0x20 [ 704.283124] ? lock_downgrade+0x900/0x900 [ 704.287291] ? ___might_sleep+0x1ed/0x300 [ 704.291450] ? arch_local_save_flags+0x40/0x40 [ 704.296058] __should_failslab+0x124/0x180 [ 704.300477] should_failslab+0x9/0x14 [ 704.304289] kmem_cache_alloc+0x2be/0x730 [ 704.308442] ? mpol_shared_policy_init+0x235/0x650 [ 704.313372] ? current_time+0x72/0x1b0 [ 704.317267] __d_alloc+0xc8/0xcc0 [ 704.321095] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 704.326123] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 704.331643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.338059] ? timespec64_trunc+0xea/0x180 [ 704.342568] ? inode_init_owner+0x340/0x340 [ 704.346905] ? _raw_spin_unlock+0x2c/0x50 [ 704.351457] ? current_time+0x131/0x1b0 [ 704.355961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.361606] ? check_preemption_disabled+0x48/0x200 [ 704.366914] ? __lockdep_init_map+0x105/0x590 [ 704.371420] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 704.376964] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 704.382520] d_alloc_pseudo+0x1d/0x30 [ 704.386336] alloc_file_pseudo+0x158/0x3f0 [ 704.390579] ? alloc_file+0x4d0/0x4d0 [ 704.394391] ? usercopy_warn+0x110/0x110 [ 704.398478] ? kasan_check_write+0x14/0x20 [ 704.402744] __shmem_file_setup.part.45+0x110/0x2a0 [ 704.407772] shmem_file_setup+0x65/0x90 [ 704.412299] __x64_sys_memfd_create+0x2af/0x4f0 [ 704.417634] ? memfd_fcntl+0x1230/0x1230 [ 704.421897] do_syscall_64+0x1b9/0x820 [ 704.425795] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 704.431172] ? syscall_return_slowpath+0x5e0/0x5e0 [ 704.436129] ? trace_hardirqs_on_caller+0x310/0x310 [ 704.441163] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 704.446184] ? recalc_sigpending_tsk+0x180/0x180 [ 704.450946] ? kasan_check_write+0x14/0x20 [ 704.455196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 704.460087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.465286] RIP: 0033:0x457579 05:22:37 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:37 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x1, &(0x7f0000000000)=0x0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf, 0x800, r1, &(0x7f0000000040)="9ac97d5af4f9d6b8d77683f6b9f5a619f47564799a6e872146a405557c7947076c8d2ad64f0bbc9560c5cd3c0db4b220abbe0f9b15ae7e911f5a9a0330c0a3b41f92ab8aaad42f19f68aa469c38142523bcaf308ed9b79aac44fc90a33e863bbd778c158e7c608d085ca02bcf5d8a418ed5d1bbff96db52f95da5750a3efca34acd8216e4d", 0x85, 0x4, 0x0, 0x3, r0}, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r3) [ 704.468486] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.487405] RSP: 002b:00007f1bc1b10a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 704.495151] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457579 [ 704.502433] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 704.509711] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 704.517260] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1bc1b116d4 [ 704.524541] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000004 [ 704.555065] CPU: 1 PID: 15171 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 704.562382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.571743] Call Trace: [ 704.574347] dump_stack+0x1c4/0x2b4 [ 704.577994] ? dump_stack_print_info.cold.2+0x52/0x52 [ 704.583200] ? lock_downgrade+0x900/0x900 [ 704.587377] should_fail.cold.4+0xa/0x17 [ 704.591453] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 704.596573] ? __f_unlock_pos+0x19/0x20 [ 704.600555] ? lock_downgrade+0x900/0x900 [ 704.604710] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 704.610481] ? proc_fail_nth_write+0x9e/0x210 [ 704.615768] ? proc_cwd_link+0x1d0/0x1d0 [ 704.619840] ? kasan_check_read+0x11/0x20 [ 704.623999] ? do_raw_spin_unlock+0xa7/0x2f0 [ 704.628418] ? fs_reclaim_acquire+0x20/0x20 [ 704.628434] ? lock_downgrade+0x900/0x900 [ 704.628450] ? wait_for_completion+0x8a0/0x8a0 [ 704.628470] ? ___might_sleep+0x1ed/0x300 [ 704.645647] ? fsnotify_first_mark+0x350/0x350 [ 704.650250] ? arch_local_save_flags+0x40/0x40 [ 704.654854] ? fsnotify+0x12f0/0x12f0 [ 704.658664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.664238] __should_failslab+0x124/0x180 [ 704.668575] should_failslab+0x9/0x14 [ 704.672385] __kmalloc+0x2d4/0x760 [ 704.675936] ? strncpy_from_user+0x510/0x510 [ 704.680352] ? fput+0x130/0x1a0 [ 704.683639] ? __x64_sys_memfd_create+0x142/0x4f0 [ 704.688494] __x64_sys_memfd_create+0x142/0x4f0 [ 704.693176] ? memfd_fcntl+0x1230/0x1230 [ 704.697518] do_syscall_64+0x1b9/0x820 [ 704.701415] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 704.706793] ? syscall_return_slowpath+0x5e0/0x5e0 [ 704.711755] ? trace_hardirqs_on_caller+0x310/0x310 [ 704.716788] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 704.721821] ? recalc_sigpending_tsk+0x180/0x180 [ 704.726589] ? kasan_check_write+0x14/0x20 [ 704.730848] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 704.735709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.740907] RIP: 0033:0x457579 [ 704.744110] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.763482] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 704.771214] RAX: ffffffffffffffda RBX: 0000000020000600 RCX: 0000000000457579 [ 704.778499] RDX: 0000000020000618 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 704.785773] RBP: 000000000072bf00 R08: 0000000020000618 R09: 00000000fbad8001 [ 704.793046] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007fa377fab6d4 05:22:38 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27a0", 0x86) 05:22:38 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xffffff13) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0xfffffffffffffffe, @local}, 0x10) [ 704.800329] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000003 05:22:38 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xfff4) 05:22:38 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27ff", 0x86) 05:22:38 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x80000000004001fd) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:38 executing program 0 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:38 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x444080, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x80000001, 0x400, 0x7, 0x8, 0x2}, &(0x7f0000000140)=0x98) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000440)={0x18, 0x0, {0x2, @random="d0606472e5d5", 'bcsh0\x00'}}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e24, 0x0, @mcast2, 0x8}}, 0x3, 0xfffffffffffffffa, 0x0, 0x4, 0x756}, &(0x7f0000000100)=0x98) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000340)=""/214, &(0x7f0000000040)=0xd6) fcntl$getflags(r0, 0x40b) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000480)={0x18, 0x0, {0x2, @empty, 'veth0_to_bridge\x00'}}) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:38 executing program 1 (fault-call:3 fault-nth:4): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 705.095370] FAULT_INJECTION: forcing a failure. [ 705.095370] name failslab, interval 1, probability 0, space 0, times 0 [ 705.113337] FAULT_INJECTION: forcing a failure. [ 705.113337] name failslab, interval 1, probability 0, space 0, times 0 [ 705.137774] CPU: 0 PID: 15191 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 05:22:38 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x38) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) sendto$inet6(r2, &(0x7f0000000100)="80507d9a73e91ed4eb57d43729a9e3350c752aa36fc06f193411babe8f53d988ebfa1d48852029aac6584f47d28d5d2d75101d83", 0x34, 0x20000000, 0x0, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0xff, 0x93}, 0x4}, 0x10) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000180)={0x18, 0x20}) 05:22:38 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r1) [ 705.145273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.154639] Call Trace: [ 705.157259] dump_stack+0x1c4/0x2b4 [ 705.160909] ? dump_stack_print_info.cold.2+0x52/0x52 [ 705.166473] should_fail.cold.4+0xa/0x17 [ 705.166499] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 705.166528] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 705.180681] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 705.180704] ? is_bpf_text_address+0xac/0x170 [ 705.180725] ? lock_downgrade+0x900/0x900 [ 705.194111] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 705.194127] ? kasan_check_read+0x11/0x20 [ 705.194147] ? fs_reclaim_acquire+0x20/0x20 [ 705.204094] ? lock_downgrade+0x900/0x900 [ 705.212666] ? ___might_sleep+0x1ed/0x300 [ 705.216831] ? expand_files.part.8+0x571/0x9a0 [ 705.221433] ? arch_local_save_flags+0x40/0x40 [ 705.226032] ? iterate_fd+0x4b0/0x4b0 [ 705.230106] ? __save_stack_trace+0x8d/0xf0 [ 705.234623] __should_failslab+0x124/0x180 [ 705.238870] should_failslab+0x9/0x14 05:22:38 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r3) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000000)=""/27, 0x1b, 0xb4, &(0x7f0000000080)={r4, r5+30000000}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) sendto$packet(r1, &(0x7f00000000c0)="9fb0f13c6862bfad5871962d7e7b0d24d54bdb1d32d8a1f825df331306c2825440872c9cd968df7c43e4e1ae36fbc5ef46b0b2bc2a4adf8c8344975d0368f0ba07860f59359f224a3982b0fd961b1a79949745ff437d0a3d3b7fb67e8315e58be05745580a1805a3810b611242189ba149292398ef72967ad8785a07a9d501e9df646ae1c1aa82cdd3ffa6465d490cd2b55f8a0ce8b405c911f3cf7522a7ae", 0x9f, 0x20008000, &(0x7f00000002c0)={0x11, 0x1a, r6, 0x1, 0xc58c, 0x6, @local}, 0x14) [ 705.242677] kmem_cache_alloc+0x2be/0x730 [ 705.246840] ? shmem_destroy_callback+0xc0/0xc0 [ 705.251611] shmem_alloc_inode+0x1b/0x40 [ 705.255681] alloc_inode+0x63/0x190 [ 705.259323] new_inode_pseudo+0x71/0x1a0 [ 705.263396] ? prune_icache_sb+0x1c0/0x1c0 [ 705.267736] ? _raw_spin_unlock+0x2c/0x50 [ 705.271896] new_inode+0x1c/0x40 [ 705.275273] shmem_get_inode+0xf1/0x920 [ 705.279270] ? shmem_encode_fh+0x340/0x340 [ 705.283518] ? lock_downgrade+0x900/0x900 [ 705.287681] ? lock_release+0x970/0x970 [ 705.291845] ? arch_local_save_flags+0x40/0x40 [ 705.296448] ? usercopy_warn+0x110/0x110 [ 705.300535] __shmem_file_setup.part.45+0x83/0x2a0 [ 705.300562] shmem_file_setup+0x65/0x90 [ 705.309523] __x64_sys_memfd_create+0x2af/0x4f0 [ 705.314210] ? memfd_fcntl+0x1230/0x1230 [ 705.318471] do_syscall_64+0x1b9/0x820 [ 705.322374] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 705.327752] ? syscall_return_slowpath+0x5e0/0x5e0 [ 705.332699] ? trace_hardirqs_on_caller+0x310/0x310 [ 705.338167] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 705.343196] ? recalc_sigpending_tsk+0x180/0x180 [ 705.347970] ? kasan_check_write+0x14/0x20 [ 705.352229] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 705.357089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.362280] RIP: 0033:0x457579 [ 705.365478] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 705.384995] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 705.392977] RAX: ffffffffffffffda RBX: 0000000020000600 RCX: 0000000000457579 [ 705.400253] RDX: 0000000020000618 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 705.407529] RBP: 000000000072bf00 R08: 0000000020000618 R09: 00000000fbad8001 [ 705.414801] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007fa377fab6d4 [ 705.422075] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000003 [ 705.430967] CPU: 1 PID: 15194 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 705.438268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.447626] Call Trace: [ 705.447652] dump_stack+0x1c4/0x2b4 [ 705.447670] ? dump_stack_print_info.cold.2+0x52/0x52 [ 705.447701] should_fail.cold.4+0xa/0x17 [ 705.459093] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 705.459114] ? smack_d_instantiate+0x136/0xea0 [ 705.472891] ? kasan_kmalloc+0xc7/0xe0 [ 705.476790] ? kasan_slab_alloc+0x12/0x20 [ 705.480948] ? __d_alloc+0xc8/0xcc0 [ 705.484591] ? alloc_file_pseudo+0x158/0x3f0 [ 705.489023] ? mark_held_locks+0x130/0x130 [ 705.493271] ? percpu_ref_put_many+0x11c/0x260 [ 705.497864] ? lock_downgrade+0x900/0x900 [ 705.502207] ? smack_d_instantiate+0x330/0xea0 [ 705.507061] ? lock_downgrade+0x900/0x900 [ 705.511236] ? fs_reclaim_acquire+0x20/0x20 [ 705.515566] ? lock_downgrade+0x900/0x900 [ 705.519735] ? ___might_sleep+0x1ed/0x300 [ 705.523903] ? arch_local_save_flags+0x40/0x40 [ 705.528497] ? lock_downgrade+0x900/0x900 [ 705.532668] __should_failslab+0x124/0x180 [ 705.536911] should_failslab+0x9/0x14 [ 705.540899] kmem_cache_alloc+0x2be/0x730 [ 705.545058] ? kasan_check_write+0x14/0x20 [ 705.549304] ? do_raw_spin_lock+0xc1/0x200 [ 705.553555] __alloc_file+0xa8/0x470 [ 705.557277] ? file_free_rcu+0xd0/0xd0 [ 705.561174] ? d_instantiate+0x79/0xa0 [ 705.565078] ? lock_downgrade+0x900/0x900 [ 705.569241] ? kasan_check_read+0x11/0x20 [ 705.573404] ? do_raw_spin_unlock+0xa7/0x2f0 [ 705.577823] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 705.582415] alloc_empty_file+0x72/0x170 [ 705.586497] alloc_file+0x5e/0x4d0 [ 705.590045] ? _raw_spin_unlock+0x2c/0x50 [ 705.594212] alloc_file_pseudo+0x261/0x3f0 [ 705.598461] ? alloc_file+0x4d0/0x4d0 [ 705.602273] ? usercopy_warn+0x110/0x110 [ 705.606362] ? kasan_check_write+0x14/0x20 [ 705.610622] __shmem_file_setup.part.45+0x110/0x2a0 [ 705.615651] shmem_file_setup+0x65/0x90 [ 705.619635] __x64_sys_memfd_create+0x2af/0x4f0 [ 705.624310] ? memfd_fcntl+0x1230/0x1230 [ 705.628389] do_syscall_64+0x1b9/0x820 [ 705.632288] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 705.637835] ? syscall_return_slowpath+0x5e0/0x5e0 [ 705.642777] ? trace_hardirqs_on_caller+0x310/0x310 [ 705.648480] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 705.653793] ? recalc_sigpending_tsk+0x180/0x180 [ 705.658957] ? kasan_check_write+0x14/0x20 [ 705.663206] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 705.668072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.673604] RIP: 0033:0x457579 [ 705.676805] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:39 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="2704", 0x86) 05:22:39 executing program 0 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:39 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) [ 705.696157] RSP: 002b:00007f1bc1b10a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 705.703879] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457579 [ 705.711185] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 705.718461] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 705.725908] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f1bc1b116d4 [ 705.733188] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000004 [ 705.830377] FAULT_INJECTION: forcing a failure. [ 705.830377] name failslab, interval 1, probability 0, space 0, times 0 [ 705.850420] CPU: 1 PID: 15219 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 705.857748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.857759] Call Trace: [ 705.869759] dump_stack+0x1c4/0x2b4 [ 705.873395] ? dump_stack_print_info.cold.2+0x52/0x52 [ 705.878595] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 705.883363] should_fail.cold.4+0xa/0x17 [ 705.887433] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 705.892551] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 705.898350] ? kasan_check_read+0x11/0x20 [ 705.898367] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 705.898386] ? rcu_bh_qs+0xc0/0xc0 [ 705.911326] ? unwind_dump+0x190/0x190 [ 705.915230] ? is_bpf_text_address+0xd3/0x170 [ 705.919909] ? kernel_text_address+0x79/0xf0 [ 705.924511] ? __kernel_text_address+0xd/0x40 [ 705.929018] ? unwind_get_return_address+0x61/0xa0 [ 705.933955] ? __save_stack_trace+0x8d/0xf0 [ 705.938307] ? ___might_sleep+0x1ed/0x300 [ 705.942463] ? arch_local_save_flags+0x40/0x40 [ 705.947050] ? save_stack+0x43/0xd0 [ 705.950677] ? kasan_kmalloc+0xc7/0xe0 [ 705.954569] ? kasan_slab_alloc+0x12/0x20 [ 705.958726] ? kmem_cache_alloc+0x12e/0x730 [ 705.963052] ? shmem_alloc_inode+0x1b/0x40 [ 705.967906] __should_failslab+0x124/0x180 [ 705.972498] should_failslab+0x9/0x14 [ 705.976312] kmem_cache_alloc+0x2be/0x730 [ 705.980467] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 705.985488] ? map_id_range_down+0x1ee/0x430 [ 705.989909] new_inode_smack+0x20/0xb0 [ 705.993807] smack_inode_alloc_security+0x92/0x100 [ 705.998746] security_inode_alloc+0x73/0xd0 [ 706.003082] inode_init_always+0x68f/0xd80 [ 706.007323] ? __address_space_init_once+0x240/0x240 [ 706.012432] ? mem_cgroup_charge_statistics+0x780/0x780 [ 706.017804] ? kasan_unpoison_shadow+0x35/0x50 [ 706.022387] ? kasan_kmalloc+0xc7/0xe0 [ 706.026286] ? kasan_slab_alloc+0x12/0x20 [ 706.030439] ? kmem_cache_alloc+0x306/0x730 [ 706.034771] ? shmem_alloc_inode+0x1b/0x40 [ 706.039009] ? shmem_destroy_callback+0xc0/0xc0 [ 706.043684] alloc_inode+0x80/0x190 [ 706.047324] new_inode_pseudo+0x71/0x1a0 [ 706.051565] ? prune_icache_sb+0x1c0/0x1c0 [ 706.055809] ? _raw_spin_unlock+0x2c/0x50 [ 706.059967] new_inode+0x1c/0x40 [ 706.063339] shmem_get_inode+0xf1/0x920 [ 706.067327] ? shmem_encode_fh+0x340/0x340 [ 706.071568] ? lock_downgrade+0x900/0x900 [ 706.075731] ? lock_release+0x970/0x970 [ 706.079726] ? arch_local_save_flags+0x40/0x40 [ 706.084313] ? usercopy_warn+0x110/0x110 [ 706.088395] __shmem_file_setup.part.45+0x83/0x2a0 [ 706.093336] shmem_file_setup+0x65/0x90 [ 706.097318] __x64_sys_memfd_create+0x2af/0x4f0 [ 706.102515] ? memfd_fcntl+0x1230/0x1230 [ 706.106676] do_syscall_64+0x1b9/0x820 [ 706.110583] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 706.115953] ? syscall_return_slowpath+0x5e0/0x5e0 [ 706.120893] ? trace_hardirqs_on_caller+0x310/0x310 [ 706.125922] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 706.130945] ? recalc_sigpending_tsk+0x180/0x180 [ 706.135706] ? kasan_check_write+0x14/0x20 [ 706.139962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 706.144819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.150014] RIP: 0033:0x457579 [ 706.153215] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.172881] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 05:22:39 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xfffffffffffffff4) 05:22:39 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000010dab83a8dc578037c200000000000"], 0xa}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x172) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r2, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x8000) 05:22:39 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="2786", 0x86) 05:22:39 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:22:39 executing program 1 (fault-call:3 fault-nth:5): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 706.180598] RAX: ffffffffffffffda RBX: 0000000020000600 RCX: 0000000000457579 [ 706.188120] RDX: 0000000020000618 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 706.195419] RBP: 000000000072bf00 R08: 0000000020000618 R09: 00000000fbad8001 [ 706.202689] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007fa377fab6d4 [ 706.209975] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000003 05:22:39 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:39 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f00000001c0)={0x1000, "c0a25f7fcc6adb04295ebaafaed4320be4c9bcc792238f7c81e4362dbcd3775eb7cce39a7139f5d01caf1babc93fa88908b4fb0546d7320ebc3516660030c0804b315bbaa5e7acf42a732791964a970216baf61ffb84ac36bce521cc5e08457e13008b876518494a750a6d25f59163d4569004e1febdb9094ea649d6b071931ae8b15d40d5eb38ca8e173978ca5042d4aea74c07c4772f6e08514bada7004a6a22667ffa823d54c7766ecf8d3bd5a76191336f0fec61452f18032b0f9c51f84ab2b5714665172133e644ab5cd1efb40f13ec6053d19ec2976af1000e42a66770623465fa58b2dc2490e9a246b3189877a2c98b0c41d6640f71dfc71a776a649301f6558e730cedeb189c44e3548fee75be3387350fc308a5ff5eef337d68ef8c0eb9b2831846b313580a0bb18dd335ba918f306af89641f2e5d251c8042256e10634e7a816312d0f9341f272dcdc3b48e9d02b9adee0ba649d5e1b8fc534b665b3022d20e3d706095b1c8a554cae85dff2fc1e6073bded81731feda2316bbb064416001d1610787898a17fd1c2aa8edba008da07062e3a809d1c7566eddb6dc5502433e6f91fd3f3f299d4e17377d111ddeabd3f77ca6d485f07b4dd7f70bf4f0d5d12f1313db7099cebdbbae6fc789cb82862fe8b3e2087d9a2ff1720ecbeb65386c87d7a41100dffb2af295947bf4f06a977887e76d0fb12411b01c3d15bda0a421e61c9335b326610112fc5a9397d1f2a77b5a10118fe1243408fbb74de0bc5633c40f5b4432e497f603b337fbe3b756ba39407beef46cc473f29f8f4db8dcb6c486bf8bd0e446ea919760b4fc7479a56a586a4fda1039a56b6b490f136fbeb494ff704b9e4e3c2570eca64f8409b2e6fcabf43735387ed92494629c40d3dacd5979099688e09308ecab6e2daf4c4ba3f1c46f5481e34adae078002822bda0dfcc380eeb32264f3c4ae0cb185de848046432e6ba55590d9136532eab9f5e51169712257c014e352cc2daa6fe24515df113f11afeb4605b0e5c28c2c7917604d166937e9c408af9f121aca6862c16d5da08e8cf5a9af195e4a5f572aa4b2e2b585a3f9c6d23e476ae2cf56d76a33ed0e7a510bc20f627435921fad81bdf4ec329170dccdc335ff43bda0127e7083f1f826b70ddfb74bad204a8da3e19bf0206fdb66fb46e3e3802f6f8ef241906b7d5656788a415dcc7f2436c391e170e3c83df0e4189392e8baa0df3a0a447e66f52f727f5ebb0c5fe442b18a8c3254844e55e1f3e306f786ab92f943d71a5e7f9fcddc3f8f26da5a73dc8257cfd938bcfaf8a2e833782357b2769f21e45c3dcb14aa3896a160a817bfc30f54744068ea9186ae66270571afb1ac6369b2e17098e8e230cae5e044428703406f5f152ae9892ce02e55212764dfa730b78437bb55b869281d6f652445a5cb147808a6d5281191918688acc99da1b2322cd3cefbb590cc72c41bc4331b9e4f1ec04ec696b9404a206c83487918fe60114d06aaf95aad149590fc1aed4b0ea143d5c0ff3d26d778c0a4314ef0c44b5fd073e7eba0eaf6cae664e47217def6c24a7051c39d6b76bf75b742bd9d8f33903665883b1bee02f2b4a5861aab91fbfee16ef67e228a2b596bb37413fe3aa964a2edbe0bf18ffabaf875faa1f63d53f3d1233bcbf5ec4a0b1548384d341fc91cf5f9631fa08056509e298d301a26f2092c54b1d59339b65ef92f9a5a458cda16d1d9b96c80031900516daa9a59f99c43f6aa9276efad44bd79c1634e6e4d7216cdf6513a09eea4c94826239e405b128eafb0b906629663b42ca80c238889396a79202a8d845aa858d4c0f12e015976b51865178cc4e0c7fa3d951cdbd8176e6a7dc82f310bac99518a311b6f8f7fc8e4229e7980c25aa8c37ecd79c1239deb21bc0d3d23c0aa8477074d99dbfd092396bf279d8b9d83a07b6ee02ab7b05e48d891a047bcf68a79f011807a511f11c5c5b0e4e646300720946391734a4fabd4b99ef3ed66021482521078932c5fac5bf3f246ce59fb11fed520f4bbdd85766cc382c464cc367343a0849f89951ab444ffe087dad40268bd4635b6bc2019d4c7d1433699303b896829dd58eba7ba29ce8ca15e0c0ef1cf58faf43474a221048b9687cdc4f1f68e7b21fd09e83ea8e229f46e9dcf8af603e746b27c9f46f5f2d2b1af930cf6d276409b4bce08b43b474c48bfed61927815e057bffbc663ddb306da1fca478725acc3f8c42376611d601aaedadcdd591a95d87980e05342d36e26f89ba6d534d57ac4d0e1ee339e06c8680099c5b4134bd23b15fd8ffa63799fbc56c392f699402e4f134089a45ed34eae6798e067de7536d5995c94c8f46a1e71d713b68ee0a1dd1cb62460ac61955e4d178e5ef22a8cd98d43f642c783f0aa0c2b67d9316f43f1dce53a0467d3bc7b39b633d4880237ac33b858c65d27254d447b6569c2f5c2055b72ecbcd068b114d2a8403ab5bcba67e2d3dd516ce9e2638d717a5f69fd9deb895170eed66bdf75f85db9c398bade4099906935561d5e72ff1fedd1bc700a4c54856f40adb96de8fbfe066168a03089d43acbe6294d41165e1e22795ae195911632c46a961f5c7af7fd85b2413635696a3cb92771e5ae9077e8a52b16e748be5e21a0a37e939ee5fcd5a854ad37ca392ff179ed11bb273f33e221c353386df42b10d5efbdfcbdf055d4bcda1fbb7908288da95d657d7541b92b30c811738a0f885fcb77035773330294758c37513a49a19a839e21cffe807f0a25cc81b3d511509591901ec58c1440cb530464cef3e46d4bc564bc17310453ca577b907e8db09c4438d2187c38eb13f55f4cb0f3fce399be036006201385cd709b2da0b7d13cb9f24c707dcb963d5780b749b8640f9cc1a9452bcc5be24b387a211e8fcf2e21e11d30f3cb70d2a372e0a7c8a6bed8c8938a3c2b60c68d34b93f349f91a32998b2b293b68ee3770fa2ff7c2e874cb0ed8c0a66390cb724e8107eca49a438c4b08b6745a2661ac7d884e58575b60ceb3005119e40ea74857097ac69b54b80ae0bd47bbf82a24c027388f2d08256cb4e4e4bea0c9b529bafc3ca759f036144683c00ecb01fbe83dd90f093070e212c08638808401ebad7c69a2c9d3b4ac10dcbff1a8288b63c2797678019cfd9e0cd8611264e248bf39765486a035e499ea5fc42f7aed46ac28f66df6cecabbf5a06b5624af9d901c6839baac226acee2c51d11899be1fb0c19c7e609d5ccf8e582d905e80b03513f36e75a268be59e8b9fc56eb81fbadacfe88d61b026c4ea920c77c61da39e48d1af1bd161ed7496abd69c4343a7f460c9411da60ddf979ea5b4c0b0b6c8f03ffa0704705811c5ee52b25383a3efcf93ca4eb2c1c45c941630482785e40f49c9cbfc48cc6f872b742e5c05940b574514bf9585c816e9d0ed1567b098346a061e8d0e3626192aa6b2b64eb5d64801054a3bbaf15a6c04f27e13996add279b91421056c13557896bf1ef56aea678529acbeb159bcc370d4f2e8818c46fbf0936f99716467cb4aa2dd22124dc1b121fc3de287b087ba1d27de7d0518ad25cfa00b3ae738d1200b9cb4bc32e5153ec21670dd593ab69d3f37b2e33f679b73b31d5c407fc01dfd6ac22951412d3ee1f4114053d88083b66ebbc3bdb7ace0c43647606ac4308d2ae659e7df28ad7819a6130cfd0953dcd10b7d24fa5dba4c5df33edf4d2da797a8d179271aa12c89c5feb8ff81cb37ad9e853866174a3ac1f9e38428c5978636659767e7d13332a4597c71e8680c9167ffa69f3a5d01be89eccaf2a0b211878d16c1a33da0758014bb35d957efcc47f305600ed9f37715d9e96fe649615bdf9725258b99cb19fd473939bf5b7a3bcc45983afe0c752be09aef792369963237c95470d98a3e682f981b76af1611e674d7efbd1a2433ee609c0d9b2e98907e37745230bc2a3fc26d55ad1180c0c9bdc5c8c2b412aad6e83b489e4602342ab41fd4e23b7a8174f00b66b5f53bd3986817279e173a9c091fc83f652f189d34ea3ec9edbacd056163b4eed7730bb123f92b10f917911942e5de10c2127f14d380a5fd9ef7b76b514c2ed3e61b12eea1eaab083504a1077f47318b097533ccf3ef40d9165cdf211f13a12643f59131274e6ea238d1e6110899af937e9360fe0259caa885d7f009f8c7c5f2c46c11fe34c4ece76a103a8d99ed808c804b38d9f860134d7422bff40518af4f18e56923ee4c88fbdcef67ee9e4e915c882dd65b1b3ec8933d0af141f13684205064cb6e63ef8fb838f17faae1ba72b2debbd898e6f549d56a9a2945881e4bc51c1df0d1533f93dd34a1589e63d66f3fce6725a1c536d11a41587331a040d3a3cdc8f2c1e68470e345b72e6203003606564965d545fccfe27140f45cae57e07960626dfb24e571f9e615984a0b7910d9be787e45995bca4b1b96cb4d4b27fb1cd2d9825c6d0e37423cd6aa9babb8e7a1860378526e6107a972f82df349ad86137f1ab687a57373f748d21f9cd9cbf3665d8b56fbf557db988892b9c53ab611c83a92a05e0855369bb403fbea66b21323e6034b5e2cdc5c94b9e337552fc676458a394bbaa42f0db1d2ad88d63f40d9a9329c0d2ebb7583ed9343d73821d0f3ebd8f9163e68aca6c73add454f42b0c071eb42057d7fea7ca679dc2f202061cf2ee8b813c8652ee84f3678731cbd9ef735350367512c32d7b902bf3b23b7611ea9788ec29fdd927c69544064e95c81dbc31df03189f31d4dc5541e426ccb3399517d065f77bcbad4bf9f8c64274b0ff3ee158ffafe7a5c59c329a33fd80c78cebeea3e3848035e248cff2e41a236876f9963d50dad118de31a7eb6581f8bb61f9d97c2d711ba8589a6c1ac94371211eceb4298b7ea71e33d60b215d881008db9cbd9693c79f42168d5af19abfbab18c6d4dab9a674dfad53d4936c6f4c379585fa3ff8f2ec49d8e491995aebb79c61517fbbbe063eaae509240eb1cea7e9e1661d9fc3cd347d2917bcbe7954dfd2d064717e38f7189833542c9e2ae63d1608a384ddfc413a426bd2e6b6b46ac80da0ed4f7921910c28787b5d72f56d78346ded0f1a9e27569eb42eb3a96aaed97249bda6d64fe9dedea525ba734681561fe1a22b28e85f947883d586b6d3c823273ee6770d559f466d05903f59c8d2ed4597d4100b05614e3d0d398d658142a3af7cb79d2510e0fe7fd47866e5725fe1e30a2b3d615696f431817028d2ac195b20c2bd76e6fd971d0e8a67fae6b509438ef38b4d4eb094dccfe3dc23764b60e3fa1167784358afd6d5bf6c846c7b67f722a63599ad5d16138217f090aa3e071a051e370cfeb74b604e50825789c74d35652274d19a7145abb21ddc51f62d4ea773dd47c4a8f5bec38c58c1a04e773f8e96e3999e041f97ff6ecece092f99154def2a2b8987285b6d169e008bcaee09998f83e67889c4db353b362a4e0afaccadb80e1720ac28cde2cb21a2c1f780a2d0aa6535959fed8e528a856c6097b996c407df528d6d2d66de7ef5294f63e6f3e984f66cce2f211e04755555c6b7cde58f8c3dcc091473578d8115c73c4da1a5fa05cd25302be8b0bd91fb3ecda64a5cbc63becd482e93df8a117f47c4461419e58fb9133a7c467553d7e34907874bdc555281e1a0dd49ae0e3829a705c7b5246c5bc9cf52b77ca1b234f94b6bb2ad1e9e7e9240996ebb0a27a165316e47025d93d124bcceced5c805e5d7f743041efe5f47520eb66a525cb78eef7e8f66ceaf4f352da8212de56fb3e4f52e71b9fa72eaa75cb77358aa"}) 05:22:39 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0xac, "99bca3a72f1fa3710be9d002683ffc81d6e9568f0288158268eb7f5884fec3e6b71a4ca04dbbd1d9b50247c5eb2495f554359979e509b0af083b4c3e2fc3f07c2777c556b95c0d1106c3c4912011b93a7f2df5d44eb0418f13b5b3769d560b489a0f0d5af87ef4cae25175388a79d4606414248f18d7c6414cc442ab3acf6589b216273bb14397c9d4acbd915766b4b52b55f11e2bf1bcb75ee9cb46f363eb514c99fd92ad9c8a9834cfb092"}, &(0x7f0000000200)=0xb4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r5, 0xec3}, 0x8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={r4, r6, r2}, 0xc) fchown(r0, 0x0, r3) [ 706.292230] FAULT_INJECTION: forcing a failure. [ 706.292230] name failslab, interval 1, probability 0, space 0, times 0 [ 706.333809] CPU: 1 PID: 15232 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 706.341130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.351105] Call Trace: [ 706.351136] dump_stack+0x1c4/0x2b4 [ 706.351165] ? dump_stack_print_info.cold.2+0x52/0x52 [ 706.362984] ? smk_access_entry+0x310/0x310 [ 706.363007] should_fail.cold.4+0xa/0x17 [ 706.363052] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 706.376518] ? shmem_setattr+0x50e/0xda0 [ 706.380594] ? lock_downgrade+0x900/0x900 [ 706.384746] ? current_time+0x72/0x1b0 [ 706.384768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.384786] ? timespec64_trunc+0xea/0x180 [ 706.399039] ? inode_init_owner+0x340/0x340 [ 706.399058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.399073] ? fsnotify+0xaae/0x12f0 [ 706.399095] ? fs_reclaim_acquire+0x20/0x20 [ 706.399114] ? lock_downgrade+0x900/0x900 [ 706.421130] ? ___might_sleep+0x1ed/0x300 [ 706.425290] ? arch_local_save_flags+0x40/0x40 [ 706.429885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.435435] __should_failslab+0x124/0x180 [ 706.439678] should_failslab+0x9/0x14 [ 706.443489] kmem_cache_alloc+0x2be/0x730 [ 706.448790] ? do_sys_ftruncate+0x428/0x550 [ 706.453298] ? lock_downgrade+0x900/0x900 [ 706.457455] getname_flags+0xd0/0x5a0 [ 706.461278] getname+0x19/0x20 [ 706.464476] do_sys_open+0x383/0x700 [ 706.468198] ? filp_open+0x80/0x80 [ 706.471908] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 706.477545] ? do_sys_ftruncate+0x449/0x550 [ 706.481886] __x64_sys_open+0x7e/0xc0 [ 706.486136] do_syscall_64+0x1b9/0x820 [ 706.490035] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 706.495413] ? syscall_return_slowpath+0x5e0/0x5e0 [ 706.500358] ? trace_hardirqs_on_caller+0x310/0x310 [ 706.505545] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 706.510960] ? recalc_sigpending_tsk+0x180/0x180 [ 706.516154] ? kasan_check_write+0x14/0x20 [ 706.521061] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 706.525918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.531359] RIP: 0033:0x4111d1 [ 706.534569] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 706.555123] RSP: 002b:00007f1bc1b10a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 706.562847] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111d1 [ 706.570558] RDX: 00007f1bc1b10afa RSI: 0000000000000002 RDI: 00007f1bc1b10af0 05:22:39 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xfffffffffffffdef) 05:22:39 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:39 executing program 0 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:39 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x8000) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x300) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 706.577827] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 706.585281] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 706.592562] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000004 05:22:39 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x40, 0x0, 0x9, 0x2f0cbf71, 0x10001}) 05:22:40 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x7) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000040)=0x1) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:40 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x4010040c000) 05:22:40 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 706.659689] FAULT_INJECTION: forcing a failure. [ 706.659689] name failslab, interval 1, probability 0, space 0, times 0 [ 706.724490] CPU: 0 PID: 15250 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 706.731813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.741181] Call Trace: [ 706.743817] dump_stack+0x1c4/0x2b4 [ 706.747464] ? dump_stack_print_info.cold.2+0x52/0x52 [ 706.752670] ? mark_held_locks+0x130/0x130 [ 706.757089] ? alloc_inode+0x80/0x190 [ 706.761137] should_fail.cold.4+0xa/0x17 [ 706.765230] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 706.770345] ? __kernel_text_address+0xd/0x40 [ 706.770362] ? unwind_get_return_address+0x61/0xa0 [ 706.770383] ? __save_stack_trace+0x8d/0xf0 [ 706.779825] ? __lockdep_init_map+0x105/0x590 [ 706.788798] ? lockdep_init_map+0x9/0x10 [ 706.788811] ? debug_mutex_init+0x2d/0x60 [ 706.788825] ? __mutex_init+0x1f7/0x290 [ 706.788839] ? trace_hardirqs_on+0xbd/0x310 [ 706.788858] ? __lockdep_init_map+0x105/0x590 [ 706.797056] ? fs_reclaim_acquire+0x20/0x20 [ 706.814142] ? lock_downgrade+0x900/0x900 [ 706.818306] ? ___might_sleep+0x1ed/0x300 [ 706.822462] ? arch_local_save_flags+0x40/0x40 [ 706.827063] __should_failslab+0x124/0x180 [ 706.831748] should_failslab+0x9/0x14 [ 706.835571] kmem_cache_alloc+0x2be/0x730 [ 706.839740] ? mpol_shared_policy_init+0x235/0x650 [ 706.844681] ? current_time+0x72/0x1b0 [ 706.848585] __d_alloc+0xc8/0xcc0 [ 706.852051] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 706.857078] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 706.862452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.867993] ? timespec64_trunc+0xea/0x180 [ 706.872253] ? inode_init_owner+0x340/0x340 [ 706.876617] ? _raw_spin_unlock+0x2c/0x50 [ 706.880776] ? current_time+0x131/0x1b0 [ 706.884762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.890656] ? check_preemption_disabled+0x48/0x200 [ 706.895677] ? __lockdep_init_map+0x105/0x590 [ 706.900444] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 706.905997] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 706.912063] d_alloc_pseudo+0x1d/0x30 [ 706.915869] alloc_file_pseudo+0x158/0x3f0 [ 706.920114] ? alloc_file+0x4d0/0x4d0 [ 706.923921] ? usercopy_warn+0x110/0x110 [ 706.927988] ? kasan_check_write+0x14/0x20 [ 706.932244] __shmem_file_setup.part.45+0x110/0x2a0 [ 706.937278] shmem_file_setup+0x65/0x90 [ 706.941263] __x64_sys_memfd_create+0x2af/0x4f0 [ 706.945941] ? memfd_fcntl+0x1230/0x1230 [ 706.950019] do_syscall_64+0x1b9/0x820 [ 706.953921] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 706.959295] ? syscall_return_slowpath+0x5e0/0x5e0 [ 706.964245] ? trace_hardirqs_on_caller+0x310/0x310 [ 706.969270] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 706.974293] ? recalc_sigpending_tsk+0x180/0x180 [ 706.979236] ? kasan_check_write+0x14/0x20 [ 706.983486] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 706.988341] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.993537] RIP: 0033:0x457579 [ 706.996737] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 707.015639] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 05:22:40 executing program 1 (fault-call:3 fault-nth:6): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:40 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001980)='/dev/rtc0\x00', 0x18a80, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000019c0)=[@in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e24, 0x1, @remote}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x20, @ipv4={[], [], @rand_addr=0x3}, 0x9}, @in6={0xa, 0x4e21, 0x7f, @mcast1, 0xffffffffffffffff}, @in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x14}}, @in6={0xa, 0x4e20, 0x3, @mcast1, 0x3}, @in6={0xa, 0x4e20, 0x101, @loopback, 0x4}, @in={0x2, 0x4e23, @remote}], 0xd8) 05:22:40 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x6, 0x83e4bb34aa5c6d3a) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000180)) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresgid(&(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) getgroups(0xa, &(0x7f00000000c0)=[r4, r4, r4, r5, r4, r3, r3, r5, r4, r4]) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) fchown(r1, 0x0, r6) 05:22:40 executing program 0 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 707.023354] RAX: ffffffffffffffda RBX: 0000000020000600 RCX: 0000000000457579 [ 707.030627] RDX: 0000000020000618 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 707.037901] RBP: 000000000072bf00 R08: 0000000020000618 R09: 00000000fbad8001 [ 707.045172] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007fa377fab6d4 [ 707.052443] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000003 05:22:40 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstat(r1, &(0x7f0000000040)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x400000000000024b, &(0x7f0000000300)=[0x0, r3]) fchown(r0, 0x0, r4) 05:22:40 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:40 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 707.133273] FAULT_INJECTION: forcing a failure. [ 707.133273] name failslab, interval 1, probability 0, space 0, times 0 [ 707.191753] FAULT_INJECTION: forcing a failure. [ 707.191753] name failslab, interval 1, probability 0, space 0, times 0 [ 707.200658] CPU: 1 PID: 15268 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 707.210271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.219628] Call Trace: [ 707.222241] dump_stack+0x1c4/0x2b4 [ 707.225882] ? dump_stack_print_info.cold.2+0x52/0x52 [ 707.231088] ? smk_access_entry+0x310/0x310 [ 707.235428] should_fail.cold.4+0xa/0x17 [ 707.239508] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 707.244635] ? shmem_setattr+0x50e/0xda0 [ 707.248709] ? lock_downgrade+0x900/0x900 [ 707.252872] ? current_time+0x72/0x1b0 [ 707.256778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.262324] ? timespec64_trunc+0xea/0x180 [ 707.266569] ? inode_init_owner+0x340/0x340 [ 707.270906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.276449] ? fsnotify+0xaae/0x12f0 [ 707.280184] ? fs_reclaim_acquire+0x20/0x20 [ 707.284534] ? lock_downgrade+0x900/0x900 [ 707.288706] ? ___might_sleep+0x1ed/0x300 [ 707.292879] ? arch_local_save_flags+0x40/0x40 [ 707.297474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.303033] __should_failslab+0x124/0x180 [ 707.307464] should_failslab+0x9/0x14 [ 707.312072] kmem_cache_alloc+0x2be/0x730 [ 707.316403] ? do_sys_ftruncate+0x428/0x550 [ 707.320738] ? lock_downgrade+0x900/0x900 [ 707.325073] getname_flags+0xd0/0x5a0 [ 707.328888] getname+0x19/0x20 [ 707.332090] do_sys_open+0x383/0x700 [ 707.335819] ? filp_open+0x80/0x80 [ 707.339376] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 707.344834] ? do_sys_ftruncate+0x449/0x550 [ 707.349170] __x64_sys_open+0x7e/0xc0 [ 707.352992] do_syscall_64+0x1b9/0x820 [ 707.356896] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 707.362274] ? syscall_return_slowpath+0x5e0/0x5e0 [ 707.367221] ? trace_hardirqs_on_caller+0x310/0x310 [ 707.372250] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 707.377278] ? recalc_sigpending_tsk+0x180/0x180 [ 707.382045] ? kasan_check_write+0x14/0x20 [ 707.386298] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 707.391862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.398184] RIP: 0033:0x4111d1 [ 707.402086] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 707.422218] RSP: 002b:00007f1bc1b10a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 707.429942] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111d1 05:22:40 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:40 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:40 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="2710", 0x86) [ 707.437225] RDX: 00007f1bc1b10afa RSI: 0000000000000002 RDI: 00007f1bc1b10af0 [ 707.444503] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 707.451774] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 707.459045] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000004 [ 707.466702] CPU: 0 PID: 15276 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 707.474868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.474874] Call Trace: [ 707.474899] dump_stack+0x1c4/0x2b4 [ 707.474921] ? dump_stack_print_info.cold.2+0x52/0x52 [ 707.496264] should_fail.cold.4+0xa/0x17 [ 707.496283] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 707.496299] ? smack_d_instantiate+0x136/0xea0 [ 707.496318] ? kasan_kmalloc+0xc7/0xe0 [ 707.506079] ? kasan_slab_alloc+0x12/0x20 [ 707.506094] ? __d_alloc+0xc8/0xcc0 [ 707.506112] ? alloc_file_pseudo+0x158/0x3f0 [ 707.519611] ? mark_held_locks+0x130/0x130 [ 707.527634] ? percpu_ref_put_many+0x11c/0x260 [ 707.527651] ? lock_downgrade+0x900/0x900 [ 707.527669] ? smack_d_instantiate+0x330/0xea0 [ 707.527684] ? lock_downgrade+0x900/0x900 [ 707.527705] ? fs_reclaim_acquire+0x20/0x20 [ 707.536532] ? lock_downgrade+0x900/0x900 [ 707.536551] ? ___might_sleep+0x1ed/0x300 [ 707.536567] ? arch_local_save_flags+0x40/0x40 [ 707.536581] ? lock_downgrade+0x900/0x900 [ 707.536604] __should_failslab+0x124/0x180 [ 707.575499] should_failslab+0x9/0x14 [ 707.579308] kmem_cache_alloc+0x2be/0x730 [ 707.583470] ? kasan_check_write+0x14/0x20 [ 707.588059] ? do_raw_spin_lock+0xc1/0x200 [ 707.592312] __alloc_file+0xa8/0x470 [ 707.596031] ? file_free_rcu+0xd0/0xd0 [ 707.600459] ? d_instantiate+0x79/0xa0 [ 707.604883] ? lock_downgrade+0x900/0x900 [ 707.609041] ? kasan_check_read+0x11/0x20 [ 707.613201] ? do_raw_spin_unlock+0xa7/0x2f0 [ 707.617642] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 707.622256] alloc_empty_file+0x72/0x170 [ 707.626331] alloc_file+0x5e/0x4d0 [ 707.629877] ? _raw_spin_unlock+0x2c/0x50 [ 707.634932] alloc_file_pseudo+0x261/0x3f0 [ 707.639178] ? alloc_file+0x4d0/0x4d0 05:22:41 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xfffffff4) 05:22:41 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27ff", 0x86) [ 707.643001] ? usercopy_warn+0x110/0x110 [ 707.647493] ? kasan_check_write+0x14/0x20 [ 707.652619] __shmem_file_setup.part.45+0x110/0x2a0 [ 707.657656] shmem_file_setup+0x65/0x90 [ 707.661825] __x64_sys_memfd_create+0x2af/0x4f0 [ 707.666683] ? memfd_fcntl+0x1230/0x1230 [ 707.670768] do_syscall_64+0x1b9/0x820 [ 707.674700] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 707.680122] ? syscall_return_slowpath+0x5e0/0x5e0 [ 707.685076] ? trace_hardirqs_on_caller+0x310/0x310 [ 707.690450] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 707.695482] ? recalc_sigpending_tsk+0x180/0x180 [ 707.700258] ? kasan_check_write+0x14/0x20 [ 707.704511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 707.709373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.714574] RIP: 0033:0x457579 [ 707.717776] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 707.737039] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 707.744848] RAX: ffffffffffffffda RBX: 0000000020000600 RCX: 0000000000457579 [ 707.752126] RDX: 0000000020000618 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 707.759401] RBP: 000000000072bf00 R08: 0000000020000618 R09: 00000000fbad8001 [ 707.766858] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007fa377fab6d4 [ 707.766866] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000003 05:22:41 executing program 1 (fault-call:3 fault-nth:7): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:41 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) ftruncate(r0, 0x4) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x3cb) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:41 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:41 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27ff", 0x86) 05:22:41 executing program 0 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:41 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000007f6f60"], 0xa}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) write$uinput_user_dev(r1, &(0x7f00000001c0)={'syz1\x00', {0x3ff8000, 0x9, 0xb92c, 0x7}, 0x48, [0x0, 0x0, 0x4, 0xffff, 0x6c0, 0x1, 0x5, 0x8, 0x5, 0x9, 0x5, 0x9, 0x80000001, 0x29, 0x8, 0x2, 0x9, 0xffffffffffff1453, 0x8, 0x20, 0x5, 0x8, 0x1, 0x2, 0xffffffff, 0x80, 0x0, 0x6, 0x8, 0x1, 0xbc3, 0x5, 0x1, 0x40, 0xfffffffffffffc2c, 0x1000, 0x2, 0x27a, 0x1000, 0x4, 0x4, 0x8001, 0x3, 0x800, 0x2, 0x4, 0x7, 0xff, 0xe933, 0x0, 0x1, 0x6, 0x3f, 0x0, 0xfffffffffffffffe, 0x1, 0x1f, 0x6, 0x8, 0x1, 0xfffffffffffffff7, 0x1ff, 0x8, 0xee6], [0x2, 0x4, 0x3, 0x8, 0x81, 0x0, 0x3, 0x0, 0x81, 0x23ac00000, 0x10000, 0x0, 0x3, 0x0, 0x8, 0x1, 0x1ff, 0x6, 0x96, 0x1000, 0x4, 0xfffffffeffffffff, 0x7, 0x400, 0x5, 0x2, 0x3f, 0x481, 0xfb6, 0xfffffffffffffffb, 0x8, 0x3f, 0x2, 0x571, 0x401, 0x2, 0x7, 0x342d, 0x1, 0x28, 0x80000000, 0x2, 0x2, 0x8, 0x15, 0x945, 0x4, 0x100000000, 0x80000001, 0x80000000, 0x100, 0x6c8, 0x1000, 0x9fac, 0x20, 0xfffffffffffffffd, 0x5, 0x8, 0xfffffffffffff801, 0x80000000, 0x6, 0x8, 0x1, 0x100], [0x7fffffff, 0x8, 0x7, 0x0, 0x3, 0x10001, 0x8, 0x0, 0x43, 0x15, 0x3, 0x1, 0xfffffffffffffff7, 0x2, 0x3, 0x1, 0x401, 0x7, 0x800, 0x1000, 0x401, 0x0, 0x1ff, 0x81, 0x4, 0x3, 0xd4, 0x2, 0x400, 0x5, 0x55, 0x9, 0x101, 0x400, 0xad68, 0x5, 0x100000000, 0x0, 0x8, 0xfffffffffffffff9, 0x20, 0x8, 0x0, 0x2, 0x401, 0x1f6d, 0x200, 0x400, 0x5, 0x6, 0x7, 0x6, 0xfc9a, 0x6, 0xff, 0x0, 0xc0, 0x7, 0x7, 0x3, 0x7fff, 0xffffffff00000000, 0x1f, 0x7], [0x5, 0x5, 0x29, 0x8, 0xc1, 0x9, 0x90, 0x7, 0x1, 0xfffffffffffffffe, 0xf8, 0x5, 0x8001, 0x7f, 0x81, 0x5, 0x1f, 0xfffffffffffffff7, 0x3, 0x400, 0xc06, 0x0, 0x893, 0xb54, 0xffffffffffff0000, 0xaf18, 0x800, 0x100, 0x7, 0x0, 0x4, 0xffffffffffff7e24, 0x20, 0x9, 0x9, 0x0, 0x3, 0x3, 0xffffffffffff8239, 0x1000, 0x8, 0x1, 0xa9, 0x7, 0x7, 0xbb, 0x8a72, 0x3, 0xffffffffffffffff, 0x2, 0x401, 0xbb0, 0xffffffffffffffc1, 0x0, 0x6, 0x3, 0x79b, 0x9, 0x10000, 0xfa1, 0x7e, 0x0, 0x81, 0x2]}, 0x45c) 05:22:41 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) getgroups(0x2, &(0x7f0000000300)=[0x0, r2]) fchown(r0, 0x0, r3) [ 707.910311] FAULT_INJECTION: forcing a failure. [ 707.910311] name failslab, interval 1, probability 0, space 0, times 0 05:22:41 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 707.981895] CPU: 0 PID: 15295 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 707.989227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.998932] Call Trace: [ 708.001542] dump_stack+0x1c4/0x2b4 [ 708.005208] ? dump_stack_print_info.cold.2+0x52/0x52 [ 708.010449] should_fail.cold.4+0xa/0x17 [ 708.014540] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 708.019838] ? smack_d_instantiate+0x136/0xea0 [ 708.024440] ? kasan_kmalloc+0xc7/0xe0 05:22:41 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x4e1c, @multicast2}, 0xfffffffffffffed5) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 708.028347] ? kasan_slab_alloc+0x12/0x20 [ 708.032507] ? __d_alloc+0xc8/0xcc0 [ 708.036142] ? alloc_file_pseudo+0x158/0x3f0 [ 708.040564] ? mark_held_locks+0x130/0x130 [ 708.044987] ? percpu_ref_put_many+0x11c/0x260 [ 708.049581] ? lock_downgrade+0x900/0x900 [ 708.053741] ? smack_d_instantiate+0x330/0xea0 [ 708.058328] ? lock_downgrade+0x900/0x900 [ 708.058350] ? fs_reclaim_acquire+0x20/0x20 [ 708.058365] ? lock_downgrade+0x900/0x900 [ 708.058385] ? ___might_sleep+0x1ed/0x300 [ 708.058405] ? arch_local_save_flags+0x40/0x40 05:22:41 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000dc9b8915041ac137e809367a74c65f725cf883f9e2250370533423593d0275ad1282c8613b3c13bc8198c64d103de82cc6b8096aac568f72c2cb608b2f92a2307b8f86fcfb86144bc1c2b2653150158ab2e074e8"], 0xa}, 0x0) [ 708.079700] ? lock_downgrade+0x900/0x900 [ 708.083863] __should_failslab+0x124/0x180 [ 708.088111] should_failslab+0x9/0x14 [ 708.091921] kmem_cache_alloc+0x2be/0x730 [ 708.096075] ? kasan_check_write+0x14/0x20 [ 708.100322] ? do_raw_spin_lock+0xc1/0x200 [ 708.104576] __alloc_file+0xa8/0x470 [ 708.108300] ? file_free_rcu+0xd0/0xd0 [ 708.112207] ? d_instantiate+0x79/0xa0 [ 708.116114] ? lock_downgrade+0x900/0x900 [ 708.120270] ? kasan_check_read+0x11/0x20 [ 708.124424] ? do_raw_spin_unlock+0xa7/0x2f0 [ 708.128846] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 708.128865] alloc_empty_file+0x72/0x170 [ 708.128880] alloc_file+0x5e/0x4d0 [ 708.128893] ? _raw_spin_unlock+0x2c/0x50 [ 708.128906] alloc_file_pseudo+0x261/0x3f0 [ 708.128919] ? alloc_file+0x4d0/0x4d0 [ 708.128935] ? usercopy_warn+0x110/0x110 [ 708.128953] ? kasan_check_write+0x14/0x20 [ 708.137602] __shmem_file_setup.part.45+0x110/0x2a0 [ 708.166574] shmem_file_setup+0x65/0x90 [ 708.170575] __x64_sys_memfd_create+0x2af/0x4f0 [ 708.175268] ? memfd_fcntl+0x1230/0x1230 [ 708.179355] do_syscall_64+0x1b9/0x820 [ 708.183265] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 708.188643] ? syscall_return_slowpath+0x5e0/0x5e0 [ 708.193594] ? trace_hardirqs_on_caller+0x310/0x310 [ 708.198629] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 708.203661] ? recalc_sigpending_tsk+0x180/0x180 [ 708.208431] ? kasan_check_write+0x14/0x20 [ 708.212683] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 708.217553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.222756] RIP: 0033:0x457579 [ 708.225958] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 708.225967] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 708.225988] RAX: ffffffffffffffda RBX: 0000000020000600 RCX: 0000000000457579 [ 708.259870] RDX: 0000000020000618 RSI: 0000000000000000 RDI: 00000000004bc7c9 [ 708.267152] RBP: 000000000072bf00 R08: 0000000020000618 R09: 00000000fbad8001 [ 708.274435] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 00007fa377fab6d4 [ 708.274444] R13: 00000000004c4a32 R14: 00000000004d7d88 R15: 0000000000000003 [ 708.403650] FAULT_INJECTION: forcing a failure. [ 708.403650] name failslab, interval 1, probability 0, space 0, times 0 [ 708.430577] CPU: 1 PID: 15317 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 708.437905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.447297] Call Trace: [ 708.449916] dump_stack+0x1c4/0x2b4 [ 708.453565] ? dump_stack_print_info.cold.2+0x52/0x52 [ 708.458769] ? update_curr+0x4ec/0xbe0 [ 708.462690] should_fail.cold.4+0xa/0x17 [ 708.466783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.472341] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 708.477460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.483014] ? __perf_event_task_sched_out+0x337/0x1ab0 [ 708.488399] ? debug_smp_processor_id+0x1c/0x20 [ 708.493089] ? update_load_avg+0x2470/0x2470 [ 708.497523] ? mark_held_locks+0x130/0x130 [ 708.501783] ? fs_reclaim_acquire+0x20/0x20 [ 708.506122] ? lock_downgrade+0x900/0x900 [ 708.510306] ? ___might_sleep+0x1ed/0x300 [ 708.514481] ? arch_local_save_flags+0x40/0x40 [ 708.519082] ? mark_held_locks+0x130/0x130 [ 708.523346] __should_failslab+0x124/0x180 [ 708.527595] should_failslab+0x9/0x14 [ 708.531410] kmem_cache_alloc+0x2be/0x730 [ 708.535580] ? mark_held_locks+0x130/0x130 [ 708.539828] __alloc_file+0xa8/0x470 [ 708.543555] ? file_free_rcu+0xd0/0xd0 [ 708.547468] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 708.552533] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 708.557317] ? is_bpf_text_address+0xac/0x170 [ 708.561842] ? lock_downgrade+0x900/0x900 [ 708.566006] alloc_empty_file+0x72/0x170 [ 708.570083] path_openat+0x170/0x5160 [ 708.573898] ? rcu_bh_qs+0xc0/0xc0 [ 708.577451] ? unwind_dump+0x190/0x190 [ 708.581366] ? is_bpf_text_address+0xd3/0x170 [ 708.585873] ? kernel_text_address+0x79/0xf0 [ 708.590300] ? path_lookupat.isra.43+0xc00/0xc00 [ 708.595071] ? unwind_get_return_address+0x61/0xa0 [ 708.600019] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 708.605053] ? expand_files.part.8+0x571/0x9a0 [ 708.609668] ? iterate_fd+0x4b0/0x4b0 [ 708.613495] ? __alloc_fd+0x347/0x6e0 [ 708.617326] ? lock_downgrade+0x900/0x900 [ 708.621645] ? getname+0x19/0x20 [ 708.625031] ? kasan_check_read+0x11/0x20 [ 708.629195] ? do_raw_spin_unlock+0xa7/0x2f0 [ 708.633612] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 708.638198] ? kasan_check_write+0x14/0x20 [ 708.642445] ? do_raw_spin_lock+0xc1/0x200 [ 708.646693] ? _raw_spin_unlock+0x2c/0x50 [ 708.650860] ? __alloc_fd+0x347/0x6e0 [ 708.654682] do_filp_open+0x255/0x380 [ 708.658499] ? may_open_dev+0x100/0x100 [ 708.662499] ? get_unused_fd_flags+0x122/0x1a0 [ 708.667104] ? __alloc_fd+0x6e0/0x6e0 [ 708.670927] do_sys_open+0x568/0x700 [ 708.674657] ? filp_open+0x80/0x80 [ 708.678210] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 708.683679] ? do_sys_ftruncate+0x449/0x550 [ 708.688030] __x64_sys_open+0x7e/0xc0 [ 708.691857] do_syscall_64+0x1b9/0x820 [ 708.695761] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 708.701143] ? syscall_return_slowpath+0x5e0/0x5e0 [ 708.706092] ? trace_hardirqs_on_caller+0x310/0x310 [ 708.711127] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 708.716161] ? recalc_sigpending_tsk+0x180/0x180 [ 708.720934] ? kasan_check_write+0x14/0x20 [ 708.725184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 708.730044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.735247] RIP: 0033:0x4111d1 [ 708.738451] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 708.757631] RSP: 002b:00007f1bc1b10a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 708.765833] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111d1 [ 708.773113] RDX: 00007f1bc1b10afa RSI: 0000000000000002 RDI: 00007f1bc1b10af0 [ 708.780392] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 708.787667] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 708.794949] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000004 05:22:42 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xfffffdef) 05:22:42 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r1}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)="04"}, 0x20) close(r2) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:42 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:42 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001400)='/dev/zero\x00', 0x60000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000015c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001740)=0x0, &(0x7f0000001780), &(0x7f00000017c0)) r4 = getgid() setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000002a00)=@nat={'nat\x00', 0x19, 0x6, 0x11f0, [0x20001800, 0x0, 0x0, 0x20001830, 0x20001a90], 0x0, &(0x7f0000001440), &(0x7f0000001800)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x1d, 0x8877, 'yam0\x00', 'ip6gretap0\x00', 'bond0\x00', 'bond_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}, {{{0x11, 0x21, 0xf7, 'bcsh0\x00', 'ip6gretap0\x00', 'bridge_slave_1\x00', 'veth1\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xd0, 0x150, 0x188, [@m802_3={'802_3\x00', 0x8, {{0xfc, 0x10, 0x0, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0xe, 0x8000, 0x6, 0x2}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x10000, 0xfffffffffffffc00, 0x1}}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x5, 0x48, 0x8ebf, 'gre0\x00', 'team_slave_0\x00', 'veth1_to_bond\x00', 'teql0\x00', @local, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @remote, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x120, 0x120, 0x158, [@rateest={'rateest\x00', 0x48, {{'bond0\x00', 'teql0\x00', 0x29, 0x0, 0x9, 0x200, 0x8, 0x9, 0x6, 0x20}}}, @owner={'owner\x00', 0x18, {{r1, r2, r3, r4, 0x0, 0x1}}}]}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}, {{{0x3, 0x42, 0x8835, 'gre0\x00', 'ip6_vti0\x00', 'syzkaller1\x00', 'veth0\x00', @empty, [0xff, 0xff, 0x0, 0x0, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x140, 0x178, 0x1c0, [@arp={'arp\x00', 0x38, {{0x1, 0x884c, 0xb, @multicast2, 0xff, @multicast1, 0xff, @empty, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x10, 0x4c}}}, @rateest={'rateest\x00', 0x48, {{'bond_slave_0\x00', 'bcsh0\x00', 0x1, 0x3, 0x10001, 0x101, 0x1ff, 0x5, 0x8000, 0xb1}}}]}, [@snat={'snat\x00', 0x10, {{@link_local, 0x10}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x0, 0x774f, 0x80000000}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x2, [{{{0x9, 0x8, 0x998e, 'veth0_to_team\x00', 'bond_slave_1\x00', 'sit0\x00', 'bpq0\x00', @local, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="9afac65fe32e", [0x0, 0xff, 0x0, 0xff, 0xff], 0x138, 0x170, 0x1a8, [@physdev={'physdev\x00', 0x70, {{'bpq0\x00', {}, 'syzkaller0\x00', {0xff}, 0x1, 0x4}}}, @state={'state\x00', 0x8, {{0x6}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@random="72e8335d3cc9"}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xfffffffffffffffe}}}}, {{{0x11, 0x2, 0x600b, 'syzkaller0\x00', 'syzkaller1\x00', 'veth0\x00', 'bridge_slave_0\x00', @local, [0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0x9b0, 0xa10, 0xa40, [@among={'among\x00', 0x8a0, {{0x0, 0xff, 0x3c4c3940c12b701a, {[0x100, 0x8, 0xfffffffffffffff8, 0x4, 0x8, 0x5, 0x0, 0xdf4, 0x10001, 0x7, 0x9, 0x1, 0x9e13, 0x7, 0x8, 0x3, 0x81, 0xd4d, 0x4, 0x7, 0x3, 0x9, 0x9, 0xfffffffffffffff8, 0x0, 0xfffffffffffffff9, 0x0, 0xb33e, 0x16, 0x4, 0x9964, 0x5, 0x9123, 0x6, 0x7, 0x9, 0x1ff, 0xfffffffffffffffd, 0x2, 0xca2, 0xfff, 0x9feb, 0x8, 0x8, 0x1, 0xe000000, 0x1, 0x10c, 0xe1, 0x8, 0x6, 0x5, 0x7b51, 0x8, 0x4, 0xfffffffffffffff7, 0x6, 0x8, 0x1, 0x80000000, 0x80000000, 0x2, 0x7, 0x2, 0x3, 0x5, 0x101, 0x4, 0x8, 0xffffffffffffff5d, 0x53, 0x47734c57, 0x5, 0xff, 0x100000000, 0x5, 0x100, 0x1, 0x3, 0x6, 0x3, 0x0, 0x0, 0x3f, 0x2, 0x8, 0x8, 0x2, 0x7f, 0xa9, 0x2, 0x8, 0x3f, 0xff, 0xb80e, 0x7f8f, 0x7f, 0xaf, 0x7, 0x800, 0x3f, 0x0, 0x6af, 0x2ac, 0x1, 0x3f, 0x1, 0x81, 0xfd19, 0x8, 0x9, 0xae2, 0x1000, 0xfffffffffffffffe, 0x4, 0x3f, 0x400, 0x6, 0x3, 0x7, 0x2, 0x7, 0x0, 0x4, 0x898b, 0x8, 0x80, 0xfffffffffffffffc, 0x5, 0x1b, 0xffffffffffffffff, 0x4, 0x4, 0x18, 0x1, 0x4, 0x3f, 0x1, 0x2, 0x10000, 0x9, 0x559, 0x7, 0xfffffffffffffff8, 0x0, 0x7, 0x2, 0x0, 0x6, 0x2, 0x5, 0x4, 0x5, 0x5, 0xa3, 0x0, 0x7, 0x401, 0x8, 0x65e1, 0x6, 0x0, 0x83ae, 0x8, 0x6, 0xffffffff, 0x5, 0x6, 0x3, 0xf735, 0x7f, 0x101, 0x5, 0x8, 0x401, 0x8, 0x7fffffff, 0x100000000, 0x2, 0x3bb, 0xa366, 0x7f8, 0xd73, 0x5a96, 0x4, 0x6, 0x3f, 0x4, 0x10001, 0x4, 0x30, 0x1c, 0x5, 0x8, 0x2, 0x9, 0x9, 0x3f, 0x8e3, 0xfffffffffffffe00, 0x5, 0x7, 0x101, 0x4, 0xfffffffffffff8b5, 0x2a0, 0x80000001, 0x5d2, 0x4, 0xb4, 0x7f, 0xde0, 0x10001, 0x2, 0x1f, 0x47, 0x2, 0x1, 0x2, 0x8, 0x8, 0x20, 0x1, 0x1e, 0x200000000000000, 0x401, 0x200, 0x10001, 0xce, 0x400, 0x2, 0x400, 0xffffffffffff8000, 0x400, 0x100000001, 0x3, 0x3, 0x80000001, 0x962, 0x3, 0x7ff, 0x3, 0x5, 0x8, 0x20, 0x268e, 0x0, 0x8000, 0xffffffffffffffff, 0x4, 0x14c, 0x1, 0xac, 0x0, 0x8, 0xfffffffffffffffe, 0x11bc], 0x6, [{[0x5, 0xfff], @multicast2}, {[0x6, 0x800], @remote}, {[0xffffffffffffff59, 0x3ff]}, {[0xffffffffa37476aa, 0x1ff], @loopback}, {[0x3, 0x400], @multicast2}, {[0x4, 0x8], @loopback}]}, {[0x0, 0x7ff, 0x10001, 0xeba4, 0x5, 0xffff, 0x1, 0x100, 0x6, 0x1000, 0x57be, 0x1, 0x1, 0x2eed, 0x7, 0xffff, 0x6, 0xc851, 0x101, 0x8, 0x1, 0x1, 0x1, 0xfffffffffffffffd, 0x0, 0x9a8b, 0x0, 0x6, 0x100000001, 0x3, 0x3, 0x2239, 0x3, 0x10001, 0x2, 0x7, 0xfb60, 0x9, 0x180000000000000, 0x6, 0x9, 0x5, 0x401, 0x1000, 0x9, 0x9, 0x1000, 0x10000, 0x7f, 0x12, 0x1, 0x3b0, 0x9, 0x7, 0xa4a, 0x5, 0x5, 0x100000, 0x4, 0x2, 0x8001, 0x101, 0x7, 0x9, 0xd6, 0xffffffffffffff83, 0x3, 0x3, 0x8, 0x9, 0x8, 0x0, 0x0, 0x3, 0x8000, 0x2, 0x7, 0x4, 0x35, 0x8, 0x2, 0x83b, 0x7fffffff, 0x7, 0x3ff, 0x7fff, 0x3, 0xa8d, 0xfffffffffffffffd, 0x3, 0x6, 0x45, 0x0, 0x6, 0x7, 0x4a8, 0x6, 0x0, 0x6674960d, 0x1, 0x3, 0x80000000, 0x1ff, 0x0, 0x2, 0x95c3, 0x7, 0x7, 0x6, 0x2, 0x3, 0x7636578b, 0x80000000, 0x7ff, 0x418, 0x1000, 0x80, 0xc7, 0xffffffffffffff37, 0x1, 0x4, 0x80000000, 0x2, 0x8000000100000000, 0x80000001, 0x19, 0x7ff, 0x73, 0x2b0, 0xd6, 0x6ae42eb8, 0x2, 0x5c7, 0x2, 0x7, 0x200, 0x8, 0x5, 0x80000001, 0x2, 0xe5e, 0x7, 0x1, 0x401, 0x0, 0x9c2, 0x7, 0x2, 0x9, 0x7, 0x1, 0x0, 0x3, 0x2, 0x6, 0x6, 0x4, 0x3fe000000000000, 0x7ff, 0x8, 0x8, 0x7, 0xf9f, 0x5, 0xba0, 0x4, 0xa6d, 0x6, 0x3800000000000, 0x2, 0x8001, 0x3f7e, 0x9, 0x20, 0x6, 0x2, 0x6, 0xfff, 0xffffffffffffff01, 0x0, 0x155e9351, 0x4, 0x0, 0x1f, 0x8, 0x120000000000, 0x1, 0xffffffffffffdc69, 0x7, 0x3, 0x5, 0x9, 0x0, 0x5, 0x7, 0x8, 0x7fff, 0x100000001, 0x2, 0x9, 0x8, 0x58c, 0x400, 0x55, 0x7ff, 0x3, 0x0, 0x20000000, 0x6, 0x7, 0x2, 0x3, 0xf738, 0x4e80c883, 0x5, 0x7, 0x0, 0x1f, 0x3f, 0x1, 0x10001, 0x401, 0x6, 0x80000001, 0x9, 0x4, 0x401, 0x2, 0x40b8, 0x8, 0x1, 0x7, 0x0, 0x7, 0x882c, 0x3ff, 0x9, 0x1, 0x3, 0x80, 0x1, 0x0, 0x5d, 0x1ff, 0x10001, 0x2, 0x5, 0xf7b, 0x6, 0x8c, 0x10001, 0x400, 0x2, 0x4a034079, 0x6, 0x0, 0x8001], 0x5, [{[0x4, 0x2], @remote}, {[0x10000, 0x9], @broadcast}, {[0x9, 0x2], @local}, {[0x9, 0x8000], @loopback}, {[0x7, 0x80e7], @broadcast}]}}}}, @ip6={'ip6\x00', 0x50, {{@ipv4={[], [], @broadcast}, @remote, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffffff], 0x8000, 0x89, 0xa, 0x10, 0x4e22, 0x4e21, 0x4e21, 0x4e20}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x38}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x3ff}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x200}}}}]}]}, 0x1268) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000040)=0x0) ptrace$getregs(0xc, r6, 0x9, &(0x7f00000003c0)=""/4096) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) fchown(r5, 0x0, r7) 05:22:42 executing program 0 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:42 executing program 1 (fault-call:3 fault-nth:8): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 709.050604] FAULT_INJECTION: forcing a failure. [ 709.050604] name failslab, interval 1, probability 0, space 0, times 0 [ 709.068532] FAULT_INJECTION: forcing a failure. [ 709.068532] name failslab, interval 1, probability 0, space 0, times 0 [ 709.086893] CPU: 0 PID: 15328 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 709.094299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.103657] Call Trace: [ 709.106273] dump_stack+0x1c4/0x2b4 [ 709.109924] ? dump_stack_print_info.cold.2+0x52/0x52 [ 709.115128] ? mark_held_locks+0x130/0x130 [ 709.119375] ? mark_held_locks+0x130/0x130 [ 709.123630] should_fail.cold.4+0xa/0x17 [ 709.127705] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 709.132812] ? up_read+0x110/0x110 [ 709.136357] ? down_read+0x1d0/0x1d0 [ 709.140082] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 709.145628] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 709.151178] ? lock_acquire+0x1ed/0x520 [ 709.155173] ? lo_ioctl+0x8e/0x1d80 [ 709.158815] ? lock_release+0x970/0x970 [ 709.162795] ? arch_local_save_flags+0x40/0x40 [ 709.167393] ? fs_reclaim_acquire+0x20/0x20 [ 709.171724] ? lock_downgrade+0x900/0x900 [ 709.175912] ? ___might_sleep+0x1ed/0x300 [ 709.180067] ? arch_local_save_flags+0x40/0x40 [ 709.184674] __should_failslab+0x124/0x180 [ 709.188920] should_failslab+0x9/0x14 [ 709.192730] kmem_cache_alloc_trace+0x2d7/0x750 [ 709.197421] __kthread_create_on_node+0x137/0x540 [ 709.202276] ? loop_get_status64+0x140/0x140 [ 709.206695] ? __kthread_parkme+0x1a0/0x1a0 [ 709.211040] ? ksys_dup3+0x680/0x680 [ 709.214758] ? __lockdep_init_map+0x105/0x590 [ 709.219290] ? __lockdep_init_map+0x105/0x590 [ 709.223792] ? loop_get_status64+0x140/0x140 [ 709.228222] kthread_create_on_node+0xb1/0xe0 [ 709.232727] ? __kthread_create_on_node+0x540/0x540 [ 709.237757] ? kasan_check_read+0x11/0x20 [ 709.241917] lo_ioctl+0x7f6/0x1d80 [ 709.245472] ? lo_rw_aio_complete+0x470/0x470 [ 709.249976] blkdev_ioctl+0x9ac/0x2010 [ 709.253886] ? blkpg_ioctl+0xc10/0xc10 [ 709.257777] ? lock_downgrade+0x900/0x900 [ 709.261935] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 709.267746] ? save_stack+0x43/0xd0 [ 709.271379] ? __kasan_slab_free+0x102/0x150 [ 709.275801] ? __fget+0x4d1/0x740 [ 709.279270] ? ksys_dup3+0x680/0x680 [ 709.282993] ? kasan_check_write+0x14/0x20 [ 709.287247] block_ioctl+0xee/0x130 [ 709.290884] ? blkdev_fallocate+0x400/0x400 [ 709.295225] do_vfs_ioctl+0x1de/0x1720 [ 709.299122] ? trace_hardirqs_on+0xbd/0x310 [ 709.303449] ? ioctl_preallocate+0x300/0x300 [ 709.307865] ? memset+0x31/0x40 [ 709.311148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.316694] ? smack_file_ioctl+0x210/0x3c0 [ 709.321023] ? fget_raw+0x20/0x20 [ 709.324484] ? smack_file_lock+0x2e0/0x2e0 [ 709.328730] ? putname+0xf2/0x130 [ 709.332209] ? do_sys_open+0x3ac/0x700 [ 709.336113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.341657] ? security_file_ioctl+0x94/0xc0 [ 709.346084] ksys_ioctl+0xa9/0xd0 [ 709.349549] __x64_sys_ioctl+0x73/0xb0 [ 709.353446] do_syscall_64+0x1b9/0x820 [ 709.357339] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 709.362710] ? syscall_return_slowpath+0x5e0/0x5e0 [ 709.367648] ? trace_hardirqs_on_caller+0x310/0x310 [ 709.372673] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 709.377694] ? recalc_sigpending_tsk+0x180/0x180 [ 709.382458] ? kasan_check_write+0x14/0x20 [ 709.386706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 709.391567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.396758] RIP: 0033:0x4573e7 [ 709.399954] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 709.418879] RSP: 002b:00007f1bc1b10a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 709.426596] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573e7 [ 709.433880] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 709.441195] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 709.448475] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 709.455743] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000004 [ 709.478935] CPU: 1 PID: 15325 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 709.486352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.495713] Call Trace: [ 709.498345] dump_stack+0x1c4/0x2b4 [ 709.502006] ? dump_stack_print_info.cold.2+0x52/0x52 [ 709.507222] ? lock_downgrade+0x900/0x900 [ 709.511403] should_fail.cold.4+0xa/0x17 [ 709.515491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 709.520620] ? up_write+0x7b/0x220 [ 709.524174] ? up_read+0x110/0x110 [ 709.527735] ? down_read+0x1d0/0x1d0 [ 709.531483] ? generic_file_write_iter+0x4a1/0x870 [ 709.536435] ? fs_reclaim_acquire+0x20/0x20 [ 709.540769] ? lock_downgrade+0x900/0x900 [ 709.544936] ? ___might_sleep+0x1ed/0x300 [ 709.549097] ? arch_local_save_flags+0x40/0x40 [ 709.553698] ? vfs_write+0x2f3/0x560 [ 709.557432] ? lock_downgrade+0x900/0x900 [ 709.561603] __should_failslab+0x124/0x180 [ 709.565862] should_failslab+0x9/0x14 [ 709.569691] kmem_cache_alloc+0x2be/0x730 [ 709.573856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.579408] ? check_preemption_disabled+0x48/0x200 [ 709.584448] getname_flags+0xd0/0x5a0 [ 709.588268] getname+0x19/0x20 [ 709.591480] do_sys_open+0x383/0x700 [ 709.595225] ? filp_open+0x80/0x80 [ 709.598917] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 709.604388] ? do_sys_ftruncate+0x449/0x550 [ 709.609125] __x64_sys_open+0x7e/0xc0 [ 709.613190] do_syscall_64+0x1b9/0x820 [ 709.617098] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 709.622890] ? syscall_return_slowpath+0x5e0/0x5e0 [ 709.628017] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 709.632867] ? trace_hardirqs_on_caller+0x310/0x310 [ 709.637891] ? prepare_exit_to_usermode+0x291/0x3b0 [ 709.642918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 709.647782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.653990] RIP: 0033:0x4111d1 [ 709.657194] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 709.676909] RSP: 002b:00007fa377faaa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 709.684622] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004111d1 [ 709.692295] RDX: 00007fa377faaafa RSI: 0000000000000002 RDI: 00007fa377faaaf0 05:22:42 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27e0", 0x86) 05:22:42 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="2705", 0x86) 05:22:42 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27fe", 0x86) 05:22:43 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:43 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffff9c, 0x111, 0x2, 0x0, 0x4) [ 709.699878] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 709.707471] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 709.715088] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:43 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000600)={'bond_slave_0\x00', @ifru_data=&(0x7f00000005c0)="54ed39a43efc97ee68f5d2858355613314bf0770a2bc02c78e4084e737f92055"}) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) connect$can_bcm(r0, &(0x7f0000000340), 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000580)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0x7aaaaceb, @empty, 0x1}], 0x2c) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) openat$uinput(0xffffffffffffff9c, &(0x7f0000000540)='/dev/uinput\x00', 0x0, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f00000004c0)={[{0x3, 0x3f, 0x101, 0x9, 0x5, 0x3, 0x6, 0x1, 0xfffffffffffffff8, 0x2, 0xe3c2, 0xa35, 0x1}, {0x10001, 0x1, 0xd3eb, 0x4efe, 0xfffffffffffffffb, 0x8, 0x80000000, 0x100000000, 0x6, 0x200, 0x100000000, 0x2, 0x7fffffff}, {0x3d38, 0x5, 0x5, 0xfffffffffffffff9, 0x35a, 0x3f, 0xff, 0x5, 0x751265f8, 0x6, 0x7, 0xfffffffffffffffb, 0x1}], 0x3}) geteuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) fchown(r1, r4, r3) 05:22:43 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xfdef) 05:22:43 executing program 1 (fault-call:3 fault-nth:9): syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:43 executing program 0 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:43 executing program 5: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1, 0x1f}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(0xffffffffffffffff, 0x0, r3) 05:22:43 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\b', 0x86) 05:22:43 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="06000000090000000000"], 0xa}, 0x0) [ 710.076899] FAULT_INJECTION: forcing a failure. [ 710.076899] name failslab, interval 1, probability 0, space 0, times 0 [ 710.099276] FAULT_INJECTION: forcing a failure. [ 710.099276] name failslab, interval 1, probability 0, space 0, times 0 [ 710.111966] CPU: 1 PID: 15368 Comm: syz-executor1 Not tainted 4.19.0-rc6+ #48 [ 710.119288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.119296] Call Trace: [ 710.119331] dump_stack+0x1c4/0x2b4 [ 710.119359] ? dump_stack_print_info.cold.2+0x52/0x52 [ 710.140118] ? update_curr+0x200/0xbe0 [ 710.144026] should_fail.cold.4+0xa/0x17 [ 710.148107] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 710.148140] ? __cpu_to_node+0x7d/0xa0 [ 710.148162] ? account_entity_enqueue+0x3a3/0x660 [ 710.161969] ? check_preemption_disabled+0x48/0x200 [ 710.166990] ? enqueue_entity+0x34b/0x1ff0 [ 710.171232] ? update_curr+0x200/0xbe0 [ 710.175151] ? put_prev_task_fair+0x80/0x80 [ 710.179494] ? fs_reclaim_acquire+0x20/0x20 [ 710.184157] ? lock_downgrade+0x900/0x900 [ 710.188324] ? ___might_sleep+0x1ed/0x300 [ 710.192478] ? arch_local_save_flags+0x40/0x40 [ 710.197093] ? __enqueue_entity+0x10d/0x1f0 [ 710.201549] __should_failslab+0x124/0x180 [ 710.206375] should_failslab+0x9/0x14 [ 710.211022] kmem_cache_alloc+0x2be/0x730 [ 710.215599] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 710.220734] __kernfs_new_node+0x127/0x8d0 [ 710.225703] ? trace_hardirqs_on+0x310/0x310 [ 710.230996] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 710.235763] ? task_fork_fair+0x6d0/0x6d0 [ 710.240094] ? enqueue_entity+0x1ff0/0x1ff0 [ 710.244427] ? try_to_wake_up+0x10a/0x12f0 [ 710.249775] ? lock_downgrade+0x900/0x900 [ 710.254302] ? check_preempt_curr+0x3a0/0x3a0 [ 710.259396] ? trace_hardirqs_on+0xbd/0x310 [ 710.263853] ? kasan_check_read+0x11/0x20 [ 710.268014] ? dequeue_task_fair+0xf9/0x9a0 [ 710.272541] kernfs_new_node+0x95/0x120 [ 710.276669] kernfs_create_dir_ns+0x4d/0x160 [ 710.281330] internal_create_group+0x5fc/0xd80 [ 710.286410] ? remove_files.isra.1+0x190/0x190 [ 710.291979] ? up_write+0x7b/0x220 [ 710.296462] ? up_read+0x110/0x110 [ 710.300003] ? down_read+0x1d0/0x1d0 [ 710.303913] ? kasan_check_write+0x14/0x20 [ 710.309090] sysfs_create_group+0x1f/0x30 [ 710.313248] lo_ioctl+0x1310/0x1d80 [ 710.316900] ? lo_rw_aio_complete+0x470/0x470 [ 710.321766] blkdev_ioctl+0x9ac/0x2010 [ 710.325661] ? blkpg_ioctl+0xc10/0xc10 [ 710.329559] ? lock_downgrade+0x900/0x900 [ 710.333723] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 710.339537] ? save_stack+0x43/0xd0 [ 710.343163] ? __kasan_slab_free+0x102/0x150 [ 710.347589] ? __fget+0x4d1/0x740 [ 710.351050] ? ksys_dup3+0x680/0x680 [ 710.354775] ? kasan_check_write+0x14/0x20 [ 710.359031] block_ioctl+0xee/0x130 [ 710.362664] ? blkdev_fallocate+0x400/0x400 [ 710.366991] do_vfs_ioctl+0x1de/0x1720 [ 710.370887] ? trace_hardirqs_on+0xbd/0x310 [ 710.375213] ? ioctl_preallocate+0x300/0x300 [ 710.379628] ? memset+0x31/0x40 [ 710.382918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.388464] ? smack_file_ioctl+0x210/0x3c0 [ 710.393403] ? fget_raw+0x20/0x20 [ 710.396858] ? smack_file_lock+0x2e0/0x2e0 [ 710.401092] ? putname+0xf2/0x130 [ 710.404556] ? do_sys_open+0x3ac/0x700 [ 710.408449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.413989] ? security_file_ioctl+0x94/0xc0 [ 710.418406] ksys_ioctl+0xa9/0xd0 [ 710.421863] __x64_sys_ioctl+0x73/0xb0 [ 710.425753] do_syscall_64+0x1b9/0x820 [ 710.429647] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 710.435019] ? syscall_return_slowpath+0x5e0/0x5e0 [ 710.439956] ? trace_hardirqs_on_caller+0x310/0x310 [ 710.444981] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 710.450004] ? recalc_sigpending_tsk+0x180/0x180 [ 710.454757] ? kasan_check_write+0x14/0x20 [ 710.459004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 710.463855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.469046] RIP: 0033:0x4573e7 [ 710.472254] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 710.491157] RSP: 002b:00007f1bc1b10a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 710.498879] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573e7 [ 710.506143] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 710.513412] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 710.520685] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 05:22:43 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) ioctl$UI_DEV_DESTROY(r0, 0x5502) 05:22:43 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:43 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) socket$rds(0x15, 0x5, 0x0) [ 710.527966] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000004 [ 710.535259] CPU: 0 PID: 15363 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 710.542541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.551886] Call Trace: [ 710.551909] dump_stack+0x1c4/0x2b4 [ 710.551930] ? dump_stack_print_info.cold.2+0x52/0x52 [ 710.551946] ? mark_held_locks+0x130/0x130 [ 710.551969] should_fail.cold.4+0xa/0x17 [ 710.551990] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 710.556624] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 710.558205] ? is_bpf_text_address+0xac/0x170 [ 710.558243] ? mark_held_locks+0x130/0x130 [ 710.594431] ? fs_reclaim_acquire+0x20/0x20 [ 710.598769] ? lock_downgrade+0x900/0x900 [ 710.602934] ? ___might_sleep+0x1ed/0x300 [ 710.607093] ? arch_local_save_flags+0x40/0x40 [ 710.611688] ? mark_held_locks+0x130/0x130 [ 710.615945] __should_failslab+0x124/0x180 [ 710.620202] should_failslab+0x9/0x14 [ 710.624025] kmem_cache_alloc+0x2be/0x730 05:22:43 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x15, 0x0, 0x909, 0xffffffff, 0x80000000}, 0x7fffffff}, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) r4 = request_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='vmnet0vmnet1trusted\x00', 0xfffffffffffffff9) keyctl$get_persistent(0x16, r3, r4) [ 710.628187] ? mark_held_locks+0x130/0x130 [ 710.632464] __alloc_file+0xa8/0x470 [ 710.636211] ? file_free_rcu+0xd0/0xd0 [ 710.640123] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 710.645148] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 710.649919] ? is_bpf_text_address+0xac/0x170 [ 710.654927] ? lock_downgrade+0x900/0x900 [ 710.659092] alloc_empty_file+0x72/0x170 [ 710.663168] path_openat+0x170/0x5160 [ 710.663187] ? rcu_bh_qs+0xc0/0xc0 [ 710.663212] ? unwind_dump+0x190/0x190 [ 710.663241] ? is_bpf_text_address+0xd3/0x170 [ 710.678940] ? kernel_text_address+0x79/0xf0 [ 710.678959] ? path_lookupat.isra.43+0xc00/0xc00 [ 710.678974] ? unwind_get_return_address+0x61/0xa0 [ 710.678995] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 710.698095] ? expand_files.part.8+0x571/0x9a0 [ 710.702697] ? iterate_fd+0x4b0/0x4b0 [ 710.706515] ? __alloc_fd+0x347/0x6e0 [ 710.710327] ? lock_downgrade+0x900/0x900 [ 710.714486] ? getname+0x19/0x20 [ 710.717866] ? kasan_check_read+0x11/0x20 [ 710.722025] ? do_raw_spin_unlock+0xa7/0x2f0 05:22:44 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r1) 05:22:44 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x5}, 0x10) [ 710.726445] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 710.731035] ? kasan_check_write+0x14/0x20 [ 710.735279] ? do_raw_spin_lock+0xc1/0x200 [ 710.739521] ? _raw_spin_unlock+0x2c/0x50 [ 710.743679] ? __alloc_fd+0x347/0x6e0 [ 710.747499] do_filp_open+0x255/0x380 [ 710.751307] ? may_open_dev+0x100/0x100 [ 710.755299] ? get_unused_fd_flags+0x122/0x1a0 [ 710.755315] ? __alloc_fd+0x6e0/0x6e0 [ 710.755339] do_sys_open+0x568/0x700 [ 710.755357] ? filp_open+0x80/0x80 [ 710.771483] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 710.776947] ? do_sys_ftruncate+0x449/0x550 [ 710.781284] __x64_sys_open+0x7e/0xc0 [ 710.781304] do_syscall_64+0x1b9/0x820 [ 710.781320] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 710.781340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 710.794382] ? trace_hardirqs_on_caller+0x310/0x310 [ 710.794400] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 710.794420] ? recalc_sigpending_tsk+0x180/0x180 [ 710.814112] ? kasan_check_write+0x14/0x20 [ 710.814134] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 710.814156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.814173] RIP: 0033:0x4111d1 [ 710.824422] RDS: rds_bind could not find a transport for ::ffff:0.0.0.5, load rds_tcp or rds_rdma? [ 710.828425] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 710.828434] RSP: 002b:00007fa377faaa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 710.828449] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004111d1 [ 710.828459] RDX: 00007fa377faaafa RSI: 0000000000000002 RDI: 00007fa377faaaf0 [ 710.828467] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 710.828475] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 710.828484] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:44 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xf4) 05:22:44 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:44 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27c8", 0x86) 05:22:44 executing program 0 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:44 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@rand_addr, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000180)=0xe8) fchown(r1, r3, r2) 05:22:44 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x200) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8000, 0x8, 0x0, 0x0, 0x800}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r2, 0x4) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:44 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 711.003001] FAULT_INJECTION: forcing a failure. [ 711.003001] name failslab, interval 1, probability 0, space 0, times 0 05:22:44 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="10000000000000000000"], 0xa}, 0x0) 05:22:44 executing program 5: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x7d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x2, 0x0, 0x80, 0x5, 0x0}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r2, 0x0, 0x30}, &(0x7f00000000c0)=0xc) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000580)={0x2, 0x0, [{0x3000, 0x0, &(0x7f0000000280)=""/76}, {0xf002, 0x0, &(0x7f00000003c0)=""/254}, {0x0, 0x0, &(0x7f00000004c0)=""/184}]}) fchown(r0, 0x0, r3) [ 711.044337] CPU: 0 PID: 15401 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 711.051657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.061776] Call Trace: [ 711.064391] dump_stack+0x1c4/0x2b4 [ 711.068041] ? dump_stack_print_info.cold.2+0x52/0x52 [ 711.073253] ? mark_held_locks+0x130/0x130 [ 711.077510] ? mark_held_locks+0x130/0x130 [ 711.081768] should_fail.cold.4+0xa/0x17 [ 711.081788] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 711.081811] ? up_read+0x110/0x110 [ 711.095022] ? down_read+0x1d0/0x1d0 [ 711.095056] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 711.104351] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 711.106942] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 711.109913] ? lock_acquire+0x1ed/0x520 [ 711.109930] ? lo_ioctl+0x8e/0x1d80 [ 711.109950] ? lock_release+0x970/0x970 [ 711.130429] ? arch_local_save_flags+0x40/0x40 [ 711.135038] ? fs_reclaim_acquire+0x20/0x20 [ 711.139371] ? lock_downgrade+0x900/0x900 05:22:44 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0xc0, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1305d6cfecf583676f906a626928d1000000000000000000001096e7b071de2a184f6f2256015c8acdcaa15e38560159c5c9bb06374ffaf156a8af2061d5d3e024972492d956ca27a15bca76a876b3aaf45a4f"], 0xa}, 0x0) 05:22:44 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() r4 = getgid() getgroups(0x4, &(0x7f0000000140)=[r1, r2, r3, r4]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r6) [ 711.143531] ? ___might_sleep+0x1ed/0x300 [ 711.147693] ? arch_local_save_flags+0x40/0x40 [ 711.152292] __should_failslab+0x124/0x180 [ 711.156533] should_failslab+0x9/0x14 [ 711.160345] kmem_cache_alloc_trace+0x2d7/0x750 [ 711.165041] __kthread_create_on_node+0x137/0x540 [ 711.169900] ? loop_get_status64+0x140/0x140 [ 711.174327] ? __kthread_parkme+0x1a0/0x1a0 [ 711.178669] ? ksys_dup3+0x680/0x680 [ 711.182391] ? __lockdep_init_map+0x105/0x590 [ 711.186895] ? __lockdep_init_map+0x105/0x590 05:22:44 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xe) [ 711.191412] ? loop_get_status64+0x140/0x140 [ 711.195835] kthread_create_on_node+0xb1/0xe0 [ 711.200346] ? __kthread_create_on_node+0x540/0x540 [ 711.205372] ? kasan_check_read+0x11/0x20 [ 711.209533] lo_ioctl+0x7f6/0x1d80 [ 711.213097] ? lo_rw_aio_complete+0x470/0x470 [ 711.217606] blkdev_ioctl+0x9ac/0x2010 [ 711.221502] ? blkpg_ioctl+0xc10/0xc10 [ 711.221518] ? lock_downgrade+0x900/0x900 [ 711.221546] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 711.235365] ? save_stack+0x43/0xd0 [ 711.238999] ? __kasan_slab_free+0x102/0x150 05:22:44 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 711.243505] ? __fget+0x4d1/0x740 [ 711.246971] ? ksys_dup3+0x680/0x680 [ 711.246989] ? kasan_check_write+0x14/0x20 [ 711.247009] block_ioctl+0xee/0x130 [ 711.247023] ? blkdev_fallocate+0x400/0x400 [ 711.247039] do_vfs_ioctl+0x1de/0x1720 [ 711.247054] ? trace_hardirqs_on+0xbd/0x310 [ 711.247073] ? ioctl_preallocate+0x300/0x300 [ 711.258617] ? memset+0x31/0x40 [ 711.258636] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.258653] ? smack_file_ioctl+0x210/0x3c0 [ 711.258672] ? fget_raw+0x20/0x20 [ 711.275587] ? smack_file_lock+0x2e0/0x2e0 [ 711.275601] ? putname+0xf2/0x130 [ 711.275629] ? do_sys_open+0x3ac/0x700 [ 711.288744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.288762] ? security_file_ioctl+0x94/0xc0 [ 711.288786] ksys_ioctl+0xa9/0xd0 [ 711.299907] __x64_sys_ioctl+0x73/0xb0 [ 711.299925] do_syscall_64+0x1b9/0x820 [ 711.299948] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 711.313758] ? syscall_return_slowpath+0x5e0/0x5e0 [ 711.313777] ? trace_hardirqs_on_caller+0x310/0x310 [ 711.313794] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 711.313815] ? recalc_sigpending_tsk+0x180/0x180 [ 711.325015] ? kasan_check_write+0x14/0x20 [ 711.340313] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 711.340337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.340349] RIP: 0033:0x4573e7 [ 711.340363] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 711.340371] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 711.354361] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 711.354370] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 711.354379] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 711.354388] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 711.354397] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:44 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='%xt2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:44 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x3) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="c2ae10907979f783b48668239a4a0d59d36d28af6296cfecd976c1e28755519beccf02462be04803af23c7fd2a48507de4ae0f3ae0488197a9c3f2a445b895b8", 0x40, 0xfffffffffffffffd) r3 = request_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000200)='ppp0nodev:\x00', 0xffffffffffffffff) r4 = request_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='raw\x00', 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000340)={r2, r3, r4}, &(0x7f00000003c0)=""/207, 0xcf, &(0x7f0000000580)={&(0x7f00000004c0)={'ghash-generic\x00'}, &(0x7f0000000500)="1c637cedc3f2ef9a5f74dc25e32d2f26f4152b7b72ffb6d24a755e4abcd0eb7577370fde8cc46e8d013abbe1d0566f9f0e6dc84f3c74e39ca743e1aced0b527be4658ef861867b3049", 0x49}) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r5) 05:22:44 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:44 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) iopl(0xfffffffffffffffe) 05:22:44 executing program 0 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:44 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x8800000) 05:22:44 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:44 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40040, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f00000000c0)=0x40) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="001b000b000000000000362dd2f322f11d56605c050684cc02852f50ee6ce2062a7ca436cd2e5860ce05e8aa961c7ed4ab1dedac31f3a83c436d54b68be33112c3bbd7bb55f3b2b81f5894e92afbc0cf70e62c46a5e2136ef0b969eac50e04845e6c0f18cf37bba46689726b5c57f76a4c9755c9ab556d5df36a3e0d95197557478b254bc86286a85fa64fa7326bd0446bde8b0b05bfa3939ccb42121acfc22979e39e49a4fd8dc7f7ad5a003b9054c8528ed6eb"], 0xa}, 0x0) 05:22:44 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) [ 711.563626] FAULT_INJECTION: forcing a failure. [ 711.563626] name failslab, interval 1, probability 0, space 0, times 0 [ 711.610552] CPU: 1 PID: 15435 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 711.617880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.627247] Call Trace: [ 711.629851] dump_stack+0x1c4/0x2b4 [ 711.633495] ? dump_stack_print_info.cold.2+0x52/0x52 [ 711.638700] ? update_curr+0x200/0xbe0 [ 711.642606] should_fail.cold.4+0xa/0x17 [ 711.646686] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 711.652071] ? __cpu_to_node+0x7d/0xa0 [ 711.655972] ? account_entity_enqueue+0x3a3/0x660 [ 711.660832] ? check_preemption_disabled+0x48/0x200 [ 711.663086] QAT: Invalid ioctl [ 711.665861] ? enqueue_entity+0x34b/0x1ff0 [ 711.665890] ? update_curr+0x200/0xbe0 [ 711.677191] ? put_prev_task_fair+0x80/0x80 [ 711.681534] ? fs_reclaim_acquire+0x20/0x20 [ 711.685869] ? lock_downgrade+0x900/0x900 [ 711.690022] ? ___might_sleep+0x1ed/0x300 [ 711.690039] ? arch_local_save_flags+0x40/0x40 [ 711.690059] ? __enqueue_entity+0x10d/0x1f0 [ 711.694461] QAT: Invalid ioctl [ 711.698798] __should_failslab+0x124/0x180 [ 711.698813] should_failslab+0x9/0x14 [ 711.698837] kmem_cache_alloc+0x2be/0x730 [ 711.718509] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 711.723538] __kernfs_new_node+0x127/0x8d0 [ 711.727782] ? trace_hardirqs_on+0x310/0x310 [ 711.732202] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 711.736978] ? task_fork_fair+0x6d0/0x6d0 [ 711.741129] ? enqueue_entity+0x1ff0/0x1ff0 [ 711.741146] ? try_to_wake_up+0x10a/0x12f0 [ 711.741165] ? lock_downgrade+0x900/0x900 [ 711.753873] ? check_preempt_curr+0x3a0/0x3a0 [ 711.758389] ? trace_hardirqs_on+0xbd/0x310 [ 711.762722] ? kasan_check_read+0x11/0x20 [ 711.766883] ? dequeue_task_fair+0xf9/0x9a0 [ 711.766906] kernfs_new_node+0x95/0x120 [ 711.775199] kernfs_create_dir_ns+0x4d/0x160 [ 711.779626] internal_create_group+0x5fc/0xd80 [ 711.784236] ? remove_files.isra.1+0x190/0x190 [ 711.788829] ? up_write+0x7b/0x220 [ 711.792384] ? up_read+0x110/0x110 [ 711.795932] ? down_read+0x1d0/0x1d0 [ 711.799663] ? kasan_check_write+0x14/0x20 [ 711.803919] sysfs_create_group+0x1f/0x30 [ 711.808082] lo_ioctl+0x1310/0x1d80 [ 711.808105] ? lo_rw_aio_complete+0x470/0x470 [ 711.808126] blkdev_ioctl+0x9ac/0x2010 [ 711.820129] ? blkpg_ioctl+0xc10/0xc10 [ 711.824030] ? lock_downgrade+0x900/0x900 [ 711.828192] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 711.834007] ? save_stack+0x43/0xd0 [ 711.837635] ? __kasan_slab_free+0x102/0x150 [ 711.842056] ? __fget+0x4d1/0x740 [ 711.845521] ? ksys_dup3+0x680/0x680 [ 711.849248] ? kasan_check_write+0x14/0x20 [ 711.853517] block_ioctl+0xee/0x130 [ 711.857152] ? blkdev_fallocate+0x400/0x400 [ 711.861485] do_vfs_ioctl+0x1de/0x1720 [ 711.865381] ? trace_hardirqs_on+0xbd/0x310 [ 711.869709] ? ioctl_preallocate+0x300/0x300 [ 711.874128] ? memset+0x31/0x40 [ 711.877421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.882969] ? smack_file_ioctl+0x210/0x3c0 [ 711.887294] ? fget_raw+0x20/0x20 [ 711.890756] ? smack_file_lock+0x2e0/0x2e0 [ 711.894996] ? putname+0xf2/0x130 [ 711.898474] ? do_sys_open+0x3ac/0x700 [ 711.902411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.907956] ? security_file_ioctl+0x94/0xc0 [ 711.912373] ksys_ioctl+0xa9/0xd0 [ 711.915834] __x64_sys_ioctl+0x73/0xb0 [ 711.919738] do_syscall_64+0x1b9/0x820 [ 711.923636] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 711.929011] ? syscall_return_slowpath+0x5e0/0x5e0 [ 711.933948] ? trace_hardirqs_on_caller+0x310/0x310 [ 711.938975] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 711.943995] ? recalc_sigpending_tsk+0x180/0x180 [ 711.948754] ? kasan_check_write+0x14/0x20 [ 711.953004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 711.957863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.963698] RIP: 0033:0x4573e7 [ 711.966907] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 711.985810] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 711.993521] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 712.000790] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 05:22:44 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:45 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:45 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0x1, 0x3}]}, 0xc, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f00000001c0)=ANY=[@ANYBLOB="bf02000000000000c910000000000000000000000000001b000100000000831efd477e5b1db8002a"], 0x20) [ 712.008061] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 712.015330] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 712.022603] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 [ 712.037879] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000, [ 712.086976] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000, 05:22:45 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:45 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x22) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:45 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sysfs$1(0x1, &(0x7f0000000000)="7d406d696d655f747970656e6f6465765b23776c616e30210200") getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:45 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578b43200", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 712.167389] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:22:45 executing program 0 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 712.325973] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000, [ 712.364254] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000, [ 712.415287] FAULT_INJECTION: forcing a failure. [ 712.415287] name failslab, interval 1, probability 0, space 0, times 0 [ 712.426600] CPU: 0 PID: 15472 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 712.433887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.443257] Call Trace: [ 712.445879] dump_stack+0x1c4/0x2b4 [ 712.449560] ? dump_stack_print_info.cold.2+0x52/0x52 [ 712.454809] should_fail.cold.4+0xa/0x17 [ 712.458893] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 712.464010] ? update_load_avg+0x387/0x2470 [ 712.468343] ? update_load_avg+0x2470/0x2470 [ 712.472779] ? kvm_sched_clock_read+0x9/0x20 [ 712.477214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.483184] ? check_preemption_disabled+0x48/0x200 [ 712.488241] ? check_preemption_disabled+0x48/0x200 [ 712.493273] ? __update_load_avg_blocked_se+0x730/0x730 [ 712.498643] ? __update_load_avg_blocked_se+0x730/0x730 [ 712.504014] ? __update_load_avg_se+0xb90/0xb90 [ 712.508693] ? __update_load_avg_se+0xb90/0xb90 [ 712.513372] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 712.518132] ? trace_hardirqs_off+0x310/0x310 [ 712.522641] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 712.527664] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 712.532437] __should_failslab+0x124/0x180 [ 712.536684] should_failslab+0x9/0x14 [ 712.540491] kmem_cache_alloc+0x47/0x730 [ 712.544559] ? plist_requeue+0x620/0x620 [ 712.548626] ? kasan_check_read+0x11/0x20 [ 712.552785] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 712.558071] radix_tree_node_alloc.constprop.18+0x1f7/0x370 [ 712.563793] idr_get_free+0x725/0xec0 [ 712.567618] ? ida_pre_get+0x130/0x130 [ 712.571605] ? save_stack+0xa9/0xd0 [ 712.575240] ? save_stack+0x43/0xd0 [ 712.578874] ? kasan_kmalloc+0xc7/0xe0 [ 712.582764] ? kasan_slab_alloc+0x12/0x20 [ 712.586923] ? kmem_cache_alloc+0x12e/0x730 [ 712.591255] ? __kernfs_new_node+0x127/0x8d0 [ 712.595671] ? kernfs_new_node+0x95/0x120 [ 712.599826] ? kernfs_create_dir_ns+0x4d/0x160 [ 712.604413] ? internal_create_group+0x5fc/0xd80 [ 712.609175] ? sysfs_create_group+0x1f/0x30 [ 712.613517] ? lo_ioctl+0x1310/0x1d80 [ 712.617326] ? blkdev_ioctl+0x9ac/0x2010 [ 712.621393] ? block_ioctl+0xee/0x130 [ 712.625214] ? do_vfs_ioctl+0x1de/0x1720 [ 712.629287] ? ksys_ioctl+0xa9/0xd0 [ 712.632918] ? __x64_sys_ioctl+0x73/0xb0 [ 712.636985] ? do_syscall_64+0x1b9/0x820 [ 712.641051] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.646422] ? enqueue_entity+0x34b/0x1ff0 [ 712.650791] ? update_curr+0x200/0xbe0 [ 712.654684] ? put_prev_task_fair+0x80/0x80 [ 712.659016] idr_alloc_u32+0x201/0x3f0 [ 712.662915] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 712.667769] ? lock_acquire+0x1ed/0x520 [ 712.671749] ? __kernfs_new_node+0x14e/0x8d0 [ 712.676162] ? __kernfs_new_node+0x127/0x8d0 [ 712.680594] idr_alloc_cyclic+0x166/0x350 [ 712.684754] ? idr_alloc+0x1b0/0x1b0 [ 712.688471] ? kasan_check_write+0x14/0x20 [ 712.692714] ? do_raw_spin_lock+0xc1/0x200 [ 712.696961] __kernfs_new_node+0x1ee/0x8d0 [ 712.701225] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 712.705996] ? task_fork_fair+0x6d0/0x6d0 [ 712.710148] ? enqueue_entity+0x1ff0/0x1ff0 05:22:46 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xf) 05:22:46 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="2701", 0x86) 05:22:46 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0xac, "ba4b0afd58b3f4c072d153a180ebb11fa9a085a250aef4982d8a00f4aa3acb4465651bd533d6b30c27fccea6afd9e3cbc74936ef4ed684aab6cc6e04e1192b3d50c70e21cd61235044c8e0385b6a007cca065092c0e9abff184718b200c99cfd56a7d8d8464a2562ff59f0156feb0ba73165dc181e7388b45f0c0516cdd7693a232f2e8bcfba9554d662f30e99d2273ae3602c22145f2a9962edb63f8b83c48d7a4a04bfc81f8d9f6d38120a"}, &(0x7f0000000180)=0xb4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r2, 0x7}, &(0x7f0000000240)=0x8) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r4, r3) 05:22:46 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="008b0000000000000000"], 0xa}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x802, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) [ 712.714474] ? try_to_wake_up+0x10a/0x12f0 [ 712.718716] ? lock_downgrade+0x900/0x900 [ 712.722871] ? check_preempt_curr+0x3a0/0x3a0 [ 712.727379] ? trace_hardirqs_on+0xbd/0x310 [ 712.731710] ? kasan_check_read+0x11/0x20 [ 712.735871] ? dequeue_task_fair+0xf9/0x9a0 [ 712.740227] kernfs_new_node+0x95/0x120 [ 712.744232] kernfs_create_dir_ns+0x4d/0x160 [ 712.748681] internal_create_group+0x5fc/0xd80 [ 712.753293] ? remove_files.isra.1+0x190/0x190 [ 712.757901] ? up_write+0x7b/0x220 [ 712.761608] ? up_read+0x110/0x110 [ 712.765162] ? down_read+0x1d0/0x1d0 [ 712.768885] ? kasan_check_write+0x14/0x20 [ 712.773153] sysfs_create_group+0x1f/0x30 [ 712.773174] lo_ioctl+0x1310/0x1d80 [ 712.780969] ? lo_rw_aio_complete+0x470/0x470 [ 712.785476] blkdev_ioctl+0x9ac/0x2010 [ 712.789370] ? blkpg_ioctl+0xc10/0xc10 [ 712.793267] ? lock_downgrade+0x900/0x900 [ 712.797433] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 712.797455] ? save_stack+0x43/0xd0 [ 712.797467] ? __kasan_slab_free+0x102/0x150 [ 712.797484] ? __fget+0x4d1/0x740 05:22:46 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0xffffcfc, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0], 0xa}, 0xfffffffffffffffe) [ 712.797504] ? ksys_dup3+0x680/0x680 [ 712.797521] ? kasan_check_write+0x14/0x20 [ 712.822702] block_ioctl+0xee/0x130 [ 712.826341] ? blkdev_fallocate+0x400/0x400 [ 712.830666] do_vfs_ioctl+0x1de/0x1720 [ 712.830685] ? trace_hardirqs_on+0xbd/0x310 [ 712.830704] ? ioctl_preallocate+0x300/0x300 [ 712.843306] ? memset+0x31/0x40 [ 712.846604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.852163] ? smack_file_ioctl+0x210/0x3c0 [ 712.856497] ? fget_raw+0x20/0x20 [ 712.859967] ? smack_file_lock+0x2e0/0x2e0 05:22:46 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000001c0)={0x7fff, {{0x2, 0x4e23, @multicast2}}}, 0x88) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x4, 0x2) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='@\x00"\f\aFu\x00\x00\x00'], 0xa}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='/dev/sequencer\x00') 05:22:46 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getrandom(&(0x7f0000000040)=""/28, 0x1c, 0x1) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000000)=[0xed, 0x3]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) [ 712.864212] ? putname+0xf2/0x130 [ 712.867695] ? do_sys_open+0x3ac/0x700 [ 712.871599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.877144] ? security_file_ioctl+0x94/0xc0 [ 712.881565] ksys_ioctl+0xa9/0xd0 [ 712.885030] __x64_sys_ioctl+0x73/0xb0 [ 712.888928] do_syscall_64+0x1b9/0x820 [ 712.892821] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 712.898195] ? syscall_return_slowpath+0x5e0/0x5e0 [ 712.903141] ? trace_hardirqs_on_caller+0x310/0x310 [ 712.908172] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 712.913201] ? recalc_sigpending_tsk+0x180/0x180 [ 712.917983] ? kasan_check_write+0x14/0x20 [ 712.918002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 712.918024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.918035] RIP: 0033:0x4573e7 [ 712.918051] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 712.918065] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 [ 712.932306] ORIG_RAX: 0000000000000010 05:22:46 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27f4", 0x86) 05:22:46 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 712.932316] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 712.932325] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 712.932333] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 712.932348] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 712.954425] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:46 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ex%2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:46 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) r2 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) shutdown(r2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000080)={0x4, 0x3}) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:dhcpd_var_run_t:s0\x00', 0x25) socket$pptp(0x18, 0x1, 0x2) [ 713.037079] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:22:46 executing program 0 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:46 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$selinux_attr(r1, &(0x7f0000000040)='system_u:object_r:net_conf_t:s0\x00', 0x20) bind$rds(r1, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:46 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:46 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) eventfd(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x500, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:46 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27ff", 0x86) 05:22:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = socket$rds(0x15, 0x5, 0x0) sendmsg$rds(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x0, @rand_addr=0x5}, 0x33, &(0x7f0000000500), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000017000000707f375489faebcf53a1d0a62ab474"], 0xa}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r3, 0x40046208, 0x0) 05:22:46 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x8000a, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000002c0), &(0x7f0000000340)=0x4) open_by_handle_at(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\t\x00\x00F\x00 \x00\x00C'], 0x800) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lstat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000280)={'bond_slave_0\x00', {0x2, 0x4e21, @loopback}}) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x40000000000001fe, &(0x7f0000000300)=[0x0, r3]) fchown(r0, 0x0, r4) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/45, 0x2d) [ 713.152632] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000, 05:22:46 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27e0", 0x86) 05:22:46 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 713.209434] FAULT_INJECTION: forcing a failure. [ 713.209434] name failslab, interval 1, probability 0, space 0, times 0 [ 713.237213] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000, [ 713.260624] CPU: 1 PID: 15522 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 713.267936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.277296] Call Trace: [ 713.279900] dump_stack+0x1c4/0x2b4 [ 713.283548] ? dump_stack_print_info.cold.2+0x52/0x52 [ 713.288795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.294371] ? replace_slot+0x151/0x520 [ 713.298361] should_fail.cold.4+0xa/0x17 [ 713.302439] ? fault_create_debugfs_attr+0x1f0/0x1f0 05:22:46 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 713.307552] ? lock_release+0x970/0x970 [ 713.311532] ? arch_local_save_flags+0x40/0x40 [ 713.316136] ? __mutex_lock+0x85e/0x1700 [ 713.320212] ? kernfs_activate+0x8e/0x2c0 [ 713.320240] ? fs_reclaim_acquire+0x20/0x20 [ 713.328705] ? lock_downgrade+0x900/0x900 [ 713.332868] ? __mutex_lock+0x85e/0x1700 [ 713.332896] ? ___might_sleep+0x1ed/0x300 [ 713.341100] ? arch_local_save_flags+0x40/0x40 [ 713.345687] ? kernfs_activate+0x21a/0x2c0 [ 713.345724] __should_failslab+0x124/0x180 [ 713.354170] should_failslab+0x9/0x14 [ 713.354187] kmem_cache_alloc+0x2be/0x730 [ 713.362137] ? lock_downgrade+0x900/0x900 [ 713.362153] ? do_raw_spin_lock+0xc1/0x200 [ 713.362173] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 713.370545] __kernfs_new_node+0x127/0x8d0 [ 713.370564] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 713.384541] ? kasan_check_write+0x14/0x20 [ 713.388787] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 713.393731] ? wait_for_completion+0x8a0/0x8a0 [ 713.398324] ? wait_for_completion+0x8a0/0x8a0 [ 713.402923] ? kasan_check_write+0x14/0x20 [ 713.407170] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 713.412125] ? mutex_unlock+0xd/0x10 [ 713.415849] ? kernfs_activate+0x21a/0x2c0 [ 713.420094] ? kernfs_walk_and_get_ns+0x340/0x340 [ 713.424955] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 713.430505] ? kernfs_link_sibling+0x1d2/0x3b0 [ 713.435100] kernfs_new_node+0x95/0x120 [ 713.439088] __kernfs_create_file+0x5a/0x340 [ 713.443511] sysfs_add_file_mode_ns+0x222/0x530 [ 713.448205] internal_create_group+0x3df/0xd80 [ 713.452812] ? remove_files.isra.1+0x190/0x190 [ 713.457400] ? up_write+0x7b/0x220 [ 713.460946] ? up_read+0x110/0x110 [ 713.464490] ? down_read+0x1d0/0x1d0 [ 713.468217] ? kasan_check_write+0x14/0x20 [ 713.472472] sysfs_create_group+0x1f/0x30 [ 713.476636] lo_ioctl+0x1310/0x1d80 [ 713.480274] ? lo_rw_aio_complete+0x470/0x470 [ 713.484785] blkdev_ioctl+0x9ac/0x2010 [ 713.488680] ? blkpg_ioctl+0xc10/0xc10 [ 713.492572] ? lock_downgrade+0x900/0x900 [ 713.496744] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 713.502553] ? save_stack+0x43/0xd0 [ 713.506206] ? __kasan_slab_free+0x102/0x150 [ 713.510631] ? __fget+0x4d1/0x740 [ 713.514097] ? ksys_dup3+0x680/0x680 [ 713.517934] ? kasan_check_write+0x14/0x20 [ 713.522186] block_ioctl+0xee/0x130 [ 713.525835] ? blkdev_fallocate+0x400/0x400 [ 713.530165] do_vfs_ioctl+0x1de/0x1720 [ 713.534070] ? trace_hardirqs_on+0xbd/0x310 [ 713.538405] ? ioctl_preallocate+0x300/0x300 [ 713.542819] ? memset+0x31/0x40 [ 713.546110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.551658] ? smack_file_ioctl+0x210/0x3c0 [ 713.555982] ? fget_raw+0x20/0x20 [ 713.559446] ? smack_file_lock+0x2e0/0x2e0 [ 713.563684] ? putname+0xf2/0x130 [ 713.567155] ? do_sys_open+0x3ac/0x700 [ 713.571288] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.576873] ? security_file_ioctl+0x94/0xc0 [ 713.581301] ksys_ioctl+0xa9/0xd0 [ 713.584765] __x64_sys_ioctl+0x73/0xb0 [ 713.588668] do_syscall_64+0x1b9/0x820 [ 713.592560] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 713.597929] ? syscall_return_slowpath+0x5e0/0x5e0 [ 713.602867] ? trace_hardirqs_on_caller+0x310/0x310 [ 713.607894] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 713.613367] ? recalc_sigpending_tsk+0x180/0x180 [ 713.618129] ? kasan_check_write+0x14/0x20 [ 713.622377] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 713.627242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.632434] RIP: 0033:0x4573e7 [ 713.635637] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 713.654862] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 713.662576] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 713.669846] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 713.677123] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 713.684397] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 713.691675] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:47 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='exH2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:47 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:47 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r1 = semget$private(0x0, 0x3, 0x402) semctl$GETNCNT(r1, 0x4, 0xe, &(0x7f00000000c0)=""/79) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000009b0000dfdd7a50ad792895142fd729fd307972f5968b5a14794d9b8c613210116ebb12460d7d0d964508063066b43a9513708744cf75d4d95db082f66b4828fe2958fddea8e7d273092fbdaf829364856f765dffb053684e5ff9a113e9662f12af79a8dbb81aec9875eb520270d20a0837f252c8e75e91028a7aba61329db53f2ac25dd8"], 0xa}, 0x0) 05:22:47 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x6, 0x4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x1, 0x0, 0x81}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r1, 0x0, r3) 05:22:47 executing program 0 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:47 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000200)) signalfd(r2, &(0x7f0000000080)={0x8}, 0x8) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000100)) [ 713.838758] FAULT_INJECTION: forcing a failure. [ 713.838758] name failslab, interval 1, probability 0, space 0, times 0 [ 713.850745] CPU: 1 PID: 15553 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 713.858032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.867402] Call Trace: [ 713.870007] dump_stack+0x1c4/0x2b4 [ 713.873686] ? dump_stack_print_info.cold.2+0x52/0x52 [ 713.878911] should_fail.cold.4+0xa/0x17 [ 713.882985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.888539] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 713.893657] ? lock_acquire+0x1ed/0x520 [ 713.897638] ? kernfs_activate+0x8e/0x2c0 [ 713.897657] ? lock_release+0x970/0x970 [ 713.897678] ? arch_local_save_flags+0x40/0x40 [ 713.910361] ? mark_held_locks+0x130/0x130 [ 713.914621] ? fs_reclaim_acquire+0x20/0x20 [ 713.918952] ? lock_downgrade+0x900/0x900 [ 713.923114] ? ___might_sleep+0x1ed/0x300 [ 713.927267] ? arch_local_save_flags+0x40/0x40 [ 713.927293] __should_failslab+0x124/0x180 [ 713.936090] should_failslab+0x9/0x14 [ 713.939893] kmem_cache_alloc+0x2be/0x730 [ 713.944047] ? kasan_check_read+0x11/0x20 [ 713.948221] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 713.953247] __kernfs_new_node+0x127/0x8d0 [ 713.953267] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 713.962711] ? kasan_check_write+0x14/0x20 [ 713.966961] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 713.972290] ? kernfs_add_one+0x280/0x4d0 [ 713.976458] ? wait_for_completion+0x8a0/0x8a0 [ 713.981258] ? kasan_check_write+0x14/0x20 [ 713.985507] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 713.990444] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 713.990461] ? __schedule+0x150b/0x1ed0 [ 713.990482] ? wait_for_completion+0x8a0/0x8a0 [ 714.004463] ? kvm_clock_read+0x18/0x30 [ 714.004480] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 714.004500] ? mutex_unlock+0xd/0x10 [ 714.017704] ? kernfs_activate+0x21a/0x2c0 [ 714.021956] kernfs_new_node+0x95/0x120 [ 714.025945] __kernfs_create_file+0x5a/0x340 [ 714.030382] sysfs_add_file_mode_ns+0x222/0x530 [ 714.035065] internal_create_group+0x3df/0xd80 [ 714.039658] ? remove_files.isra.1+0x190/0x190 [ 714.044250] ? up_write+0x7b/0x220 [ 714.044265] ? up_read+0x110/0x110 [ 714.044286] ? down_read+0x1d0/0x1d0 [ 714.055066] ? kasan_check_write+0x14/0x20 [ 714.059318] sysfs_create_group+0x1f/0x30 [ 714.059343] lo_ioctl+0x1310/0x1d80 [ 714.067121] ? lo_rw_aio_complete+0x470/0x470 [ 714.071625] blkdev_ioctl+0x9ac/0x2010 [ 714.075526] ? blkpg_ioctl+0xc10/0xc10 [ 714.079419] ? lock_downgrade+0x900/0x900 [ 714.083578] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 714.089386] ? save_stack+0x43/0xd0 [ 714.093017] ? __kasan_slab_free+0x102/0x150 [ 714.097436] ? __fget+0x4d1/0x740 [ 714.097456] ? ksys_dup3+0x680/0x680 [ 714.097474] ? kasan_check_write+0x14/0x20 [ 714.108857] block_ioctl+0xee/0x130 [ 714.108873] ? blkdev_fallocate+0x400/0x400 [ 714.108893] do_vfs_ioctl+0x1de/0x1720 [ 714.120705] ? trace_hardirqs_on+0xbd/0x310 [ 714.125047] ? ioctl_preallocate+0x300/0x300 [ 714.129463] ? memset+0x31/0x40 [ 714.132759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.138305] ? smack_file_ioctl+0x210/0x3c0 [ 714.142635] ? fget_raw+0x20/0x20 [ 714.146093] ? smack_file_lock+0x2e0/0x2e0 [ 714.150337] ? putname+0xf2/0x130 [ 714.153811] ? do_sys_open+0x3ac/0x700 [ 714.157710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.157736] ? security_file_ioctl+0x94/0xc0 [ 714.157755] ksys_ioctl+0xa9/0xd0 [ 714.167692] __x64_sys_ioctl+0x73/0xb0 [ 714.167710] do_syscall_64+0x1b9/0x820 [ 714.167738] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 714.184321] ? syscall_return_slowpath+0x5e0/0x5e0 [ 714.189265] ? trace_hardirqs_on_caller+0x310/0x310 [ 714.194290] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 714.199316] ? recalc_sigpending_tsk+0x180/0x180 [ 714.204076] ? kasan_check_write+0x14/0x20 [ 714.208327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 714.213182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.218384] RIP: 0033:0x4573e7 [ 714.221583] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:47 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:47 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80, 0x0) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0xdf5600000, 0x21, 0x117, 0x0, 0x63f, 0x7ff, 0x0, 0x8f, 0x0, 0x7d7, 0x6, 0x8, 0x7, 0x4f2, 0x400], 0x13002, 0x10}) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3, 0x0) pause() sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'], 0xa}, 0x0) 05:22:47 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:47 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="270f", 0x86) 05:22:47 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:47 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 714.240491] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 714.248220] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 714.255494] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 714.262774] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 714.270064] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 714.277341] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:48 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874ffff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:48 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:48 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) fchown(r0, r3, r2) 05:22:48 executing program 0 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:48 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x1) 05:22:48 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:48 executing program 2: r0 = eventfd(0x5) fallocate(r0, 0x1, 0x27, 0x6d) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 714.742146] FAULT_INJECTION: forcing a failure. [ 714.742146] name failslab, interval 1, probability 0, space 0, times 0 [ 714.780035] CPU: 1 PID: 15584 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 714.787368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.796735] Call Trace: [ 714.799344] dump_stack+0x1c4/0x2b4 [ 714.802990] ? dump_stack_print_info.cold.2+0x52/0x52 [ 714.808213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.814304] ? replace_slot+0x151/0x520 [ 714.818393] should_fail.cold.4+0xa/0x17 [ 714.822477] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 714.822494] ? lock_release+0x970/0x970 [ 714.822515] ? arch_local_save_flags+0x40/0x40 [ 714.831602] ? __mutex_lock+0x85e/0x1700 [ 714.831623] ? kernfs_activate+0x8e/0x2c0 [ 714.840269] ? fs_reclaim_acquire+0x20/0x20 [ 714.840286] ? lock_downgrade+0x900/0x900 [ 714.840306] ? __mutex_lock+0x85e/0x1700 [ 714.848769] ? ___might_sleep+0x1ed/0x300 [ 714.848787] ? arch_local_save_flags+0x40/0x40 [ 714.848801] ? kernfs_activate+0x21a/0x2c0 [ 714.848824] __should_failslab+0x124/0x180 [ 714.874174] should_failslab+0x9/0x14 [ 714.878123] kmem_cache_alloc+0x2be/0x730 [ 714.882283] ? lock_downgrade+0x900/0x900 [ 714.886447] ? do_raw_spin_lock+0xc1/0x200 [ 714.890700] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 714.895735] __kernfs_new_node+0x127/0x8d0 [ 714.899982] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 714.904746] ? kasan_check_write+0x14/0x20 [ 714.909000] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 714.913937] ? wait_for_completion+0x8a0/0x8a0 [ 714.918530] ? wait_for_completion+0x8a0/0x8a0 [ 714.923119] ? kasan_check_write+0x14/0x20 [ 714.927359] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 714.932301] ? mutex_unlock+0xd/0x10 [ 714.936020] ? kernfs_activate+0x21a/0x2c0 [ 714.940264] ? kernfs_walk_and_get_ns+0x340/0x340 [ 714.945114] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 714.950660] ? kernfs_link_sibling+0x1d2/0x3b0 [ 714.955258] kernfs_new_node+0x95/0x120 [ 714.959246] __kernfs_create_file+0x5a/0x340 [ 714.963667] sysfs_add_file_mode_ns+0x222/0x530 [ 714.968350] internal_create_group+0x3df/0xd80 [ 714.972952] ? remove_files.isra.1+0x190/0x190 [ 714.977557] ? up_write+0x7b/0x220 [ 714.981110] ? up_read+0x110/0x110 [ 714.984663] ? down_read+0x1d0/0x1d0 [ 714.988390] ? kasan_check_write+0x14/0x20 [ 714.992647] sysfs_create_group+0x1f/0x30 [ 714.996816] lo_ioctl+0x1310/0x1d80 [ 715.000457] ? lo_rw_aio_complete+0x470/0x470 [ 715.004963] blkdev_ioctl+0x9ac/0x2010 [ 715.008865] ? blkpg_ioctl+0xc10/0xc10 [ 715.012760] ? lock_downgrade+0x900/0x900 [ 715.016928] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 715.022743] ? save_stack+0x43/0xd0 [ 715.026377] ? __kasan_slab_free+0x102/0x150 [ 715.030802] ? __fget+0x4d1/0x740 [ 715.034270] ? ksys_dup3+0x680/0x680 [ 715.037993] ? kasan_check_write+0x14/0x20 [ 715.042241] block_ioctl+0xee/0x130 [ 715.045875] ? blkdev_fallocate+0x400/0x400 [ 715.050216] do_vfs_ioctl+0x1de/0x1720 [ 715.054117] ? trace_hardirqs_on+0xbd/0x310 [ 715.058446] ? ioctl_preallocate+0x300/0x300 [ 715.062859] ? memset+0x31/0x40 [ 715.066154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.071707] ? smack_file_ioctl+0x210/0x3c0 [ 715.076043] ? fget_raw+0x20/0x20 [ 715.079502] ? smack_file_lock+0x2e0/0x2e0 [ 715.083749] ? putname+0xf2/0x130 [ 715.087224] ? do_sys_open+0x3ac/0x700 [ 715.091123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.096667] ? security_file_ioctl+0x94/0xc0 [ 715.101090] ksys_ioctl+0xa9/0xd0 [ 715.104554] __x64_sys_ioctl+0x73/0xb0 [ 715.108450] do_syscall_64+0x1b9/0x820 [ 715.112351] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 715.117733] ? syscall_return_slowpath+0x5e0/0x5e0 [ 715.122673] ? trace_hardirqs_on_caller+0x310/0x310 [ 715.127701] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 715.132745] ? recalc_sigpending_tsk+0x180/0x180 [ 715.137511] ? kasan_check_write+0x14/0x20 [ 715.141766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.146623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.151814] RIP: 0033:0x4573e7 [ 715.155019] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 715.173929] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 715.181646] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 715.188915] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 715.196185] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 715.203471] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 715.210751] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:48 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x2) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r1, 0x0, r3) 05:22:48 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:48 executing program 0 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:48 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x84, r2, 0x208, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1f}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4c0}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gretap0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x84}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 715.382685] FAULT_INJECTION: forcing a failure. [ 715.382685] name failslab, interval 1, probability 0, space 0, times 0 [ 715.395836] CPU: 0 PID: 15612 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 715.403129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.412482] Call Trace: [ 715.415086] dump_stack+0x1c4/0x2b4 [ 715.418728] ? dump_stack_print_info.cold.2+0x52/0x52 [ 715.423927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.429471] ? replace_slot+0x151/0x520 [ 715.433459] should_fail.cold.4+0xa/0x17 [ 715.437530] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 715.442642] ? lock_release+0x970/0x970 [ 715.446623] ? arch_local_save_flags+0x40/0x40 [ 715.451328] ? __mutex_lock+0x85e/0x1700 [ 715.455403] ? kernfs_activate+0x8e/0x2c0 [ 715.459568] ? fs_reclaim_acquire+0x20/0x20 [ 715.463901] ? lock_downgrade+0x900/0x900 [ 715.468062] ? __mutex_lock+0x85e/0x1700 [ 715.472134] ? ___might_sleep+0x1ed/0x300 [ 715.476291] ? arch_local_save_flags+0x40/0x40 [ 715.480879] ? kernfs_activate+0x21a/0x2c0 [ 715.485129] __should_failslab+0x124/0x180 [ 715.489380] should_failslab+0x9/0x14 [ 715.493198] kmem_cache_alloc+0x2be/0x730 [ 715.497364] ? lock_downgrade+0x900/0x900 [ 715.501521] ? do_raw_spin_lock+0xc1/0x200 [ 715.505765] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 715.510789] __kernfs_new_node+0x127/0x8d0 [ 715.515031] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 715.519793] ? kasan_check_write+0x14/0x20 [ 715.524039] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 715.528972] ? wait_for_completion+0x8a0/0x8a0 [ 715.533568] ? wait_for_completion+0x8a0/0x8a0 [ 715.538157] ? kasan_check_write+0x14/0x20 [ 715.542408] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 715.547349] ? mutex_unlock+0xd/0x10 [ 715.551073] ? kernfs_activate+0x21a/0x2c0 [ 715.555314] ? kernfs_walk_and_get_ns+0x340/0x340 [ 715.560166] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 715.565720] ? kernfs_link_sibling+0x1d2/0x3b0 [ 715.570318] kernfs_new_node+0x95/0x120 [ 715.574308] __kernfs_create_file+0x5a/0x340 [ 715.578731] sysfs_add_file_mode_ns+0x222/0x530 [ 715.583413] internal_create_group+0x3df/0xd80 [ 715.588015] ? remove_files.isra.1+0x190/0x190 [ 715.592604] ? up_write+0x7b/0x220 [ 715.596156] ? up_read+0x110/0x110 [ 715.599707] ? down_read+0x1d0/0x1d0 [ 715.603431] ? kasan_check_write+0x14/0x20 [ 715.607717] sysfs_create_group+0x1f/0x30 [ 715.611876] lo_ioctl+0x1310/0x1d80 [ 715.615517] ? lo_rw_aio_complete+0x470/0x470 [ 715.620022] blkdev_ioctl+0x9ac/0x2010 [ 715.623923] ? blkpg_ioctl+0xc10/0xc10 [ 715.627822] ? lock_downgrade+0x900/0x900 [ 715.631996] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 715.637820] ? save_stack+0x43/0xd0 [ 715.641463] ? __kasan_slab_free+0x102/0x150 [ 715.645886] ? __fget+0x4d1/0x740 [ 715.649356] ? ksys_dup3+0x680/0x680 [ 715.653535] ? kasan_check_write+0x14/0x20 [ 715.657803] block_ioctl+0xee/0x130 [ 715.661441] ? blkdev_fallocate+0x400/0x400 [ 715.665775] do_vfs_ioctl+0x1de/0x1720 [ 715.669685] ? trace_hardirqs_on+0xbd/0x310 [ 715.674019] ? ioctl_preallocate+0x300/0x300 [ 715.678455] ? memset+0x31/0x40 [ 715.681748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.687300] ? smack_file_ioctl+0x210/0x3c0 [ 715.691628] ? fget_raw+0x20/0x20 [ 715.695093] ? smack_file_lock+0x2e0/0x2e0 [ 715.699352] ? putname+0xf2/0x130 [ 715.702828] ? do_sys_open+0x3ac/0x700 [ 715.706728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.712276] ? security_file_ioctl+0x94/0xc0 [ 715.716695] ksys_ioctl+0xa9/0xd0 [ 715.720160] __x64_sys_ioctl+0x73/0xb0 [ 715.724062] do_syscall_64+0x1b9/0x820 [ 715.727960] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 715.733333] ? syscall_return_slowpath+0x5e0/0x5e0 [ 715.738274] ? trace_hardirqs_on_caller+0x310/0x310 [ 715.743300] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 715.748327] ? recalc_sigpending_tsk+0x180/0x180 [ 715.753088] ? kasan_check_write+0x14/0x20 [ 715.757337] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.762206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.767412] RIP: 0033:0x4573e7 [ 715.770616] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 715.789521] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 715.797245] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 715.804525] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 715.811801] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 715.819077] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 715.826352] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:49 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:49 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getegid() fstat(r1, &(0x7f0000000000)) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) getgroups(0x0, &(0x7f0000000300)) fchown(r0, 0x0, 0x0) 05:22:49 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27ff", 0x86) 05:22:49 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/pid\x00') r2 = fcntl$getown(r0, 0x9) capset(&(0x7f0000000000)={0x20071026, r2}, &(0x7f0000000040)={0x0, 0x0, 0xe6, 0x7, 0x1, 0x3}) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000cfae00"], 0xa}, 0x0) 05:22:49 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 715.840090] EXT4-fs: 7 callbacks suppressed [ 715.840101] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:22:49 executing program 0 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:49 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xa}, 0x0) 05:22:49 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\b', 0x86) 05:22:49 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000000c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r2, r0}}, 0x18) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r3) 05:22:49 executing program 2: r0 = memfd_create(&(0x7f0000000300)=',\x00', 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000340)=0x800, 0x4) syslog(0xf, 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r3, 0x8, 0xa}, &(0x7f0000000200)=0x8) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 716.010020] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 716.019954] FAULT_INJECTION: forcing a failure. [ 716.019954] name failslab, interval 1, probability 0, space 0, times 0 [ 716.053129] CPU: 0 PID: 15634 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 716.060468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.060475] Call Trace: [ 716.060501] dump_stack+0x1c4/0x2b4 [ 716.060530] ? dump_stack_print_info.cold.2+0x52/0x52 [ 716.081266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.086815] ? replace_slot+0x151/0x520 [ 716.090808] should_fail.cold.4+0xa/0x17 [ 716.094882] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 716.099991] ? lock_release+0x970/0x970 [ 716.100006] ? arch_local_save_flags+0x40/0x40 [ 716.100035] ? __mutex_lock+0x85e/0x1700 [ 716.100050] ? kernfs_activate+0x8e/0x2c0 [ 716.100070] ? fs_reclaim_acquire+0x20/0x20 [ 716.121113] ? lock_downgrade+0x900/0x900 [ 716.125270] ? __mutex_lock+0x85e/0x1700 [ 716.129392] ? ___might_sleep+0x1ed/0x300 [ 716.133548] ? arch_local_save_flags+0x40/0x40 [ 716.138137] ? kernfs_activate+0x21a/0x2c0 [ 716.142389] __should_failslab+0x124/0x180 [ 716.146632] should_failslab+0x9/0x14 [ 716.146649] kmem_cache_alloc+0x2be/0x730 [ 716.146664] ? lock_downgrade+0x900/0x900 [ 716.146679] ? do_raw_spin_lock+0xc1/0x200 [ 716.146700] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 716.155516] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 716.158777] __kernfs_new_node+0x127/0x8d0 [ 716.158795] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 716.158808] ? kasan_check_write+0x14/0x20 [ 716.158829] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 716.158850] ? wait_for_completion+0x8a0/0x8a0 [ 716.199697] ? wait_for_completion+0x8a0/0x8a0 [ 716.204292] ? kasan_check_write+0x14/0x20 [ 716.208538] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 716.213486] ? mutex_unlock+0xd/0x10 [ 716.217217] ? kernfs_activate+0x21a/0x2c0 [ 716.221472] ? kernfs_walk_and_get_ns+0x340/0x340 [ 716.226333] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 716.231917] ? kernfs_link_sibling+0x1d2/0x3b0 [ 716.236523] kernfs_new_node+0x95/0x120 [ 716.240518] __kernfs_create_file+0x5a/0x340 [ 716.244937] sysfs_add_file_mode_ns+0x222/0x530 [ 716.249620] internal_create_group+0x3df/0xd80 [ 716.254231] ? remove_files.isra.1+0x190/0x190 [ 716.258824] ? up_write+0x7b/0x220 [ 716.262367] ? up_read+0x110/0x110 [ 716.265914] ? down_read+0x1d0/0x1d0 [ 716.269684] ? kasan_check_write+0x14/0x20 [ 716.273933] sysfs_create_group+0x1f/0x30 [ 716.278101] lo_ioctl+0x1310/0x1d80 [ 716.281749] ? lo_rw_aio_complete+0x470/0x470 [ 716.286258] blkdev_ioctl+0x9ac/0x2010 [ 716.290157] ? blkpg_ioctl+0xc10/0xc10 [ 716.294056] ? lock_downgrade+0x900/0x900 [ 716.298233] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 716.304050] ? save_stack+0x43/0xd0 [ 716.307684] ? __kasan_slab_free+0x102/0x150 [ 716.312106] ? __fget+0x4d1/0x740 [ 716.315571] ? ksys_dup3+0x680/0x680 [ 716.319291] ? kasan_check_write+0x14/0x20 [ 716.323536] block_ioctl+0xee/0x130 [ 716.327170] ? blkdev_fallocate+0x400/0x400 [ 716.331512] do_vfs_ioctl+0x1de/0x1720 [ 716.335407] ? trace_hardirqs_on+0xbd/0x310 [ 716.339738] ? ioctl_preallocate+0x300/0x300 [ 716.344151] ? memset+0x31/0x40 [ 716.347441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.353599] ? smack_file_ioctl+0x210/0x3c0 [ 716.357938] ? fget_raw+0x20/0x20 [ 716.361412] ? smack_file_lock+0x2e0/0x2e0 [ 716.365648] ? putname+0xf2/0x130 [ 716.369118] ? do_sys_open+0x3ac/0x700 [ 716.373020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.378569] ? security_file_ioctl+0x94/0xc0 [ 716.382988] ksys_ioctl+0xa9/0xd0 [ 716.386457] __x64_sys_ioctl+0x73/0xb0 [ 716.390360] do_syscall_64+0x1b9/0x820 [ 716.394257] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 716.399633] ? syscall_return_slowpath+0x5e0/0x5e0 [ 716.404576] ? trace_hardirqs_on_caller+0x310/0x310 [ 716.409602] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 716.414630] ? recalc_sigpending_tsk+0x180/0x180 [ 716.419394] ? kasan_check_write+0x14/0x20 [ 716.423640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 716.428494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 716.433686] RIP: 0033:0x4573e7 05:22:49 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x21) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:49 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 716.436888] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 716.455798] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 716.463529] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 716.470805] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 716.478078] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 716.485349] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 716.492622] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 [ 716.557232] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:22:49 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:49 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="277f", 0x86) 05:22:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_vs\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:49 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4000000000200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) fchown(r0, 0x0, r2) 05:22:49 executing program 0 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:50 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x8, 0x20102) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000180)=0x81, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 716.676418] FAULT_INJECTION: forcing a failure. [ 716.676418] name failslab, interval 1, probability 0, space 0, times 0 [ 716.696404] CPU: 0 PID: 15658 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 716.703719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.713077] Call Trace: [ 716.713108] dump_stack+0x1c4/0x2b4 [ 716.713130] ? dump_stack_print_info.cold.2+0x52/0x52 [ 716.713151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.713167] ? replace_slot+0x151/0x520 [ 716.713205] should_fail.cold.4+0xa/0x17 [ 716.738118] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 716.743241] ? lock_release+0x970/0x970 [ 716.747245] ? arch_local_save_flags+0x40/0x40 [ 716.751854] ? __mutex_lock+0x85e/0x1700 [ 716.755927] ? kernfs_activate+0x8e/0x2c0 [ 716.760463] ? fs_reclaim_acquire+0x20/0x20 [ 716.764802] ? lock_downgrade+0x900/0x900 [ 716.768967] ? __mutex_lock+0x85e/0x1700 [ 716.773052] ? ___might_sleep+0x1ed/0x300 [ 716.777215] ? arch_local_save_flags+0x40/0x40 [ 716.781812] ? kernfs_activate+0x21a/0x2c0 [ 716.786067] __should_failslab+0x124/0x180 [ 716.790313] should_failslab+0x9/0x14 [ 716.794121] kmem_cache_alloc+0x2be/0x730 [ 716.798278] ? lock_downgrade+0x900/0x900 [ 716.802432] ? do_raw_spin_lock+0xc1/0x200 [ 716.806675] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 716.811705] __kernfs_new_node+0x127/0x8d0 [ 716.815955] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 716.820717] ? kasan_check_write+0x14/0x20 [ 716.824967] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 716.829907] ? wait_for_completion+0x8a0/0x8a0 [ 716.834500] ? wait_for_completion+0x8a0/0x8a0 [ 716.839090] ? kasan_check_write+0x14/0x20 [ 716.843334] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 716.848282] ? mutex_unlock+0xd/0x10 [ 716.852004] ? kernfs_activate+0x21a/0x2c0 [ 716.856252] ? kernfs_walk_and_get_ns+0x340/0x340 [ 716.861108] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 716.866651] ? kernfs_link_sibling+0x1d2/0x3b0 [ 716.871250] kernfs_new_node+0x95/0x120 [ 716.875252] __kernfs_create_file+0x5a/0x340 [ 716.879674] sysfs_add_file_mode_ns+0x222/0x530 [ 716.884355] internal_create_group+0x3df/0xd80 [ 716.888952] ? remove_files.isra.1+0x190/0x190 [ 716.893540] ? up_write+0x7b/0x220 [ 716.897086] ? up_read+0x110/0x110 [ 716.900631] ? down_read+0x1d0/0x1d0 [ 716.904354] ? kasan_check_write+0x14/0x20 [ 716.908604] sysfs_create_group+0x1f/0x30 [ 716.912771] lo_ioctl+0x1310/0x1d80 [ 716.916426] ? lo_rw_aio_complete+0x470/0x470 [ 716.920940] blkdev_ioctl+0x9ac/0x2010 [ 716.924836] ? blkpg_ioctl+0xc10/0xc10 [ 716.928733] ? lock_downgrade+0x900/0x900 [ 716.932895] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 716.938702] ? save_stack+0x43/0xd0 [ 716.942336] ? __kasan_slab_free+0x102/0x150 [ 716.946752] ? __fget+0x4d1/0x740 [ 716.950216] ? ksys_dup3+0x680/0x680 [ 716.953948] ? kasan_check_write+0x14/0x20 [ 716.958331] block_ioctl+0xee/0x130 [ 716.961964] ? blkdev_fallocate+0x400/0x400 [ 716.966384] do_vfs_ioctl+0x1de/0x1720 [ 716.970283] ? trace_hardirqs_on+0xbd/0x310 [ 716.974612] ? ioctl_preallocate+0x300/0x300 [ 716.979032] ? memset+0x31/0x40 [ 716.982324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.987872] ? smack_file_ioctl+0x210/0x3c0 [ 716.992195] ? fget_raw+0x20/0x20 [ 716.995660] ? smack_file_lock+0x2e0/0x2e0 [ 716.999895] ? putname+0xf2/0x130 [ 717.003363] ? do_sys_open+0x3ac/0x700 [ 717.007266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.012810] ? security_file_ioctl+0x94/0xc0 [ 717.017233] ksys_ioctl+0xa9/0xd0 [ 717.020694] __x64_sys_ioctl+0x73/0xb0 [ 717.024595] do_syscall_64+0x1b9/0x820 [ 717.028488] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 717.033864] ? syscall_return_slowpath+0x5e0/0x5e0 [ 717.038803] ? trace_hardirqs_on_caller+0x310/0x310 [ 717.043875] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 717.048899] ? recalc_sigpending_tsk+0x180/0x180 [ 717.053660] ? kasan_check_write+0x14/0x20 [ 717.057911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.062768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.067966] RIP: 0033:0x4573e7 [ 717.071164] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 717.090077] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 717.097799] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 717.105073] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 717.112344] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 717.119618] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 05:22:50 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14, 0x69, 0x2, {0x40, 0x3, 0x6}}, 0x14) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000000)) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) 05:22:50 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:50 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x6) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:50 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x182) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000140)={0x1, 0xffffffffffffff81, 0x13}) [ 717.126891] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 [ 717.145031] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:22:50 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x5ba, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e23, 0x2, @mcast2, 0x1000}}}, &(0x7f0000000180)=0x84) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) 05:22:50 executing program 0 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 717.232270] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 717.317608] FAULT_INJECTION: forcing a failure. [ 717.317608] name failslab, interval 1, probability 0, space 0, times 0 [ 717.333516] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 717.344186] CPU: 0 PID: 15686 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 717.351487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.360840] Call Trace: [ 717.363441] dump_stack+0x1c4/0x2b4 [ 717.367082] ? dump_stack_print_info.cold.2+0x52/0x52 [ 717.372286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.377830] ? replace_slot+0x151/0x520 [ 717.381818] should_fail.cold.4+0xa/0x17 [ 717.385892] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 717.391003] ? lock_release+0x970/0x970 [ 717.394984] ? arch_local_save_flags+0x40/0x40 [ 717.399587] ? __mutex_lock+0x85e/0x1700 [ 717.403654] ? kernfs_activate+0x8e/0x2c0 [ 717.407814] ? fs_reclaim_acquire+0x20/0x20 [ 717.412139] ? lock_downgrade+0x900/0x900 [ 717.416290] ? __mutex_lock+0x85e/0x1700 [ 717.420359] ? ___might_sleep+0x1ed/0x300 [ 717.424512] ? arch_local_save_flags+0x40/0x40 [ 717.429097] ? kernfs_activate+0x21a/0x2c0 [ 717.433350] __should_failslab+0x124/0x180 [ 717.437594] should_failslab+0x9/0x14 [ 717.441404] kmem_cache_alloc+0x2be/0x730 [ 717.445560] ? lock_downgrade+0x900/0x900 [ 717.449714] ? do_raw_spin_lock+0xc1/0x200 [ 717.453956] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 717.458979] __kernfs_new_node+0x127/0x8d0 [ 717.463229] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 717.467993] ? kasan_check_write+0x14/0x20 [ 717.472248] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 717.477182] ? wait_for_completion+0x8a0/0x8a0 [ 717.481773] ? wait_for_completion+0x8a0/0x8a0 [ 717.486362] ? kasan_check_write+0x14/0x20 [ 717.490606] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 717.495544] ? mutex_unlock+0xd/0x10 [ 717.499279] ? kernfs_activate+0x21a/0x2c0 [ 717.503522] ? kernfs_walk_and_get_ns+0x340/0x340 [ 717.508373] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 717.513950] ? kernfs_link_sibling+0x1d2/0x3b0 [ 717.518549] kernfs_new_node+0x95/0x120 [ 717.522543] __kernfs_create_file+0x5a/0x340 [ 717.526966] sysfs_add_file_mode_ns+0x222/0x530 [ 717.531654] internal_create_group+0x3df/0xd80 [ 717.536256] ? remove_files.isra.1+0x190/0x190 [ 717.540845] ? up_write+0x7b/0x220 [ 717.544387] ? up_read+0x110/0x110 [ 717.547934] ? down_read+0x1d0/0x1d0 [ 717.551651] ? kasan_check_write+0x14/0x20 [ 717.555903] sysfs_create_group+0x1f/0x30 [ 717.560057] lo_ioctl+0x1310/0x1d80 [ 717.563700] ? lo_rw_aio_complete+0x470/0x470 [ 717.568211] blkdev_ioctl+0x9ac/0x2010 [ 717.572122] ? blkpg_ioctl+0xc10/0xc10 [ 717.576013] ? lock_downgrade+0x900/0x900 [ 717.580172] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 717.585980] ? save_stack+0x43/0xd0 [ 717.589607] ? __kasan_slab_free+0x102/0x150 [ 717.594024] ? __fget+0x4d1/0x740 [ 717.597487] ? ksys_dup3+0x680/0x680 [ 717.601213] ? kasan_check_write+0x14/0x20 [ 717.605469] block_ioctl+0xee/0x130 [ 717.609112] ? blkdev_fallocate+0x400/0x400 [ 717.614339] do_vfs_ioctl+0x1de/0x1720 [ 717.618243] ? trace_hardirqs_on+0xbd/0x310 [ 717.622576] ? ioctl_preallocate+0x300/0x300 [ 717.626992] ? memset+0x31/0x40 [ 717.630277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.635913] ? smack_file_ioctl+0x210/0x3c0 [ 717.640256] ? fget_raw+0x20/0x20 [ 717.643719] ? smack_file_lock+0x2e0/0x2e0 [ 717.647956] ? putname+0xf2/0x130 [ 717.651890] ? do_sys_open+0x3ac/0x700 [ 717.655785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.661328] ? security_file_ioctl+0x94/0xc0 [ 717.665747] ksys_ioctl+0xa9/0xd0 [ 717.669225] __x64_sys_ioctl+0x73/0xb0 [ 717.673123] do_syscall_64+0x1b9/0x820 [ 717.677017] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 717.682390] ? syscall_return_slowpath+0x5e0/0x5e0 [ 717.687333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.692184] ? trace_hardirqs_on_caller+0x310/0x310 [ 717.697245] ? prepare_exit_to_usermode+0x291/0x3b0 [ 717.702276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 717.707131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.712321] RIP: 0033:0x4573e7 [ 717.715517] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 717.735118] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 717.742834] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 717.750105] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 717.757377] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 717.764650] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 717.771927] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 [ 717.780566] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:22:51 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432a0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:51 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\b', 0x86) 05:22:51 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040)={0x3, "dbb971"}, 0x4) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x20}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x20040, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x1ff) 05:22:51 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x10001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x100) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xfe, 0x80100) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:51 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) sendto$llc(r0, &(0x7f00000003c0)="8b041d9dc560b5aa6c248ca9de92763aced2b8427c0740a75070b9da9ae90954bda159f105e981795785e9c5bfd610f6b282e653c06fe71931689df6acbbb4a7607c8f049ad3919d9af867ba87cd09dc342ed95b36bf6b334a7bd731f8022b48ef061fbeb2b4c3da69f1de4c5cb7439e76fd32f68f93181eaa39f9caaf5950e0f6ed9f7587038dc8c191c978bc9ab3b9e0fc51ebc0ff9ad54c85d7d8ad3685884246804a8f8d9e780e40e076ab0e9a95b8504d64db503a5d9550", 0xba, 0x48004, &(0x7f0000000280)={0x1a, 0x320, 0x5c7, 0x3ff, 0xffff, 0xffffffffffff273b, @broadcast}, 0x10) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x1d, r3}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)=@can={{0x2, 0x30000000000, 0x1, 0xdf}, 0x2, 0x3, 0x0, 0x0, "58c26b6b56e5d646"}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x48800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000480)=[@in6={0xa, 0x4e21, 0x8000, @empty, 0x905}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e24, 0x3ff, @loopback}, @in6={0xa, 0x4e21, 0x4, @empty, 0xfffffffffffffffd}], 0x64) 05:22:51 executing program 0 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:51 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:51 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000080)="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", 0xfe, 0x5}, {&(0x7f0000000180)="83580053d4ef2d27eb1b08b651a8ba2afc35b082160ab8e0ef97d6a48c6205184e44e6cadde09c4a2570bf65", 0x2c, 0x80e}, {&(0x7f0000000200)="80254783dddcad3b6e670a89b58540c699af941410d353fb80528a4a8d221d1bd73d31d7c93b31890d85fd77aeb880391879d9ac0c39622da0dd48701688ed066a7bdf455e0b4e447bc59577b2eab52ef9178ebe4083b49a3d8a5d8dc014ce01e63a876993d970aea621013f97833ebd73992bc826ee62d29b17082a10ac400d7e10c4e9f6f96d00a5287dca6b3d5ff79d3ad6f0a0ba38004a065f84921e2d31919d39", 0xa3, 0x1}], 0x800, &(0x7f00000002c0)={[{@user_xattr='user_xattr'}, {@tails_on='tails=on'}, {@tails_on='tails=on'}], [{@dont_hash='dont_hash'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) [ 717.914770] FAULT_INJECTION: forcing a failure. [ 717.914770] name failslab, interval 1, probability 0, space 0, times 0 [ 717.949932] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 717.960707] CPU: 1 PID: 15700 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 717.968024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.977423] Call Trace: [ 717.980031] dump_stack+0x1c4/0x2b4 [ 717.983685] ? dump_stack_print_info.cold.2+0x52/0x52 [ 717.988898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.994750] ? replace_slot+0x151/0x520 [ 717.994773] should_fail.cold.4+0xa/0x17 [ 717.994793] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.007915] ? lock_release+0x970/0x970 [ 718.011911] ? arch_local_save_flags+0x40/0x40 [ 718.016513] ? __mutex_lock+0x85e/0x1700 [ 718.016530] ? kernfs_activate+0x8e/0x2c0 [ 718.016558] ? fs_reclaim_acquire+0x20/0x20 [ 718.029072] ? lock_downgrade+0x900/0x900 [ 718.029089] ? __mutex_lock+0x85e/0x1700 [ 718.029111] ? ___might_sleep+0x1ed/0x300 [ 718.037317] ? arch_local_save_flags+0x40/0x40 [ 718.037332] ? kernfs_activate+0x21a/0x2c0 [ 718.037356] __should_failslab+0x124/0x180 [ 718.037374] should_failslab+0x9/0x14 [ 718.058332] kmem_cache_alloc+0x2be/0x730 [ 718.062494] ? lock_downgrade+0x900/0x900 [ 718.066650] ? do_raw_spin_lock+0xc1/0x200 [ 718.070897] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 718.075928] __kernfs_new_node+0x127/0x8d0 [ 718.080180] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 718.084955] ? kasan_check_write+0x14/0x20 [ 718.089224] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 718.094166] ? wait_for_completion+0x8a0/0x8a0 [ 718.094187] ? wait_for_completion+0x8a0/0x8a0 [ 718.094212] ? kasan_check_write+0x14/0x20 [ 718.107611] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 718.112556] ? mutex_unlock+0xd/0x10 [ 718.112572] ? kernfs_activate+0x21a/0x2c0 [ 718.112592] ? kernfs_walk_and_get_ns+0x340/0x340 [ 718.125375] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 718.130925] ? kernfs_link_sibling+0x1d2/0x3b0 [ 718.135517] kernfs_new_node+0x95/0x120 [ 718.139514] __kernfs_create_file+0x5a/0x340 [ 718.143938] sysfs_add_file_mode_ns+0x222/0x530 [ 718.148624] internal_create_group+0x3df/0xd80 [ 718.153224] ? remove_files.isra.1+0x190/0x190 [ 718.153239] ? up_write+0x7b/0x220 [ 718.153252] ? up_read+0x110/0x110 [ 718.153273] ? down_read+0x1d0/0x1d0 [ 718.168615] ? kasan_check_write+0x14/0x20 [ 718.168641] sysfs_create_group+0x1f/0x30 [ 718.168662] lo_ioctl+0x1310/0x1d80 [ 718.180662] ? lo_rw_aio_complete+0x470/0x470 [ 718.185180] blkdev_ioctl+0x9ac/0x2010 [ 718.189099] ? blkpg_ioctl+0xc10/0xc10 [ 718.193004] ? lock_downgrade+0x900/0x900 [ 718.197162] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 718.202988] ? save_stack+0x43/0xd0 [ 718.206617] ? __kasan_slab_free+0x102/0x150 [ 718.206638] ? __fget+0x4d1/0x740 [ 718.206657] ? ksys_dup3+0x680/0x680 [ 718.206679] ? kasan_check_write+0x14/0x20 [ 718.214539] block_ioctl+0xee/0x130 [ 718.214556] ? blkdev_fallocate+0x400/0x400 [ 718.214572] do_vfs_ioctl+0x1de/0x1720 [ 718.214592] ? trace_hardirqs_on+0xbd/0x310 [ 718.238635] ? ioctl_preallocate+0x300/0x300 [ 718.243051] ? memset+0x31/0x40 [ 718.246344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.251893] ? smack_file_ioctl+0x210/0x3c0 [ 718.256227] ? fget_raw+0x20/0x20 [ 718.259692] ? smack_file_lock+0x2e0/0x2e0 [ 718.263935] ? putname+0xf2/0x130 [ 718.267407] ? do_sys_open+0x3ac/0x700 [ 718.271309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.276863] ? security_file_ioctl+0x94/0xc0 [ 718.281281] ksys_ioctl+0xa9/0xd0 [ 718.284749] __x64_sys_ioctl+0x73/0xb0 [ 718.288652] do_syscall_64+0x1b9/0x820 [ 718.292550] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 718.297930] ? syscall_return_slowpath+0x5e0/0x5e0 [ 718.302871] ? trace_hardirqs_on_caller+0x310/0x310 [ 718.307896] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 718.312923] ? recalc_sigpending_tsk+0x180/0x180 [ 718.317686] ? kasan_check_write+0x14/0x20 [ 718.321937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.326798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.331997] RIP: 0033:0x4573e7 [ 718.335209] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.354117] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 05:22:51 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:51 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:51 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:51 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27a0", 0x86) [ 718.361834] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 718.369108] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 718.376381] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 718.383652] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 718.390922] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 [ 718.404803] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 718.412736] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "dont_hash" [ 718.471324] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "dont_hash" 05:22:51 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:51 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:51 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/222, 0xde}, {&(0x7f0000000000)=""/39, 0x27}, {&(0x7f0000000040)=""/16, 0x10}, {&(0x7f00000000c0)=""/144, 0x90}, {&(0x7f00000003c0)=""/103, 0x67}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000000480)=""/22, 0x16}, {&(0x7f00000004c0)=""/27, 0x1b}, {&(0x7f0000000500)=""/103, 0x67}], 0x9, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000dc009c246f077359befcdd8d780300a0c1a2a0418664ecadd61ae0b8a4a5b0e3c06ca194b77b264585917e3a70958678b261da81f54d6db261aeeae1ab6ee595abd8e3eea1619f223beeca00e46900a0683ea31d5915ab114ceee811d406ecdc72783e5159ceb11144bbbc984c3fac7b87ae9a3f262259e531607a2cc64f24b199d70428483a530a88b3af2142e9503445a911c2b1f5f7506b397869da8e2d16c004b23b5476f0c79359cfd00df2b6a18f7da3b081f2bd335c2c4d9289c38c53a45f42"], 0xcb}, 0x0) 05:22:51 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x90) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:51 executing program 0 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:51 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x7ff, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgid() getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) fstat(r0, &(0x7f00000000c0)) getgroups(0x0, &(0x7f0000000300)) fchown(r0, 0x0, 0x0) [ 718.599588] FAULT_INJECTION: forcing a failure. [ 718.599588] name failslab, interval 1, probability 0, space 0, times 0 [ 718.624190] CPU: 1 PID: 15731 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 718.631498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.640855] Call Trace: [ 718.643470] dump_stack+0x1c4/0x2b4 [ 718.647121] ? dump_stack_print_info.cold.2+0x52/0x52 [ 718.652338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.657917] should_fail.cold.4+0xa/0x17 [ 718.661992] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 718.662008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.662030] ? wake_up_klogd+0x11a/0x180 [ 718.672657] ? console_device+0xc0/0xc0 [ 718.672672] ? vprintk_emit+0x322/0x930 [ 718.672693] ? __down_trylock_console_sem+0x155/0x200 [ 718.680713] ? vprintk_emit+0x268/0x930 [ 718.680740] ? wake_up_klogd+0x180/0x180 [ 718.689894] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 718.689911] ? kernfs_link_sibling+0x1d2/0x3b0 [ 718.689930] ? fs_reclaim_acquire+0x20/0x20 [ 718.689950] ? lock_downgrade+0x900/0x900 [ 718.698257] ? ___might_sleep+0x1ed/0x300 [ 718.698274] ? arch_local_save_flags+0x40/0x40 [ 718.698293] ? vprintk_default+0x28/0x30 [ 718.698313] __should_failslab+0x124/0x180 [ 718.708416] should_failslab+0x9/0x14 [ 718.708435] kmem_cache_alloc_trace+0x2d7/0x750 [ 718.708464] kobject_uevent_env+0x2f3/0x101e [ 718.746822] ? kasan_check_write+0x14/0x20 [ 718.751073] kobject_uevent+0x1f/0x24 [ 718.754886] lo_ioctl+0x138e/0x1d80 [ 718.759061] ? lo_rw_aio_complete+0x470/0x470 [ 718.763571] blkdev_ioctl+0x9ac/0x2010 [ 718.767466] ? blkpg_ioctl+0xc10/0xc10 [ 718.771358] ? lock_downgrade+0x900/0x900 [ 718.775525] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 718.781338] ? save_stack+0x43/0xd0 [ 718.784971] ? __kasan_slab_free+0x102/0x150 [ 718.789393] ? __fget+0x4d1/0x740 [ 718.792856] ? ksys_dup3+0x680/0x680 [ 718.796574] ? kasan_check_write+0x14/0x20 [ 718.800828] block_ioctl+0xee/0x130 [ 718.804461] ? blkdev_fallocate+0x400/0x400 [ 718.808788] do_vfs_ioctl+0x1de/0x1720 [ 718.812686] ? trace_hardirqs_on+0xbd/0x310 [ 718.817045] ? ioctl_preallocate+0x300/0x300 [ 718.821458] ? memset+0x31/0x40 [ 718.824750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.830300] ? smack_file_ioctl+0x210/0x3c0 [ 718.834624] ? fget_raw+0x20/0x20 [ 718.838084] ? smack_file_lock+0x2e0/0x2e0 [ 718.842327] ? putname+0xf2/0x130 [ 718.845796] ? do_sys_open+0x3ac/0x700 [ 718.849698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.855247] ? security_file_ioctl+0x94/0xc0 [ 718.859667] ksys_ioctl+0xa9/0xd0 [ 718.863140] __x64_sys_ioctl+0x73/0xb0 [ 718.867037] do_syscall_64+0x1b9/0x820 [ 718.870933] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 718.876312] ? syscall_return_slowpath+0x5e0/0x5e0 [ 718.881250] ? trace_hardirqs_on_caller+0x310/0x310 [ 718.886276] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 718.891299] ? recalc_sigpending_tsk+0x180/0x180 [ 718.896064] ? kasan_check_write+0x14/0x20 [ 718.900310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 718.905167] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.910367] RIP: 0033:0x4573e7 [ 718.913569] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 718.932475] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 718.940188] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 05:22:52 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x0, 0x12, &(0x7f00000001c0)=""/159) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r2 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r2) 05:22:52 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:52 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:52 executing program 2: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)=ANY=[@ANYBLOB="e000000200000000000000387a580e7168663abd0003000000e00000"], 0x1c) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000200)=[@in6={0xa, 0x4e20, 0x1, @loopback, 0x4}, @in={0x2, 0x4e20}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e23, 0x4, @empty, 0xffffffffffffff00}, @in6={0xa, 0x4e21, 0x5, @local, 0x8}, @in6={0xa, 0x4e22, 0x7ff, @mcast1, 0x400}], 0x90) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 718.947467] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 718.954745] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 718.962019] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 718.969380] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:52 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x43) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400000400200) fcntl$addseals(r0, 0x409, 0x2) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)) fchown(r0, 0x0, r2) 05:22:52 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @local}, 0xb1, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x101) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040)={0x10001, 0x0, 0x0, 0x100000001}, 0x8) 05:22:52 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:52 executing program 0 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:52 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\a', 0x86) 05:22:52 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)=0x40) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6_vti0\x00', r3}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:52 executing program 5: r0 = dup(0xffffffffffffff9c) write$P9_ROPEN(r0, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x20, 0x3, 0x8}, 0xffff}}, 0x18) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) accept$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) connect$can_bcm(r1, &(0x7f00000003c0)={0x1d, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x3, &(0x7f0000000440)=[0xee01, 0xee00, 0xffffffffffffffff]) getgroups(0x400000f8, &(0x7f0000000400)=[0x0, r4]) write$P9_RRENAMEAT(r1, &(0x7f0000000080)={0x7, 0x4b, 0x1}, 0x7) ioctl$int_out(r0, 0x5460, &(0x7f0000000040)) fchown(r1, 0x0, r5) fcntl$setpipe(r2, 0x407, 0x214) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}]}, 0x98) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f00000000c0)=0xe9c) 05:22:52 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f0000000040)}], 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x80) pipe(&(0x7f0000000040)) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000001c0)={"18db87bf6eeea458183b8b45643ff6e62f366de8963b830367c33c5f8afc3b866a366e703fc94845a0ab3d6137b519ab1d14a110f5a4cf82c28c8f7f11960460e03c7a70465dc29dcbd77b776e5e3a0c950a0eeaea19f2d9f6975766d58dfdcbd4291d47e605ea21cbb37c4571fbe28c28a51e15f8f23e9e053daa4d25c412011f3d52ef8bbc026c5b77a19e2abf14b250728feafd19b3e6e256d718699b48d0a05ea372ced19c286ed74d3aa23d83c23ff06f78053761a7757c37a55401ed0b88fc2577cdef6c13c0b1be55f8bdb1fa4d8ad8f05bfe5c87ccb1085f367168dc76246d63c2011539ad9e36d158ebc81cc814c7dd950a55f92e1e80ecb1e17dfdcdb617681b561b898e91e8d5ef03f04f5c82dc2827ad91c18ee33cf87da1836be30c03e52e0d1462b13db0d9d75888a3775e77176a201db70c9e04530c490108942fe9a8fdd21748c113e65d3122dbbf1c7889ba1cc2e571380bfe9ed153909a86c1d05d0f9bb2c9dd1ee091bae016b07bf56b06971b4a94338d64713dc2661b059280ac420fb242504091213dec586bd0ef4a44a52c4b800f0cf9945c5d1c41ffe3fc537751bd1228285f9323e5c481eaf5607851e0e7c3b293e788ef335eb62abd82b0af984d3b4f9108730d7de84a643b2c537ba9e238e41d82d5cbf015b54fba1e62c8886f6d0930e4c71b73c0978a127a39e95faf9d68827c0371112ad78aaa2bd8d65c14b3a75652e5b54d6206c8868b36346d732b055d24b9da13369b6ed0c8cb1cdf9e6f0b261b17941f730228630f9759d30237723e0f0a23b9af07e4dc402092e259eecb45ed37e5286b4a3a679f66df98be469174c8fa84809bf39ba438f7a8c01afdacc45162dec73abfd1f4aa6798929f1a8c1a7d6a8df66681e6e965abd0e060eb4070ef9c27566e8430a7a27550129175cfdfc0a2b8424d39a84a5f90a268ca17578a8367f2966ab14c0dcde66c692ab3aa7f8f352021b198ab073c477e3c01b2772ed85983d2c0875b48d37ba3ee365278f9de2d381f7e0887b62ab70f7d153db085bcad94e0a36627dfa51c7c7b6f52c3e0494d63644361f62d84490a86881e74b5bc1f41f5d369c7f922310f38038a2fdffca6e6a358eb03edfd5925a18134dcc3b21c778c0e832546c024c978666b2013855188fdfcea2695c6d1986e0dafd6a91068f6ebd5771babb9d62be8dc870c4b319e196325390151d0bbbdfa214dd77a49b7fe75cff77677cc60a43982a9e1e8bcce0461331dccd5d9d974acf551573df355c21699dedf5e01cfccee976c8944c4fbe6285f02b3194fa047685a5389b53df1c593016ab231057b5287d90222562954bb8231f1731d6bdc821f3207d18a11491537d12d8e170dd462c8d03440dca0151ceaedc519dbf5168a55308793091b1c1a908b4ff7d2fbcfe45bfd244aa919180bb021a2"}) 05:22:52 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffff9, 0x40000) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000100)=0xfd, 0x4) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:52 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:52 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0xb5bc, {{0x2, 0x4e20, @remote}}}, 0x88) 05:22:52 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) 05:22:52 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) msgget$private(0x0, 0x2) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0xffff) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:52 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 719.371556] FAULT_INJECTION: forcing a failure. [ 719.371556] name failslab, interval 1, probability 0, space 0, times 0 [ 719.391663] CPU: 0 PID: 15786 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 719.398966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.408368] Call Trace: [ 719.410972] dump_stack+0x1c4/0x2b4 [ 719.414615] ? dump_stack_print_info.cold.2+0x52/0x52 [ 719.419820] ? is_bpf_text_address+0xd3/0x170 [ 719.424333] should_fail.cold.4+0xa/0x17 [ 719.428405] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 719.433519] ? save_stack+0xa9/0xd0 [ 719.437159] ? save_stack+0x43/0xd0 [ 719.440796] ? kasan_kmalloc+0xc7/0xe0 [ 719.444693] ? kmem_cache_alloc_trace+0x152/0x750 [ 719.449544] ? kobject_uevent_env+0x2f3/0x101e [ 719.454131] ? kobject_uevent+0x1f/0x24 [ 719.458112] ? lo_ioctl+0x138e/0x1d80 [ 719.461920] ? blkdev_ioctl+0x9ac/0x2010 [ 719.465987] ? block_ioctl+0xee/0x130 [ 719.469795] ? do_vfs_ioctl+0x1de/0x1720 [ 719.473857] ? ksys_ioctl+0xa9/0xd0 [ 719.477492] ? __x64_sys_ioctl+0x73/0xb0 [ 719.481563] ? do_syscall_64+0x1b9/0x820 [ 719.485632] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.491009] ? fs_reclaim_acquire+0x20/0x20 [ 719.495342] ? lock_downgrade+0x900/0x900 [ 719.499503] ? ___might_sleep+0x1ed/0x300 [ 719.503654] ? lock_downgrade+0x900/0x900 [ 719.507813] ? arch_local_save_flags+0x40/0x40 [ 719.512411] __should_failslab+0x124/0x180 [ 719.516654] should_failslab+0x9/0x14 [ 719.520461] __kmalloc+0x2d4/0x760 [ 719.524011] ? kobject_get_path+0xc2/0x1b0 [ 719.528266] ? kmem_cache_alloc_trace+0x31f/0x750 [ 719.533121] kobject_get_path+0xc2/0x1b0 [ 719.537201] kobject_uevent_env+0x314/0x101e [ 719.541621] ? kasan_check_write+0x14/0x20 [ 719.545868] kobject_uevent+0x1f/0x24 [ 719.549677] lo_ioctl+0x138e/0x1d80 [ 719.553316] ? lo_rw_aio_complete+0x470/0x470 [ 719.557820] blkdev_ioctl+0x9ac/0x2010 [ 719.561715] ? blkpg_ioctl+0xc10/0xc10 [ 719.565612] ? lock_downgrade+0x900/0x900 [ 719.569792] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 719.575611] ? save_stack+0x43/0xd0 [ 719.579244] ? __kasan_slab_free+0x102/0x150 [ 719.583665] ? __fget+0x4d1/0x740 [ 719.587129] ? ksys_dup3+0x680/0x680 [ 719.590849] ? kasan_check_write+0x14/0x20 [ 719.595099] block_ioctl+0xee/0x130 [ 719.598733] ? blkdev_fallocate+0x400/0x400 [ 719.603063] do_vfs_ioctl+0x1de/0x1720 [ 719.606964] ? trace_hardirqs_on+0xbd/0x310 [ 719.611300] ? ioctl_preallocate+0x300/0x300 [ 719.615717] ? memset+0x31/0x40 [ 719.619005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.624549] ? smack_file_ioctl+0x210/0x3c0 [ 719.628875] ? fget_raw+0x20/0x20 [ 719.632337] ? smack_file_lock+0x2e0/0x2e0 [ 719.636575] ? putname+0xf2/0x130 [ 719.640041] ? do_sys_open+0x3ac/0x700 [ 719.643943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.649489] ? security_file_ioctl+0x94/0xc0 [ 719.654399] ksys_ioctl+0xa9/0xd0 [ 719.657861] __x64_sys_ioctl+0x73/0xb0 [ 719.661772] do_syscall_64+0x1b9/0x820 [ 719.665665] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 719.671038] ? syscall_return_slowpath+0x5e0/0x5e0 [ 719.675976] ? trace_hardirqs_on_caller+0x310/0x310 [ 719.681010] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 719.686034] ? recalc_sigpending_tsk+0x180/0x180 [ 719.690793] ? kasan_check_write+0x14/0x20 [ 719.695044] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 719.699899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.705094] RIP: 0033:0x4573e7 [ 719.708295] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 719.727214] RSP: 002b:00007fa377f68a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 719.734941] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 719.742229] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 719.749503] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 719.756774] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 719.764048] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:53 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:53 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKDIR(r0, &(0x7f00000000c0)={0x14, 0x49, 0x2, {0x40, 0x1, 0x7}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() getgroups(0x2, &(0x7f0000000300)=[r3, r4]) fchown(r0, r2, r5) r6 = getpgid(0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0xba4, 0x100000000, 0x1, 0x800, 0x0, 0x7f, 0x8, 0x2, 0x0, 0x8, 0xfffffffffffffbff, 0x9, 0x799, 0x7da4, 0x8, 0xfffffffffffffffe, 0x7, 0x20b9, 0x1, 0x8, 0x0, 0x80000001, 0x1000, 0x3, 0x9, 0x3f, 0xa1f, 0x6, 0x80, 0x2, 0x100000001, 0x15b4000000000, 0x1, 0x5, 0x7, 0x7ff, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x8000, 0x7, 0x8, 0x7, 0x100000000, 0x7, 0x2}, r6, 0xd, r1, 0x2) 05:22:53 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:53 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchdir(r1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:53 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:53 executing program 0 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 719.909279] FAULT_INJECTION: forcing a failure. [ 719.909279] name failslab, interval 1, probability 0, space 0, times 0 [ 719.926372] CPU: 0 PID: 15810 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 719.933666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.943028] Call Trace: [ 719.945646] dump_stack+0x1c4/0x2b4 [ 719.949309] ? dump_stack_print_info.cold.2+0x52/0x52 [ 719.954532] should_fail.cold.4+0xa/0x17 [ 719.958614] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 719.963726] ? __save_stack_trace+0x8d/0xf0 [ 719.968070] ? save_stack+0xa9/0xd0 [ 719.971703] ? save_stack+0x43/0xd0 [ 719.975333] ? kasan_kmalloc+0xc7/0xe0 [ 719.979232] ? kasan_slab_alloc+0x12/0x20 [ 719.983402] ? kmem_cache_alloc_node+0x144/0x730 [ 719.988191] ? __alloc_skb+0x119/0x770 [ 719.992092] ? alloc_uevent_skb+0x84/0x1da [ 719.996335] ? kobject_uevent_env+0xa52/0x101e [ 720.000923] ? kobject_uevent+0x1f/0x24 [ 720.004905] ? lo_ioctl+0x138e/0x1d80 05:22:53 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) fchown(r0, r2, r1) [ 720.008712] ? blkdev_ioctl+0x9ac/0x2010 [ 720.012780] ? block_ioctl+0xee/0x130 [ 720.016585] ? do_vfs_ioctl+0x1de/0x1720 [ 720.020649] ? __x64_sys_ioctl+0x73/0xb0 [ 720.024724] ? fs_reclaim_acquire+0x20/0x20 [ 720.029054] ? lock_downgrade+0x900/0x900 [ 720.029075] ? ___might_sleep+0x1ed/0x300 [ 720.029092] ? arch_local_save_flags+0x40/0x40 [ 720.029107] ? lock_downgrade+0x900/0x900 [ 720.029128] __should_failslab+0x124/0x180 [ 720.029145] should_failslab+0x9/0x14 [ 720.054167] kmem_cache_alloc_node_trace+0x270/0x740 05:22:53 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000080)={0xb8, 0xfffffffffffffff5, 0x6, [{0x2, 0x9, 0x2, 0xa7b, '{['}, {0x3, 0x404000000000000, 0x7, 0x9, 'eth0em0'}, {0x4, 0x4, 0x0, 0xfffffffffffffff7}, {0x2, 0x0, 0x1a, 0x7, '%vboxnet1-systemmime_type.'}, {0x6, 0xffffffffffffff91, 0x0, 0xfff}]}, 0xb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @remote, @broadcast}, &(0x7f0000000040)=0xc) read$FUSE(r0, &(0x7f00000003c0), 0x1000) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:53 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstatfs(r1, &(0x7f0000000000)=""/247) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)=0x2) fchdir(r0) [ 720.059276] ? kasan_unpoison_shadow+0x35/0x50 [ 720.063863] ? kasan_kmalloc+0xc7/0xe0 [ 720.067767] __kmalloc_node_track_caller+0x33/0x70 [ 720.072717] __kmalloc_reserve.isra.39+0x41/0xe0 [ 720.077484] __alloc_skb+0x155/0x770 [ 720.081212] ? skb_scrub_packet+0x490/0x490 [ 720.085556] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 720.091360] ? pointer+0x990/0x990 [ 720.094934] ? device_get_devnode+0x2d0/0x2d0 [ 720.099448] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 720.104496] ? netlink_has_listeners+0x2cb/0x4a0 05:22:53 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)) [ 720.109267] ? netlink_tap_init_net+0x3d0/0x3d0 [ 720.113953] alloc_uevent_skb+0x84/0x1da [ 720.118029] kobject_uevent_env+0xa52/0x101e [ 720.122444] ? kasan_check_write+0x14/0x20 [ 720.126690] kobject_uevent+0x1f/0x24 [ 720.130498] lo_ioctl+0x138e/0x1d80 [ 720.134145] ? lo_rw_aio_complete+0x470/0x470 [ 720.138658] blkdev_ioctl+0x9ac/0x2010 [ 720.142557] ? blkpg_ioctl+0xc10/0xc10 [ 720.146453] ? lock_downgrade+0x900/0x900 [ 720.150623] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 720.156431] ? save_stack+0x43/0xd0 05:22:53 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8020004}, 0xc, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="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"], 0x258}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000180)={0x20, 0x0, 0x8, {0x0, 0x2}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r3) r4 = msgget$private(0x0, 0xa3) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000000)=""/100) 05:22:53 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) r3 = shmget$private(0x0, 0x1000, 0x20, &(0x7f0000fff000/0x1000)=nil) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000080)=0x2) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000000)=""/82) fchown(r0, 0x0, r2) [ 720.160059] ? __kasan_slab_free+0x102/0x150 [ 720.164481] ? __fget+0x4d1/0x740 [ 720.167954] ? ksys_dup3+0x680/0x680 [ 720.171677] ? kasan_check_write+0x14/0x20 [ 720.175923] block_ioctl+0xee/0x130 [ 720.179561] ? blkdev_fallocate+0x400/0x400 [ 720.183895] do_vfs_ioctl+0x1de/0x1720 [ 720.187793] ? trace_hardirqs_on+0xbd/0x310 [ 720.192124] ? ioctl_preallocate+0x300/0x300 [ 720.196540] ? memset+0x31/0x40 [ 720.199830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.205381] ? smack_file_ioctl+0x210/0x3c0 [ 720.209735] ? fget_raw+0x20/0x20 [ 720.213197] ? smack_file_lock+0x2e0/0x2e0 [ 720.217447] ? putname+0xf2/0x130 [ 720.220916] ? do_sys_open+0x3ac/0x700 [ 720.224821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.230368] ? security_file_ioctl+0x94/0xc0 [ 720.234787] ksys_ioctl+0xa9/0xd0 [ 720.238260] __x64_sys_ioctl+0x73/0xb0 [ 720.242152] do_syscall_64+0x1b9/0x820 [ 720.246032] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 720.251413] ? syscall_return_slowpath+0x5e0/0x5e0 [ 720.256378] ? trace_hardirqs_on_caller+0x310/0x310 [ 720.261429] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 720.266465] ? recalc_sigpending_tsk+0x180/0x180 [ 720.271208] ? kasan_check_write+0x14/0x20 [ 720.275434] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 720.280266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.285439] RIP: 0033:0x4573e7 [ 720.288617] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 720.307503] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 720.315206] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 720.322484] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 720.329742] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 720.336997] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 720.344250] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:53 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:53 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0x4008ae89, &(0x7f0000000000)={0x7a, 0x0, [0x40000082]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x81) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x9, 0x8, &(0x7f0000001700)=[{&(0x7f0000000200)="ab36c82c6133037cfde9560700fd41c5977d7e67761cd295a43fe396cb82ba1de0f3b35323fe5db74e209a753fb5ac2d350504d45346967990b0e8fb2a0eb4fc2863d0b19dd21f63ec6be05e7e384bd482b45055993229e2293ac2a4e6d3e74081e0f1b7a4e983acb1625fbb29a805da678a88266b1f4071842b6b7157edee819aeb88c2c11cc0f7c597cf3b58404b10f6e57623bdc2d41994d9a72169ddff763ec24cfc95708c63e751c33cef3890f7695c3f5c640f5acf55153c1419cf97da75b277bfc07688c7d71076c6fa6616e40f0e49e6e1c795bc5b8a46283568291ef450a18408f8", 0xe6}, {&(0x7f00000003c0)="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", 0x1000, 0xfffffffffffffc50}, {&(0x7f00000013c0)="fabb81319b763db835792eafa1ff1da659a2aa99712f08c43fff91a4e88d6930016d0cc55660b8e9dbe04e3c66fb1354b695c5c7e6500d789ff05e16c2de7691cf46d0a69dc67eeb1933bce9a124e6c577c70997704e52a4497f946c122267dbf919dc16a5afb1cd0887c59c9f08ac8963c8a9b26871d7b2b7c1cdcf8a8812d05f96f627ed754db4fd606a1ebb3cb21d839bd8616c78aa296920aaac2de8bfe44459fc1648f5b05a25e9adb1811f46781e33c6651af1bffe29ad69f5bac1ff0257fa7be6e35a058bc2c13fab6a4ca67270317b0d870ee39693259fb54b5ca7b196fff0d9cd691a31df44ac214646d4cc9fbc049c17cdf1", 0xf7, 0xfffffffffffffffa}, {&(0x7f0000000100)="8ea588f833cb0c0ec25d6d7265ea29f813d3fa00d840fb35393980", 0x1b, 0x7f}, {&(0x7f00000014c0)="108d3714443455b48521de0910026ba99b56ac40c9ce721a8e7baf5c9e982986c72f160cabae9e730bddb52185ae661a7a42a50ee5569ac0af305c9d832835f2d079ac8c57a6e05de5477790de08cec59f9da14c9257bf6722964420a5fe25b3307adaf05989351a29e509bf8c0835a43ba07837303e2b36ef01d31e3275330f30e5ed73492fb117489cceb45d73fab1662d4fa00c91dc02d03c95f47dd556c0757624fea33cba", 0xa7, 0x2}, {&(0x7f0000000140)="430a9d9b1bf8bd1d33bc2ead957e7e9a17e217b40137897f2c3c9dfc58a93f477f914e3954cf837a9057bfbd2e14c16d", 0x30, 0x1f}, {&(0x7f0000001580)="403c27e32ab711c54c3f3034ab670738d56bdc38b01a431a07795c344b584cfefabe787dce801ab5ee837e8dd8749254b804df1823b0db3ab33b9b24ad23e6a49582728dd4fa02a13b66246845e77e66dea33f68ac1b413098b5f1805d435e854a61ae4e02f626d2ce63ff8271cb5638844573b0a8924b15941cff568b2773a6fbce1da998d73ac4ed9a8187538f49e84bdc085b9b8ed2d8db41021f635063fb14d714e89996fa7ecb807e3892bdc8c41e2a6a04aaad7650115616df1da8945779a1d9e81e58467e0829e64ed6b66409899fc1bb5e837d276af812", 0xdb, 0x7fff}, {&(0x7f0000001680)="b3021a73784f905e2ba1a929d86986bc3ded984395da43eaaef56d2742d9df04a732f4339284d5cebd41953bd0fbfe26e682b18cac2f9a36bf6e2846e340b883aa214bbe278f8840cbdf7decb3461b1f2f65800b8ebcec99beb8b83f75fe4a", 0x5f, 0x3}], 0x20, &(0x7f0000000180)='/\x00') getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) fchown(r0, 0x0, r6) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000340), 0x10) 05:22:54 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) socket$inet(0x2, 0x1, 0x101) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:54 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="2704", 0x86) 05:22:54 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x5c, r2, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x62}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_TYPE={0x8, 0x4, 0x4de3685a7bac5222}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x20040080) 05:22:54 executing program 0 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:54 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27e0", 0x86) [ 720.748808] FAULT_INJECTION: forcing a failure. [ 720.748808] name failslab, interval 1, probability 0, space 0, times 0 [ 720.764591] CPU: 1 PID: 15858 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 720.771899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.781259] Call Trace: [ 720.781290] dump_stack+0x1c4/0x2b4 [ 720.781314] ? dump_stack_print_info.cold.2+0x52/0x52 [ 720.781341] ? lock_downgrade+0x900/0x900 [ 720.792732] should_fail.cold.4+0xa/0x17 [ 720.792752] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 720.806045] ? rcu_bh_qs+0xc0/0xc0 [ 720.809595] ? unwind_dump+0x190/0x190 [ 720.813501] ? is_bpf_text_address+0xd3/0x170 [ 720.818016] ? __kernel_text_address+0xd/0x40 [ 720.822529] ? unwind_get_return_address+0x61/0xa0 [ 720.827475] ? __save_stack_trace+0x8d/0xf0 [ 720.831819] ? fs_reclaim_acquire+0x20/0x20 [ 720.836158] ? lock_downgrade+0x900/0x900 [ 720.840330] ? ___might_sleep+0x1ed/0x300 [ 720.844488] ? kobject_uevent+0x1f/0x24 [ 720.848472] ? arch_local_save_flags+0x40/0x40 [ 720.853071] ? do_vfs_ioctl+0x1de/0x1720 [ 720.857237] ? ksys_ioctl+0xa9/0xd0 [ 720.860875] ? __x64_sys_ioctl+0x73/0xb0 [ 720.864949] ? do_syscall_64+0x1b9/0x820 [ 720.869026] ? fs_reclaim_acquire+0x20/0x20 [ 720.873363] __should_failslab+0x124/0x180 [ 720.877613] should_failslab+0x9/0x14 [ 720.881425] kmem_cache_alloc+0x2be/0x730 [ 720.885593] skb_clone+0x1bb/0x500 [ 720.889145] ? skb_split+0x11e0/0x11e0 [ 720.893047] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 720.898079] ? netlink_trim+0x1b4/0x380 [ 720.902071] ? netlink_skb_destructor+0x210/0x210 [ 720.906938] netlink_broadcast_filtered+0x110f/0x1680 [ 720.912157] ? __netlink_sendskb+0xd0/0xd0 [ 720.916421] ? pointer+0x990/0x990 [ 720.919982] ? device_get_devnode+0x2d0/0x2d0 [ 720.924494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.930045] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 720.935514] ? refcount_add_not_zero_checked+0x330/0x330 [ 720.940989] ? netlink_has_listeners+0x2cb/0x4a0 [ 720.945766] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 720.950804] netlink_broadcast+0x3a/0x50 [ 720.954883] kobject_uevent_env+0xa83/0x101e [ 720.959302] ? kasan_check_write+0x14/0x20 [ 720.963559] kobject_uevent+0x1f/0x24 [ 720.967372] lo_ioctl+0x138e/0x1d80 [ 720.971019] ? lo_rw_aio_complete+0x470/0x470 [ 720.975532] blkdev_ioctl+0x9ac/0x2010 [ 720.979440] ? blkpg_ioctl+0xc10/0xc10 [ 720.983338] ? lock_downgrade+0x900/0x900 [ 720.987505] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 720.993324] ? save_stack+0x43/0xd0 [ 720.996957] ? __kasan_slab_free+0x102/0x150 [ 721.001379] ? __fget+0x4d1/0x740 [ 721.004855] ? ksys_dup3+0x680/0x680 [ 721.008592] ? kasan_check_write+0x14/0x20 [ 721.012854] block_ioctl+0xee/0x130 [ 721.016503] ? blkdev_fallocate+0x400/0x400 [ 721.020834] do_vfs_ioctl+0x1de/0x1720 [ 721.024742] ? trace_hardirqs_on+0xbd/0x310 [ 721.029076] ? ioctl_preallocate+0x300/0x300 [ 721.033494] ? memset+0x31/0x40 [ 721.036785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.042338] ? smack_file_ioctl+0x210/0x3c0 [ 721.046667] ? fget_raw+0x20/0x20 [ 721.050131] ? smack_file_lock+0x2e0/0x2e0 [ 721.054372] ? putname+0xf2/0x130 [ 721.057844] ? do_sys_open+0x3ac/0x700 [ 721.061752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.067306] ? security_file_ioctl+0x94/0xc0 [ 721.071743] ksys_ioctl+0xa9/0xd0 [ 721.075220] __x64_sys_ioctl+0x73/0xb0 [ 721.079122] do_syscall_64+0x1b9/0x820 [ 721.083020] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 721.088397] ? syscall_return_slowpath+0x5e0/0x5e0 [ 721.093342] ? trace_hardirqs_on_caller+0x310/0x310 [ 721.098370] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 721.103401] ? recalc_sigpending_tsk+0x180/0x180 [ 721.108173] ? kasan_check_write+0x14/0x20 [ 721.112435] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.117295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.122494] RIP: 0033:0x4573e7 [ 721.125696] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:54 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="2784", 0x86) 05:22:54 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27ff", 0x86) 05:22:54 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x20000306) 05:22:54 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x44001, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000040)) r1 = socket$rds(0x15, 0x5, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000100)=0x80000001, &(0x7f0000000140)=0x2) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 721.144617] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 721.152343] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 721.159626] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 721.166903] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 721.174184] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 721.181473] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 05:22:54 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xa) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r1) [ 721.197539] EXT4-fs: 9 callbacks suppressed [ 721.197552] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 721.232746] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 721.301443] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:22:54 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743206", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:54 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:54 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x13f) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:54 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$addseals(r0, 0x409, 0x5) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r1, 0x0, r2) 05:22:54 executing program 0 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:54 executing program 4: pipe2$9p(&(0x7f00000002c0), 0x90000) r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="06008000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x1c) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={r2, 0x72, "ed774d8a8b59457893c836cacb63da05178a44676cdbbce6aca6ab6503eb5e19abb0d9b7368588620c61a5afc9a1554d884dea6289f146ad06a1ba27ba11a0d03e02e4ea392973f5aa7c8dace8aee415950d4a8c74ec390e3e295a5486651108ae374158fd14dc4acee7bf16656e8242bd69"}, &(0x7f0000000140)=0x7a) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00040000000000000000"], 0xa}, 0x0) [ 721.451303] FAULT_INJECTION: forcing a failure. [ 721.451303] name failslab, interval 1, probability 0, space 0, times 0 [ 721.502341] CPU: 1 PID: 15891 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 721.509680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.519038] Call Trace: [ 721.521646] dump_stack+0x1c4/0x2b4 [ 721.525295] ? dump_stack_print_info.cold.2+0x52/0x52 [ 721.530505] ? lock_downgrade+0x900/0x900 [ 721.534696] should_fail.cold.4+0xa/0x17 [ 721.538782] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 721.543897] ? rcu_bh_qs+0xc0/0xc0 [ 721.547444] ? unwind_dump+0x190/0x190 [ 721.551352] ? is_bpf_text_address+0xd3/0x170 [ 721.555861] ? __kernel_text_address+0xd/0x40 [ 721.560368] ? unwind_get_return_address+0x61/0xa0 [ 721.565311] ? __save_stack_trace+0x8d/0xf0 [ 721.569656] ? fs_reclaim_acquire+0x20/0x20 [ 721.573990] ? lock_downgrade+0x900/0x900 [ 721.578152] ? ___might_sleep+0x1ed/0x300 [ 721.582321] ? kobject_uevent+0x1f/0x24 [ 721.586311] ? arch_local_save_flags+0x40/0x40 [ 721.590904] ? do_vfs_ioctl+0x1de/0x1720 [ 721.594972] ? ksys_ioctl+0xa9/0xd0 [ 721.598611] ? __x64_sys_ioctl+0x73/0xb0 [ 721.602681] ? do_syscall_64+0x1b9/0x820 [ 721.606846] ? fs_reclaim_acquire+0x20/0x20 [ 721.611183] __should_failslab+0x124/0x180 [ 721.615440] should_failslab+0x9/0x14 [ 721.619256] kmem_cache_alloc+0x2be/0x730 [ 721.623428] skb_clone+0x1bb/0x500 [ 721.626981] ? skb_split+0x11e0/0x11e0 [ 721.630880] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 721.635914] ? netlink_trim+0x1b4/0x380 [ 721.639903] ? netlink_skb_destructor+0x210/0x210 [ 721.644771] netlink_broadcast_filtered+0x110f/0x1680 [ 721.649977] ? __netlink_sendskb+0xd0/0xd0 [ 721.654565] ? pointer+0x990/0x990 [ 721.658120] ? device_get_devnode+0x2d0/0x2d0 [ 721.662630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.668183] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 721.673763] ? refcount_add_not_zero_checked+0x330/0x330 [ 721.679227] ? netlink_has_listeners+0x2cb/0x4a0 [ 721.683994] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 721.689027] netlink_broadcast+0x3a/0x50 [ 721.693108] kobject_uevent_env+0xa83/0x101e [ 721.697531] ? kasan_check_write+0x14/0x20 [ 721.701784] kobject_uevent+0x1f/0x24 [ 721.705599] lo_ioctl+0x138e/0x1d80 [ 721.709248] ? lo_rw_aio_complete+0x470/0x470 [ 721.713765] blkdev_ioctl+0x9ac/0x2010 [ 721.717667] ? blkpg_ioctl+0xc10/0xc10 [ 721.721565] ? lock_downgrade+0x900/0x900 [ 721.725738] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 721.731555] ? save_stack+0x43/0xd0 [ 721.735192] ? __kasan_slab_free+0x102/0x150 [ 721.739612] ? __fget+0x4d1/0x740 [ 721.743085] ? ksys_dup3+0x680/0x680 [ 721.746821] block_ioctl+0xee/0x130 [ 721.750462] ? blkdev_fallocate+0x400/0x400 [ 721.754795] do_vfs_ioctl+0x1de/0x1720 [ 721.758694] ? trace_hardirqs_on+0xbd/0x310 [ 721.763537] ? ioctl_preallocate+0x300/0x300 [ 721.767959] ? memset+0x31/0x40 [ 721.771251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.776800] ? smack_file_ioctl+0x210/0x3c0 [ 721.781131] ? fget_raw+0x20/0x20 [ 721.784595] ? smack_file_lock+0x2e0/0x2e0 [ 721.788834] ? putname+0xf2/0x130 [ 721.792305] ? do_sys_open+0x3ac/0x700 [ 721.796233] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.801780] ? security_file_ioctl+0x94/0xc0 [ 721.806207] ksys_ioctl+0xa9/0xd0 [ 721.809677] __x64_sys_ioctl+0x73/0xb0 [ 721.813581] do_syscall_64+0x1b9/0x820 [ 721.817476] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 721.822855] ? syscall_return_slowpath+0x5e0/0x5e0 [ 721.827796] ? trace_hardirqs_on_caller+0x310/0x310 [ 721.832822] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 721.837847] ? recalc_sigpending_tsk+0x180/0x180 [ 721.842612] ? kasan_check_write+0x14/0x20 [ 721.846860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 721.851718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.856918] RIP: 0033:0x4573e7 [ 721.860117] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 721.879031] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 721.886759] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004573e7 [ 721.894037] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 05:22:54 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00'], &(0x7f0000000280)=[&(0x7f0000000200)='$cpuset\'security@\x00', &(0x7f0000000240)='posix_acl_accesslo\x00'], 0x1000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x80000}}, 0x20) pread64(r0, &(0x7f00000003c0)=""/250, 0xfa, 0x0) 05:22:54 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) ioctl$NBD_DISCONNECT(r0, 0xab08) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000000), 0x4) [ 721.901311] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 721.908584] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 721.915864] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 [ 721.938500] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:22:55 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0xd) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 721.952539] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 722.024317] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:22:55 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x8800000) 05:22:55 executing program 0 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:55 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000000)) getgroups(0x0, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) [ 722.150286] FAULT_INJECTION: forcing a failure. [ 722.150286] name failslab, interval 1, probability 0, space 0, times 0 [ 722.177366] CPU: 1 PID: 15917 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 722.184675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.194035] Call Trace: [ 722.196655] dump_stack+0x1c4/0x2b4 [ 722.200316] ? dump_stack_print_info.cold.2+0x52/0x52 [ 722.205520] ? lo_ioctl+0xe6/0x1d80 [ 722.209177] should_fail.cold.4+0xa/0x17 [ 722.213273] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 722.218387] ? blkpg_ioctl+0xc10/0xc10 [ 722.222283] ? lock_downgrade+0x900/0x900 [ 722.226444] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 722.232258] ? save_stack+0x43/0xd0 [ 722.235894] ? __kasan_slab_free+0x102/0x150 [ 722.240317] ? __fget+0x4d1/0x740 [ 722.243790] ? fs_reclaim_acquire+0x20/0x20 [ 722.248155] ? lock_downgrade+0x900/0x900 [ 722.252332] ? ___might_sleep+0x1ed/0x300 [ 722.256493] ? arch_local_save_flags+0x40/0x40 [ 722.261082] ? block_ioctl+0xee/0x130 [ 722.264896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.270453] __should_failslab+0x124/0x180 [ 722.274706] should_failslab+0x9/0x14 [ 722.278526] kmem_cache_alloc+0x2be/0x730 [ 722.282685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.288240] ? smack_file_ioctl+0x210/0x3c0 [ 722.292573] ? fget_raw+0x20/0x20 [ 722.296037] ? smack_file_lock+0x2e0/0x2e0 [ 722.300290] getname_flags+0xd0/0x5a0 [ 722.304106] do_mkdirat+0xc5/0x310 [ 722.307668] ? __ia32_sys_mknod+0xb0/0xb0 [ 722.311825] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.317216] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 722.322684] ? ksys_ioctl+0x81/0xd0 [ 722.326335] __x64_sys_mkdir+0x5c/0x80 [ 722.330245] do_syscall_64+0x1b9/0x820 [ 722.334142] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 722.339521] ? syscall_return_slowpath+0x5e0/0x5e0 [ 722.344469] ? trace_hardirqs_on_caller+0x310/0x310 [ 722.349497] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 722.354521] ? recalc_sigpending_tsk+0x180/0x180 [ 722.359287] ? kasan_check_write+0x14/0x20 [ 722.363545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 722.368407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.373607] RIP: 0033:0x4569b7 [ 722.376809] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:22:55 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:55 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xd7, "6d8b5fef3456a74840630535dad96eea8f2f195c928056c27151d1b5e4021f2ed64aac52828576aac16caf7cb33be56bbcbb2a62be471779d130636ae2335cab18727ea5da7549633bd34738de4c9e11cec373966f85118f394f2c2ed95c2a7eb98e3ff566e00c89b6bf40efb7f2b59c847ea4a6af656bbc35a90b158a820e484e22d6613448d804602695f18c1efd4a1a21fcfffd64ab0da5f9afafe3a370d7a473f5f69962139ce37fd5c1fd07dc359e707444e8276a33ab2fac310540a4fa861b338558c2f0a1866a83314b5ffc95a0d388541ef07e"}, &(0x7f0000000080)=0xdf) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r2, 0x17e, 0x3, 0x3}, &(0x7f0000000140)=0x10) 05:22:55 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20402, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000040)={0x1, 0x1, 0x0, 0x3}) r1 = socket$rds(0x15, 0x5, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:55 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x8e, 0x1, 0x8, "f87e6ed3827d89b5a809a8d472fafca9", "89220d16c5bb2a474b93f3dda1e57590d5360245382ed5dc90c0c94b0cba8ab09ec45e76e41259c711bc1c394810fe332d5e7552f0d6c4e68a2174b9214ea8488c7f452d3fcf3a063b1e9a31da2b5da8017e52be9a1dbc640efc7f0695bff1ce430cb0fd164a5162e9738759fad90f9cbe482d9de5b1304c0f"}, 0x8e, 0x2) fchown(r0, 0x0, r3) readahead(r1, 0x100000001, 0x20) 05:22:55 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgid() getgid() getgroups(0xdd, &(0x7f0000000300)) fchown(r0, 0x0, 0x0) 05:22:55 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r1) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x9, 0x0, 0xfffffffffffffff9, 0x0, 'syz1\x00', 0x20}) 05:22:55 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000200)=ANY=[], &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x75, "e424116cdcb2f6ba79ed9db1bfb189618ae9dd37d5916985835a99b5476309f5f24aa66f7301f6b9ebfed53cfb8cc378be6b152bab9f9e7dc1ac44a5d9dbfdf349050ced72713108a5073efba72c40986fd85a51a30b997dbb7c3ad8f6bc717121d8653621cbf745a84299e2af97cca234d52e6b0c"}, &(0x7f0000000180)=0x7d) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) timer_create(0x6, &(0x7f0000000000)={0x0, 0x2a, 0x3}, &(0x7f0000000040)=0x0) timer_delete(r3) [ 722.395717] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 722.403450] RAX: ffffffffffffffda RBX: 0000000020000628 RCX: 00000000004569b7 [ 722.410737] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 722.418017] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 722.425313] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 722.432589] R13: 0000000000000001 R14: 00000000004d7d88 R15: 0000000000000003 [ 722.444267] Unknown ioctl 1077980789 05:22:55 executing program 4: r0 = socket(0x5, 0x0, 0x48) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfd, 0x800000}, 0xc) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000140)={0x2, 0x4e24, @multicast1}, 0xff31) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) r3 = fcntl$dupfd(r1, 0x0, r1) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x9e8, 0x6, 0x10000, 0x2, 0x0, 0xac, 0x84100, 0x2, 0x4, 0x7, 0x9, 0x1, 0xffffffffffffff01, 0x3f, 0x9, 0xffff, 0xb0d, 0x6, 0x9, 0x3, 0x2, 0x7, 0x3, 0x5, 0x6dd9, 0x7ff, 0xce, 0xff, 0x9, 0x0, 0x4, 0x8f, 0x8, 0x9af, 0x1, 0x3f, 0x0, 0x100000001, 0x2, @perf_config_ext={0x7f, 0x3e0000000000000}, 0x2000, 0x3, 0x4, 0x3, 0x0, 0x5, 0x8}, r2, 0x10, r3, 0xa) socket(0x4, 0x80000, 0x81) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="8ef600ffffff664cf756fd000000"], 0xa}, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000240)=0x4) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x400) 05:22:55 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstat(r1, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) recvfrom$packet(r0, &(0x7f00000000c0)=""/235, 0xeb, 0x102, &(0x7f0000000300)={0x11, 0x0, r3, 0x1, 0x5, 0x6, @remote}, 0x14) getgid() getgroups(0x4254, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000003c0)={{0x6, 0x5, 0x7, 0x400, '\x00', 0x1}, 0x0, [0x100000000000, 0x9, 0xd354, 0x20, 0x9, 0x9, 0x2, 0x2, 0x5, 0x5, 0x0, 0x10000, 0x20, 0x9, 0x3ad02733, 0x6, 0x101, 0x8000, 0x9, 0x2, 0x1f8000000000000, 0x81, 0x6, 0x4, 0x1, 0x400, 0x200, 0x5, 0x7fff, 0x2, 0xfffffffffffffff8, 0x4b, 0x0, 0xffffffffb1902ed5, 0xffffffffffffffff, 0x10001, 0x7, 0x5, 0x8, 0x52f, 0xfffffffffffffffc, 0x3, 0xfff, 0xbc7, 0x2, 0x2, 0x9, 0x9, 0x200, 0x0, 0x2, 0x74, 0x2, 0xaf, 0x5, 0x3, 0x4, 0x4, 0xffffffffffffffc0, 0x0, 0x1, 0xa973, 0x1, 0x3, 0x838, 0x1f, 0x5a, 0x0, 0x5, 0x8000, 0x6, 0x2, 0x8, 0x300, 0x5, 0x6, 0x4, 0x3465, 0x1, 0x7, 0x24a2, 0x7ff, 0x7fff, 0x7, 0x5, 0x101, 0xbf, 0x8, 0x7, 0xb066, 0x6, 0xffffffffb1c19ddb, 0xc97f, 0x9, 0x9, 0x2, 0x7225, 0xffffffffffffff2b, 0x2, 0x8, 0x5, 0x3, 0x2, 0x4, 0x6, 0x800, 0x7, 0x5, 0x7, 0xded8, 0x3, 0x5, 0x9, 0x8, 0x7fffffff, 0xfb, 0x5, 0x8, 0x9, 0x8, 0x4, 0x6, 0xffffffff, 0x6c, 0x5, 0x7, 0x100000000, 0x1]}) fchown(r0, 0x0, 0x0) [ 722.447500] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 722.535325] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 722.606011] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:22:56 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0xffffffff000) 05:22:56 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x3, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r2 = getegid() stat(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(r0, &(0x7f0000000540)={0x82, 0x7d, 0x2, {{0x0, 0x67, 0x5, 0xda25, {0x20, 0x0, 0x6}, 0x19b00000, 0x1, 0x38f, 0x3, 0x2, ',)', 0x2, '}/', 0x2a, "707070317d40a32a7b2c6c6f2d5d76626f786e657430706f7369785f61636c5f6163636573737d7d6b7d", 0x6, '.nodev'}, 0x6, 'vmnet0', r1, r2, r3}}, 0x82) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xe959, &(0x7f0000000080)=0x0) io_cancel(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x5758, r5, &(0x7f0000000100)="03f2a6ebaec4ae7c7f0ea4b21ecd197eebfd1fc482ede381f6da", 0xfffffe38, 0x1, 0x0, 0x3, r4}, &(0x7f0000000180)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f00000002c0)={0x2000, 0x10000}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000600)=0x0) ptrace$cont(0x3f, r8, 0xffffffff00000001, 0xcfb3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$sock_netdev_private(r6, 0x89f3, &(0x7f0000000200)="0f09ffa56573aa76987c2b4f918ee5a3cde279d46e3f7f435348454d256c621973562689a883453b63adadddb4e620ae9077807e2a03477b1e9932e42abb56e21477b98c6b62d35e094e8dae32a0186f4c320881c60c67c870") 05:22:56 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64IPOUT\x00', &(0x7f0000000080)='bdevvboxnet0.cgroup%[\x00', 0x16, 0x1) fchown(r0, 0x0, r2) 05:22:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sco\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000340)=0x14, 0x80000) bind$xdp(r0, &(0x7f0000000380)={0x2c, 0x1, r1, 0xf}, 0x10) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000080000000009a3ed8533184f715eef5e3d448ae169df92aec12bdb05c0cebea3ec3030acfc9228c75d6b46f7c6d431b2f4106f8ec6812a4d6ba604f2bfb612f692cb2f4c48011a1b5f417791d4925ce3f060d8cf56691263f7d7523aefd836a4da053e1684466d984b2f40fcfbf2ff4cbc8e11d3ef8e95bc4bf8e34c4e2ff4f171d3c893f03eb8790ba2b6ae9e2d9abb4a6e1dabd2b83a621e8537c4f7c392a64ae8ccf0bc4e14539bee39c26a26a3b3008e79be72a4b76dece46087f303dd0d566f3"], 0xa}, 0x0) 05:22:56 executing program 0 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:56 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 723.251544] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 723.261416] FAULT_INJECTION: forcing a failure. [ 723.261416] name failslab, interval 1, probability 0, space 0, times 0 [ 723.298567] CPU: 1 PID: 15966 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 723.305870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.315238] Call Trace: [ 723.317856] dump_stack+0x1c4/0x2b4 [ 723.321507] ? dump_stack_print_info.cold.2+0x52/0x52 [ 723.326727] ? __kernel_text_address+0xd/0x40 [ 723.331246] ? unwind_get_return_address+0x61/0xa0 [ 723.336203] should_fail.cold.4+0xa/0x17 [ 723.340282] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 723.345396] ? save_stack+0xa9/0xd0 [ 723.349036] ? save_stack+0x43/0xd0 [ 723.352668] ? kasan_kmalloc+0xc7/0xe0 [ 723.356578] ? __kmalloc_track_caller+0x14a/0x750 [ 723.361429] ? memdup_user+0x2c/0xa0 [ 723.365148] ? strndup_user+0x77/0xd0 [ 723.368954] ? ksys_mount+0x3c/0x140 [ 723.372678] ? do_syscall_64+0x1b9/0x820 [ 723.376760] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.382139] ? lock_acquire+0x1ed/0x520 [ 723.386125] ? handle_mm_fault+0x42a/0xc70 [ 723.390370] ? fs_reclaim_acquire+0x20/0x20 [ 723.394700] ? lock_downgrade+0x900/0x900 [ 723.398864] ? ___might_sleep+0x1ed/0x300 [ 723.403027] ? arch_local_save_flags+0x40/0x40 [ 723.407621] ? lock_release+0x970/0x970 [ 723.411614] ? arch_local_save_flags+0x40/0x40 [ 723.416239] __should_failslab+0x124/0x180 [ 723.420488] should_failslab+0x9/0x14 [ 723.424307] __kmalloc_track_caller+0x2d0/0x750 [ 723.428998] ? strncpy_from_user+0x510/0x510 [ 723.433417] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 723.438960] ? strndup_user+0x77/0xd0 [ 723.442776] memdup_user+0x2c/0xa0 [ 723.446335] strndup_user+0x77/0xd0 [ 723.449975] ksys_mount+0x73/0x140 [ 723.453533] __x64_sys_mount+0xbe/0x150 [ 723.457521] do_syscall_64+0x1b9/0x820 [ 723.460144] QAT: Invalid ioctl [ 723.461417] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 723.461437] ? syscall_return_slowpath+0x5e0/0x5e0 [ 723.461451] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.461474] ? trace_hardirqs_on_caller+0x310/0x310 [ 723.472971] QAT: Invalid ioctl [ 723.474943] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 723.474961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.474976] ? prepare_exit_to_usermode+0x291/0x3b0 [ 723.474996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.508433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.513633] RIP: 0033:0x459fea [ 723.516836] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 723.535747] RSP: 002b:00007fa377faaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 05:22:56 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x9, 0x800, 0x80, 0x1, 0x6, 0x80, 0xffffffffffffffff, 0xfff, 0x0, 0xfff}) 05:22:56 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) socket$l2tp(0x18, 0x1, 0x1) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) 05:22:56 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)={@reserved}) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x401) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000000)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000300)=[r3, 0xee01]) geteuid() r5 = getuid() fchown(r2, r5, r4) 05:22:56 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400800, 0x0) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) 05:22:56 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000100)={0xfffffffffffffffd, 0x3}) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@broadcast, @multicast2, 0x0, 0xa, [@local, @empty, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0x1e}, @remote, @multicast2, @multicast1, @rand_addr=0x200, @broadcast]}, 0x38) fchown(r1, r3, r2) 05:22:56 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000040)=0x8, 0x8) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) [ 723.543468] RAX: ffffffffffffffda RBX: 00007fa377faab30 RCX: 0000000000459fea [ 723.550749] RDX: 00007fa377faaad0 RSI: 0000000020000080 RDI: 00007fa377faaaf0 [ 723.558032] RBP: 0000000020000080 R08: 00007fa377faab30 R09: 00007fa377faaad0 [ 723.565314] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 723.572595] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 05:22:57 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0xfffffffffffffdef) 05:22:57 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x4000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',fscache,cache=mmap,cache=fscache,cachetag=vboxnet0,cache=none,msize=0x0000000000000008,access=client,obj_user=yvmnet1,audit,eid<', @ANYRESDEC=r3, @ANYBLOB=',\x00']) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r4) 05:22:57 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000000)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x1) 05:22:57 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874328c", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:57 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r0, &(0x7f0000000100)="af259f5ccabf2a7ff2b35c1e3a902a6ccbbeff870e73a27da415458caaedeebf9496637cf7ef726e8feca0e20fbba38c6106a85fc3971f3ee728bdeb14dfa7e3a87f1037fb74cd130aa6ace07bd06379757c20b89037c37ccffcfe1d81501fca95c07ad05364e503c466d1f5a557890c33a6abf6f36300309ab98d0d12e6e71c8ef9dd60cc2fad8bdf43619d95e2685f922864124244409b82a15031071df2e38336349464316eccdacbeba88c891b3ae5f348167d6310d3acb4d89aaad3cbd4dbf5ab570841f917a2c35ad942062def06c95e86340cad49505f3ddd63d7602903ae720cc06a0f358e86fffa4227802ff245", 0xf2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000003c0)={r2, 0x228e, 0xfff, "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"}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:57 executing program 0 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 724.368782] FAULT_INJECTION: forcing a failure. [ 724.368782] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 724.380634] CPU: 1 PID: 16013 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 724.387910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.397263] Call Trace: [ 724.399879] dump_stack+0x1c4/0x2b4 [ 724.403539] ? dump_stack_print_info.cold.2+0x52/0x52 [ 724.408761] should_fail.cold.4+0xa/0x17 [ 724.412851] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 724.417973] ? is_bpf_text_address+0xac/0x170 [ 724.422485] ? lock_downgrade+0x900/0x900 [ 724.426648] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 724.432461] ? mark_held_locks+0x130/0x130 [ 724.436705] ? mark_held_locks+0x130/0x130 [ 724.440971] ? is_bpf_text_address+0xd3/0x170 [ 724.445478] ? kernel_text_address+0x79/0xf0 [ 724.449899] ? __kernel_text_address+0xd/0x40 [ 724.454408] ? unwind_get_return_address+0x61/0xa0 [ 724.459363] ? __save_stack_trace+0x8d/0xf0 [ 724.463696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.469247] ? should_fail+0x22d/0xd01 [ 724.473150] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 724.478275] __alloc_pages_nodemask+0x34b/0xde0 [ 724.482956] ? __kmalloc_track_caller+0x14a/0x750 [ 724.487808] ? memdup_user+0x2c/0xa0 [ 724.491532] ? strndup_user+0x77/0xd0 [ 724.495346] ? ksys_mount+0x73/0x140 [ 724.499070] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 724.504097] ? lock_acquire+0x1ed/0x520 [ 724.508091] ? handle_mm_fault+0x42a/0xc70 [ 724.512342] ? fs_reclaim_acquire+0x20/0x20 [ 724.516677] ? lock_downgrade+0x900/0x900 [ 724.520841] ? ___might_sleep+0x1ed/0x300 [ 724.525001] ? trace_hardirqs_off+0xb8/0x310 [ 724.529419] cache_grow_begin+0x91/0x8c0 [ 724.533492] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.539048] ? check_preemption_disabled+0x48/0x200 [ 724.544080] kmem_cache_alloc_trace+0x67e/0x750 [ 724.548771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.554328] copy_mount_options+0x5f/0x380 [ 724.558580] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.564141] ksys_mount+0xd0/0x140 [ 724.567707] __x64_sys_mount+0xbe/0x150 [ 724.571712] do_syscall_64+0x1b9/0x820 [ 724.575620] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 724.580999] ? syscall_return_slowpath+0x5e0/0x5e0 [ 724.585947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 724.590818] ? trace_hardirqs_on_caller+0x310/0x310 [ 724.595857] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 724.600898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.606457] ? prepare_exit_to_usermode+0x291/0x3b0 [ 724.611496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 724.616352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.621551] RIP: 0033:0x459fea [ 724.624761] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 724.643671] RSP: 002b:00007fa377faaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 724.651477] RAX: ffffffffffffffda RBX: 00007fa377faab30 RCX: 0000000000459fea [ 724.658769] RDX: 00007fa377faaad0 RSI: 0000000020000080 RDI: 00007fa377faaaf0 05:22:57 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2f000000000006000000"], 0xa}, 0x0) 05:22:57 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0xfffffdef) 05:22:57 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x80000001, 0x208, 0x5, 0x5, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x9}, 0x8) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="ea72ea764ac3f3447dcf30bd7c516a5a44e7039c67d1cfaa33586ad489cedb7e60ac3e47282ede4371add996f9fd0f5171ea38dd4960aacb440000000000"], 0xa}, 0x0) 05:22:57 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x4e22, @loopback}, 0x8) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:57 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x89) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000040)) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x4e22, @rand_addr=0x5}, 0x10, &(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00001000000000000000"], 0xa}, 0x0) fcntl$setsig(r0, 0xa, 0x22) 05:22:57 executing program 4: r0 = memfd_create(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x6) r1 = socket$rds(0x15, 0x5, 0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x74fd, 0x40000) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0xfffffe5c, &(0x7f00000001c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xfffffffffffffe31}, 0x0) 05:22:58 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40000, 0x0) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1) inotify_rm_watch(r1, r2) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) mbind(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x3, &(0x7f0000000000)=0x20, 0x0, 0x3) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:58 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1, 0x400000) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000040)={0x2, 0x89, 0x2, 0x5, 0x15, 0x9}) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r1, 0xab00, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r1, 0x0, r3) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x4e24}}, 0x40, 0x6, 0x1, "b53c93ed54f4ff23514c9a351df52b6c701a32816677b07925306b65503ee1adfd6103fe06af963f9501ecd0711cc5d748ccf40cc6c8c6946aac31e9fe78083466ec90b544b3d511cde5ef78d11f25ee"}, 0xd8) 05:22:58 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x1000000004000) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x8, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x390) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000100)={0x3f, 0x0, 0x0, 0x8000}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000140)={r2, 0x3eae649f}) membarrier(0x10, 0x0) [ 724.666040] RBP: 0000000020000080 R08: 00007fa377faab30 R09: 00007fa377faaad0 [ 724.673314] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 724.680587] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 05:22:58 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:58 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) r4 = getuid() setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000000)=0x7ff, 0x4) fchown(r1, r4, r3) 05:22:58 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000200)=0x1515, 0x8) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x100) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x2000, 0x1}) bind$alg(r2, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast5)\x00'}, 0x58) 05:22:58 executing program 0 (fault-call:2 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 724.863053] FAULT_INJECTION: forcing a failure. [ 724.863053] name failslab, interval 1, probability 0, space 0, times 0 [ 724.900862] CPU: 0 PID: 16056 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 724.908190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.918423] Call Trace: [ 724.918452] dump_stack+0x1c4/0x2b4 [ 724.918478] ? dump_stack_print_info.cold.2+0x52/0x52 [ 724.918499] ? __kernel_text_address+0xd/0x40 [ 724.918526] ? unwind_get_return_address+0x61/0xa0 [ 724.924726] should_fail.cold.4+0xa/0x17 [ 724.924746] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 724.924764] ? save_stack+0xa9/0xd0 [ 724.952106] ? kasan_kmalloc+0xc7/0xe0 [ 724.956001] ? __kmalloc_track_caller+0x14a/0x750 [ 724.960847] ? memdup_user+0x2c/0xa0 [ 724.964561] ? strndup_user+0x77/0xd0 [ 724.968367] ? ksys_mount+0x73/0x140 [ 724.972090] ? __x64_sys_mount+0xbe/0x150 [ 724.976246] ? do_syscall_64+0x1b9/0x820 [ 724.980324] ? lock_acquire+0x1ed/0x520 [ 724.984311] ? handle_mm_fault+0x42a/0xc70 [ 724.988564] ? fs_reclaim_acquire+0x20/0x20 [ 724.992895] ? lock_downgrade+0x900/0x900 [ 724.997054] ? ___might_sleep+0x1ed/0x300 [ 725.001209] ? arch_local_save_flags+0x40/0x40 [ 725.005801] ? lock_release+0x970/0x970 [ 725.009792] ? arch_local_save_flags+0x40/0x40 [ 725.014385] ? usercopy_warn+0x110/0x110 [ 725.018461] __should_failslab+0x124/0x180 [ 725.022710] should_failslab+0x9/0x14 [ 725.026521] kmem_cache_alloc_trace+0x2d7/0x750 [ 725.031905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.037454] ? _copy_from_user+0xdf/0x150 [ 725.041615] copy_mount_options+0x5f/0x380 [ 725.045861] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.051408] ksys_mount+0xd0/0x140 [ 725.054962] __x64_sys_mount+0xbe/0x150 [ 725.058947] do_syscall_64+0x1b9/0x820 [ 725.062850] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 725.068241] ? syscall_return_slowpath+0x5e0/0x5e0 [ 725.073182] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.078040] ? trace_hardirqs_on_caller+0x310/0x310 [ 725.083069] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 725.088095] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.093640] ? prepare_exit_to_usermode+0x291/0x3b0 [ 725.098667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.103523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.108728] RIP: 0033:0x459fea [ 725.111933] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 725.130841] RSP: 002b:00007fa377faaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 725.130856] RAX: ffffffffffffffda RBX: 00007fa377faab30 RCX: 0000000000459fea [ 725.130863] RDX: 00007fa377faaad0 RSI: 0000000020000080 RDI: 00007fa377faaaf0 [ 725.130871] RBP: 0000000020000080 R08: 00007fa377faab30 R09: 00007fa377faaad0 [ 725.130879] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 725.130887] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 05:22:58 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0xfdef) 05:22:58 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r3, 0x7, 0x8}, 0xc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x9, &(0x7f0000000200)=[{0x5, 0xfa7b, 0x8000, 0x8001}, {0x6, 0x5, 0x6, 0xd5d}, {0x6, 0x25de2aff, 0xd44, 0x9}, {0x1, 0xa2, 0x1f, 0xbaa}, {0x7, 0x20, 0xfd, 0x7fff}, {0x9, 0x38a, 0xff, 0xbf}, {0x7, 0x603, 0x1, 0x40}, {0x7, 0xfff, 0x1, 0x9}, {0xf18e, 0x5, 0x5, 0xda6}]}, 0x10) 05:22:58 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1800000, 0x2) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x0, 0x8, 0xff, 0xfff, 0x400}) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) shutdown(r2, 0x1) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r1, 0x0, r3) 05:22:58 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000ab87b67c8756e02b42604def56f93675163d299d7133b28ecd8e08c9be8ecbd43f98030b4acdfd290c76e20c07ce50e3d08b3d1ceaec363f3609fec204d7f5d39f2da4913fe66946005d2400927bf1d29225b72b319c86931c"], 0xa}, 0x0) 05:22:58 executing program 0 (fault-call:2 fault-nth:28): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:58 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:22:58 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x22) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x0, [], [{0x101, 0x30, 0x8, 0x2, 0x200, 0x4}, {0xfffffffffffffffa, 0x9, 0xcd, 0x7fffffff, 0x3, 0x10000}], [[], []]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:58 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) r1 = memfd_create(&(0x7f0000000000)='cgroup+*^keyring\x00', 0x2) write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x40, 0x1, 0x4}, 0x8001}}, 0x18) 05:22:58 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000002c0)={r1, 0x0, 0x4693, 0x1, 0x8}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x48, 0x9, 0x7ff, 0x1, 0xeabb, 0x6, 0x101, {0x0, @in6={{0xa, 0x4e24, 0x3, @mcast1, 0xbd2}}, 0x1f, 0xffffffffffff8001, 0x8, 0x97a, 0x7}}, &(0x7f0000000080)=0xb0) seccomp(0x0, 0x1, &(0x7f0000000280)={0x3, &(0x7f0000000240)=[{0x9, 0xed, 0xffffffffffffff59, 0x8}, {0x7, 0xfff, 0x20000000, 0x2}, {0x10000, 0x0, 0x3, 0x9}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r2, 0x8, 0x1, 0x3daa9e56, 0xe6d3}, 0x14) 05:22:58 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2, 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:58 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x4e21, @remote}, 0x1fe) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000eaffffff7b213ecbb3df874d6e1f871cda1d4c21e51c3ef2ba0000"], 0xa}, 0x0) 05:22:58 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x0, &(0x7f0000000300)) fchown(r0, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200000, 0x0) 05:22:58 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "8921e5037380661d8e1bd12d994b5684af1d2d8d"}, 0x15, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x1f) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:22:58 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040), 0x4) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x300000d, 0x100130, r1, 0x0) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:22:58 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = semget$private(0x0, 0x0, 0x204) semctl$GETALL(r1, 0x0, 0xd, &(0x7f00000002c0)=""/250) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 725.587132] FAULT_INJECTION: forcing a failure. [ 725.587132] name failslab, interval 1, probability 0, space 0, times 0 05:22:58 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2-', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 725.629721] CPU: 0 PID: 16096 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 725.637037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.646397] Call Trace: [ 725.649016] dump_stack+0x1c4/0x2b4 [ 725.653145] ? dump_stack_print_info.cold.2+0x52/0x52 [ 725.658355] ? __kernel_text_address+0xd/0x40 [ 725.662863] ? unwind_get_return_address+0x61/0xa0 [ 725.667806] should_fail.cold.4+0xa/0x17 [ 725.671878] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 725.676988] ? save_stack+0xa9/0xd0 [ 725.680619] ? kasan_kmalloc+0xc7/0xe0 [ 725.684513] ? __kmalloc_track_caller+0x14a/0x750 [ 725.689356] ? memdup_user+0x2c/0xa0 [ 725.693076] ? strndup_user+0x77/0xd0 [ 725.696880] ? ksys_mount+0x73/0x140 [ 725.700598] ? __x64_sys_mount+0xbe/0x150 [ 725.704756] ? do_syscall_64+0x1b9/0x820 [ 725.708834] ? lock_acquire+0x1ed/0x520 [ 725.712822] ? handle_mm_fault+0x42a/0xc70 [ 725.717071] ? fs_reclaim_acquire+0x20/0x20 [ 725.721411] ? lock_downgrade+0x900/0x900 [ 725.726322] ? ___might_sleep+0x1ed/0x300 [ 725.730487] ? arch_local_save_flags+0x40/0x40 [ 725.735080] ? lock_release+0x970/0x970 [ 725.739066] ? arch_local_save_flags+0x40/0x40 [ 725.743654] ? usercopy_warn+0x110/0x110 [ 725.747724] __should_failslab+0x124/0x180 [ 725.751973] should_failslab+0x9/0x14 [ 725.755785] kmem_cache_alloc_trace+0x2d7/0x750 [ 725.760469] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.760485] ? _copy_from_user+0xdf/0x150 [ 725.760504] copy_mount_options+0x5f/0x380 [ 725.770203] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 725.770229] ksys_mount+0xd0/0x140 [ 725.783519] __x64_sys_mount+0xbe/0x150 [ 725.787509] do_syscall_64+0x1b9/0x820 [ 725.791402] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 725.796781] ? syscall_return_slowpath+0x5e0/0x5e0 [ 725.801722] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.806574] ? trace_hardirqs_on_caller+0x310/0x310 [ 725.811605] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 725.816630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.822174] ? prepare_exit_to_usermode+0x291/0x3b0 [ 725.827228] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 725.832084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.837281] RIP: 0033:0x459fea [ 725.840480] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 725.859385] RSP: 002b:00007fa377faaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 725.867106] RAX: ffffffffffffffda RBX: 00007fa377faab30 RCX: 0000000000459fea [ 725.874378] RDX: 00007fa377faaad0 RSI: 0000000020000080 RDI: 00007fa377faaaf0 [ 725.881651] RBP: 0000000020000080 R08: 00007fa377faab30 R09: 00007fa377faaad0 [ 725.888925] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 725.896208] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 05:22:59 executing program 0 (fault-call:2 fault-nth:29): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:59 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xffffffffffffff6a}, 0x0) 05:22:59 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:22:59 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = getuid() getgroups(0x2, &(0x7f00000000c0)=[0x0, 0xee00]) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x10, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}], [{@hash='hash'}]}}) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:22:59 executing program 2: r0 = getpgrp(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x3f, 0x1, 0x661, 0x9, 0x0, 0xff, 0x8888, 0x2, 0xfff, 0x5f00000000000000, 0x3, 0x3f, 0x200, 0x6, 0x2da, 0x8, 0x1, 0x7, 0x3, 0x3, 0x401, 0x3e0b8dfd, 0x6, 0xec, 0x5, 0x1, 0x80, 0x4, 0x2, 0x44, 0xe7ef, 0x3, 0x6, 0x5, 0x8, 0x1, 0x0, 0x91, 0x0, @perf_config_ext={0x1ff, 0x6}, 0x0, 0xffffffffffffff01, 0x9, 0x0, 0x6, 0x3, 0x3}, 0xffffffffffffffff, 0xd, 0xffffffffffffff9c, 0x2) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x10001, 0x0, 0x7fffffff, 0x0, 0xb88, 0x0, 0x2, 0x4c1a, 0x8, 0x2, 0x1d1, 0x4, 0x3, 0x2, 0x3ef0, 0x1, 0x1, 0x100, 0x2, 0x3, 0x2, 0x8, 0x3ff, 0x1, 0x0, 0xff11, 0x5, 0x3f, 0x5, 0x0, 0x400, 0x9, 0x8, 0x3f, 0x1, 0x0, 0xffffffffffffa328, 0x4, @perf_config_ext={0x14d, 0x8000}, 0x0, 0x8, 0x20, 0x5, 0x9a85, 0x74, 0x7}, r0, 0x8, r1, 0xa) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080), 0x0, 0x8}}, 0x20) 05:22:59 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x10000400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000100)={0xb5bc, {{0x2, 0x4e20, @remote}}}, 0x88) 05:22:59 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) write$P9_RREADDIR(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="49000000290200000000000a00000000080000000000000002000000000000007f07002e2f66696c65302103000000080000000000000061ab0000000000000807002e2f66696c653044126b8329c35d3b0608d514e28e065b8c832bd9146f238b418708398ae398ca9c82bc9872d9bffaf287497114224d58d5d7f51bf6d7ee8026a80802424091cc95aebf26dc755ea9d029fae63a0f54a3f4f8a6a56e72e752d748084a2ae4886f3f1094a38bb3908227cb59"], 0x39) 05:22:59 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)}}, 0x20) 05:22:59 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x40000, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x500, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000200)={r1, 0x5, 0x1ff, "54894242e19f073125d5775a6db4b3495f42582dbf04f3ca232cfa78127bfd1b04f9e5f0e99b9de8866baa5b6bf16042a7e963ded48f1ca458f8790ab73079fcf5c7b2a8e43a947f54a5eb6ec858ce422eaeb4d93133704c5ecfad45281bedbb0486dde1045c8a283de3423e9d3661cda5804c0485efd1e9cace70e6cf76369efcba6cf8917b657f083d9f3461dc7490e4f9ff8bd11864ecb3f0b3e1c71715c45bfcfd1d97537d3cfc3559322008d567599461bbabc2b497383a18a8ec44e7c492b7b645a1680647be088a1d961c3a72ea8eb2c47505b0d610"}) r2 = creat(0xffffffffffffffff, 0x128) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000540)={'team0\x00', r6}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0xe8) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) fchown(r3, r7, r5) [ 726.084306] FAULT_INJECTION: forcing a failure. [ 726.084306] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 726.096154] CPU: 1 PID: 16135 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 726.103435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.112811] Call Trace: [ 726.115438] dump_stack+0x1c4/0x2b4 [ 726.119092] ? dump_stack_print_info.cold.2+0x52/0x52 [ 726.124308] should_fail.cold.4+0xa/0x17 [ 726.128380] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 726.133513] ? is_bpf_text_address+0xac/0x170 [ 726.138018] ? lock_downgrade+0x900/0x900 [ 726.142186] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 726.148000] ? mark_held_locks+0x130/0x130 [ 726.148016] ? mark_held_locks+0x130/0x130 [ 726.148039] ? is_bpf_text_address+0xd3/0x170 [ 726.156499] ? kernel_text_address+0x79/0xf0 [ 726.156515] ? __kernel_text_address+0xd/0x40 [ 726.156537] ? unwind_get_return_address+0x61/0xa0 [ 726.165425] ? __save_stack_trace+0x8d/0xf0 [ 726.174833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.184672] ? should_fail+0x22d/0xd01 [ 726.188564] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 726.188586] __alloc_pages_nodemask+0x34b/0xde0 [ 726.188608] ? __kmalloc_track_caller+0x14a/0x750 [ 726.203205] ? memdup_user+0x2c/0xa0 [ 726.206922] ? strndup_user+0x77/0xd0 [ 726.210730] ? ksys_mount+0x73/0x140 [ 726.214456] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 726.219480] ? lock_acquire+0x1ed/0x520 [ 726.223464] ? handle_mm_fault+0x42a/0xc70 [ 726.227713] ? fs_reclaim_acquire+0x20/0x20 [ 726.232048] ? lock_downgrade+0x900/0x900 [ 726.236221] ? ___might_sleep+0x1ed/0x300 [ 726.240384] ? trace_hardirqs_off+0xb8/0x310 [ 726.244803] cache_grow_begin+0x91/0x8c0 [ 726.248869] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.254411] ? check_preemption_disabled+0x48/0x200 [ 726.259441] kmem_cache_alloc_trace+0x67e/0x750 [ 726.264117] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.269662] copy_mount_options+0x5f/0x380 [ 726.273900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.279445] ksys_mount+0xd0/0x140 [ 726.282994] __x64_sys_mount+0xbe/0x150 [ 726.286975] do_syscall_64+0x1b9/0x820 [ 726.290866] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 726.296238] ? syscall_return_slowpath+0x5e0/0x5e0 [ 726.301358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.306223] ? trace_hardirqs_on_caller+0x310/0x310 [ 726.311249] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 726.316275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.321820] ? prepare_exit_to_usermode+0x291/0x3b0 [ 726.327030] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.331881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.337070] RIP: 0033:0x459fea [ 726.340275] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 726.359177] RSP: 002b:00007fa377faaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 726.367073] RAX: ffffffffffffffda RBX: 00007fa377faab30 RCX: 0000000000459fea [ 726.374343] RDX: 00007fa377faaad0 RSI: 0000000020000080 RDI: 00007fa377faaaf0 05:22:59 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) accept$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'bpq0\x00', r3}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x7, 0x4, 0x3, 0x40, 0x401, 0x3}) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0x8, &(0x7f0000000080)={0x9}, 0x8) mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 05:22:59 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000040)={0x7, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}]}) write$smack_current(r1, &(0x7f0000000280)='\'\x00', 0x86) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) 05:22:59 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 726.381612] RBP: 0000000020000080 R08: 00007fa377faab30 R09: 00007fa377faaad0 [ 726.388880] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 726.396147] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 726.410782] EXT4-fs: 10 callbacks suppressed [ 726.410792] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:22:59 executing program 0 (fault-call:2 fault-nth:30): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:22:59 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xfffffffffffffa76, 0xb9, 0xfffffffffffffff8, 0x0, 0x5}, &(0x7f0000000040)=0x14) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'rose0\x00', {0x2, 0x4e24, @rand_addr=0x7}}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x20, 0x0, 0x101, 0x0, 0x20}, 0x98) shutdown(r0, 0x1) 05:22:59 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x5, 0x7, 0x7}}, 0x30) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000001580)) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000013c0)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x80, 0x2, &(0x7f0000000180)=[{&(0x7f00000003c0)="6e5ea903f649961c2f927dd0a4609b70171cc2b6d51b521720c2c8d9432b7676941c7af8549c5db86c3ca07535df04da8530562ed87b76da0bee032791e5fee9a6f84dd1dbf56af169b8ed34b8dd2f3b39a4d09d7e3e8e6c50f287406fe7979262b63da7014e184630a8aae532bbad00cba229900d5e8897ba7ab041c5a83bbf9159a7bc23554d4a98964fc4d88ca416f55b002bf8d0abee4b5099b5fe07b6659375f684059564eabec6672898fd7480d1d81abc0a5d1c46bd370a1f5496229c91a60c7423f0f1ea380a27281329735c54e02210fee7e20c0ae9c5942cd8420f3eeb86d2e7b52611d22f5a2f38cb9b19a343394543e28cf235c51bf255198478d34e1a1f289052a1887b49de4643cb6a7875e8eb47d37502a99cc5cab5e4aea4810435f89332b5802e9ba9ad5f2be5fa5c3133cce71ad33cefd1d3bfa1dc5678f64e202c69438b17328ce69cd4e7b5f556d937040e091183b1ed8824f01dad6e58eddb8d21ad92c86bb374396b1598360cf84b98066cd09a145aad4df4f0710b474866c09aab06d830715b6bfdefb7c3f52a9b5984d6c8b9159db9e2ff8548358de49cf80fdc8d6daf27a74b44f2bc0568462692fd311803396a45ca0145ad238b027cf4729647af9187e4a07521b4e3f767be9a43f56218dd05d0f551b4a54b6aef17a7dd6a8513cbbb9cfaf058dc7f50bf8ad95396d3ab58c7d0171ea59fdc7329e4cd2c49ddf573216598474c92f9ad67504c74ee45acf3a52a2892d6644dec15f5655cdb09f82966f7470553422193c51dab54b7514ecc2a9fb177e88620e35f5d66ef03795772abe5880b5ad340be5ada995849e09fafb67ead0b1a482354ffdc2d4ea52641152fbe2c848b8dc58b1ba4b1a873c4b38b348cb865e28b2d5286f09f3563243cd7b4d0e22cf9cbf63c9d763e3b108512c73498ed51fbd95dbb43fc774feec8327102d271c02ec181da5d811a369d48dd5f37681733db851ebba6ee28e0167848ace34f7885af4678c5b4928953fb2d012a42c9a949b1e0453d9f23e1ef9040faaf2ccaa981f6ca9aa76a1a0f778958d06465709a01a7bd70f44643906fb8819271c0f06915922671b58ee5ef2b49909a2d7d40ba2e6ae923a0b9dc733d66d87db61acd3e520633b82d0f26f34c3ee713e1effa24204763810d1a9705607bc8237d2659d87d13022a641da4a0497bf6af1d8e9d3ba190d3a78ed97a022aabea691af894c5f0d784c0993ceb2400c4a7d0dddbfa731033300fcac01338e35ef4f24f34e1ece34bdce75f8653d7b909a0130eab7472be8271c1455ccadf82c727b79fadd06dd506f03036f2470b816071791ff926c28f6e9d196fb5eaa2c8c966b491d371d42ccb119116073ff494b1b18ca359304468f6bb8dc12c742d3559d45e7386aec6990074d66fd9f9a8b8b8495598690fc92fc92b577e44632aec04f608f70bb1b48dbdac26b61bd941c187bbbafcb78af2aec3b6b1733182588673f92221111eb6dbe24ee08b5e541f699f7eb582870f1ff2f7529da844b6035dd152b3ce7deaeb7cfcc7b34097f3ea9c342621eb4d3d777e1cf0755349ebd1ea26716ad08226e487348a810ede26eff16f57dd0e4521279b542471d68ea147ff09bcd136d523ffc75254c4d4e86c67ef35acc01deee558d46a6cc047bcec42db336013bef43380cd92c2301c20f523296366d76e1e5adc871d2a442f131f95b0a8a187a9dd26ab4e1d332835136793168c7cf1e81e8bd6b7b8f9641807a67558b8ee8840743b5d3d34edf72b376aaf3dba6c9b920b74ffc1725e2f1a6b50489780eabb576adbcff8f04b06b5ff5f99c834e2553f6023e49012db68cda543ba5739d0679e4c2f10a1f53b7c6506bbd554b4742465eaba6767bc278b80ae4043b0a99a2ee24d319115bc91fa08c3542e8cb6a1b6183e18eb923a6dbbfa842762a21dc698e1dcb7530aa48da5033939171a7bc09ee7103d544f70582a3bea526355caec0df7dc83732ecf0c5280fc82ed86e61d9ec131f943472ad461de6cedcde3b85929e676c6626bd794d1deeb5d35bed2e27da15b2fd510a039510a972320ce13cc81d003e34bb30cdec4811b37205958797f62a35136de7e2dfde9494c4bf10a7fcb26c90a6f2293a058ea6bdf607ef9ccfd34b5e6fadfaff63253f517ed7665720b4962794906b2a294226176d2a908fa0ab47d2c6a3d950ababca0a127622ee87429b03550b0a2a4f26f0d99d86c08c674c1cf9098065c82fda8da33f02f2812e7aa13b15468dc9397647957f8fcfafe3397f117605b4114103e6bed403282bf99c2caf3a5a83e6024d7d3c5e8ea5ed7c34f6cce6616c15500d78691bf8a149de2af05c718369d51e3888f0abb03d4806f9507fc766a816cb5973600e0bfd899eb1cab1c75400fde14f8d157890109d9457724ee447f5b4ce81ac9bc475c2f3cb200c740b70a9a21482f3186148f25f0dbc6f12b7f9fd87db4532263362a162aaf5486a31989334302e555b13b809dca9cba0c22dfd98e54e715d7aebb93df0c8af16835b38ca2df125249184050dd3ce12aa43e016730f7d2a842f7277a4b90a3e7da297b8871be3fce2333b8b4df20d192b587ec08aa06bcf91682f2915a9107e8fc2ccdccf454ae34138970ab9cc4a5f31e1272c7c60bad02b5c2ee79e6b5569d73c00f50a647ca0f9d05b67515d8fefae5af83b884a72ec91b8e1c22bbc6760f7f7c705b523ebb07935ce674fe3802cd6a6d2fd55e29d292c9d3bb659e0362bcc6991132fc7b7578ec648d97618eb22a3497afafaecbd8981f34faa7c8a1bb212e77f8e80c01502153e0d7c31ccd24c33d1c8f2862c45c338295dbde7c33e8b84a65594eac2afdb1d510e91d47b4ece14ec9ea445d94216ed32394f3dac7b112806f8eb66e5f32d3720d6c8d755cade6213e4554c6f3eaa97569e6531d5e0de40df0f20e45f578eddf625180f4cbf346391108fab56ea7881a6e25c233ab479a9c25a97fa902f128d97600eb5d57c5bccff70b7cc226a7a34b0100d61ea70e076d681825695b2e0f79886cf773f16ad4cadefea55a61036ab1c568e55e8902af2f3560255c76173b63f3fa25e82f8745a01783cddd4fe6953a848b0f87e6e3167fbed50b69f58e4ce9c1cfb564d19a53d426f452470cb9e0652c970f56fa517c1eda3fee10d2a2ac5d081e587f8cf127f0948eb93e0dd9d7b3136aec60ff7d2a8a56532d7a464dec3d3d98b05eebc8f0b4c0cfdabb61c234b1b6cfc2b633d098fec40afa22718df3c55d259dcc1f3ed500c4eeea03577afc90ba699cca285d7526d848e0750e231b308af80c44f825fe108c90ca8bfa489a51158d67aaa42079e9529b3b3db754fd3955efc28dd06553bc7bff37d49118c9d69409dff7e8492df18283ae5cd579f1bc8c52dd12ffd1b3466ed0491c3c037006a103b88716d945fd45666f63992f269d6a7947052f1bb7371b3e0a2c18702dbd558455b6ef1883716ee477218b83fa1fab3027d32cd90228f2869c1716f8440ed73ab66bba6e0e14e3779a9a111c57e61ca2ace855f4362ba192c4953e9bbd3a7a2bda1ff59c70a360efe0f7fa146d339987692563cde798b92cb1574cd816bff8a336b3c1a88f89c5f3cc5530daae983e4d3051695e042fad74b8c5fa0aac27c004ed3e88406d4df9adfbeb5478cedc687d8669efeb9b91b601aba5d241a5b00c69743f2db06f6369da3cf489ab1eab3b32d41c96856e43d496f8cf5e262820cd49c98a3fe3e5c34b326d9706648ad643227f3ca5cf6a6b37d64aa2477fef5ba3e06f3b20e4dfa3387c163e952ae3d35821f7837a5d1256053f1cde0b224a95c32cadf34ccab8dde09be80d1d4149a3be41e1ad7bace77b7deaa79dc92fcffb1f814ecfe234466b4117f0f8452672cc7bceaea7d68e39ec1389d1fc9d7bce1d4e010136ea05236c8bc7ee3bac7affb0349f1409a63a3c88262dcd2fde904ff1bfa80e4f08794ca66dc595a7e598c2d88eae07084e157cb67e173ad90f113fda304ea32ba2e57cde6f9b858a67a767b54619837a30af3102dbb3ec08c52b2ce14754de86e71976f2e4e37bf1f2be7fe349bcc860081e64303344959eb6bd5dd47afde907ec2e84334dceb96a5c51ec86456b16e8c815e3aab13535c41102f4453fdfeca89a1af542b4184c58c562af7a54af2567601ef46b33030810872f7bf960c0cc9ba4f34664f1407dd433085ca08485ba7e58a08734dc186f7925e618dead9e39caf6a99e69fe2b477c17baec5c4dfd944ea1957ab53b8a342cfbb62d13cf3355c4801b8b7f5382ec6b2cc419389796063052a23c3faa95f307acd93855358a5504212aabaa6c9d4f59b3d9affa21e77c3b290aa23e2c0adcac9f2aa79913441ac1775c2a602d19b24cf566f75c7ddd37f91fd8111d703331c42624e1e2e020387916a05291f1bcabe71c325fc669b0794253ceb1301e963ac8ca097d78868070890997a729230099c57864569c22ab4f5266f15e32a70693b4740979ac8b33a99e293662dd58ac21893ddfdf5cc3c649dc9436abac445fbd1e9a6b13bce3c9ee5217d0825e4670f891bca6dbb62b34dc622112361afbea10dbfa5b2929e94d10fa613e63d26649b075ddafbd5b002ddade996015d54049cd8efc07168f3cbd38b4338039b33151c9c957de898535c6b7d021937291bf6f61f78e765add65458953fb0a7f1dda93a31048f57df6961637d1b008a52895133b188983d5cf7c70b65f6f6f75e3561d0222d212f62268c1ecf04fb0493de9ff154fc8c384455d7e1321fe43459de55f6fdd3e26d51681f42adeb3532878bfbfec89776c231e6e780081bba0751ff5b43d20608ce10c268d88be9e864e25415ed9a9d7b83f87ebc5d6f138e2d0cdcd2d91fa5bdcbebfc50fadda4d5a383e9045b5e6b469c127b0a24c30f50a289090bf51b0dd194e5c78ab29f7707c00b5a2db0fae4f1a7b55b4153cc991a54684e9b4556d2de6e26e94ff36d90f45e915079c0ec278d2f5fd3bedd575f88fa3c9ee8ca193f1ac816a3e612499d328ec6db7396251f9d2d7e94601625bc368f764d23c439400ea17de6220c3e1f4823e5b36490cc8f760d42a94cfe12d7a4e72a454dc9053d375df23cd10be58f5ea24b16e8a49fed8ff26c656be866c0cdb309cc0d66b4114e2fc1bdc64af65c43b82f033d8661bb7767b0aa0d7f84b095ffd95160e189f6327664505ebb3298c5ddfa229d260dd4a0826f551414eff1bc9e67c3ef3abce10ce14bd6422bff6ca49004101fff1b81f3cbf9fe0fd88c47a9fec2afa3b2cd21813302ad82ae4a0ffa73b4726cb871bb95b91d5dde835338f18a624b53ca18713a6b69d010368a3baf0d7ee8a7c69c976a6936da23e9d600f712241c228254ca1582eb8c385c969aba43be729abab3bfe046864332db43c6a558632ddafcb1ef8d489031e2264836efa83f34fe2183ef02913002c721a24205754a5a5e7bfe978b4bcd4576fae7a8e9024b2ed226b8c5ae9041ce005c5f2d92e9e56023853a0dc62855b8d0e8ea8ff7f6cef0c21cef9b86ebf616065b7aa7044585c83d6e9ae11346d1221d7a9a954ae8893a85226a12338f7e2b5bc4a2299024135bf2cf533ef412b8eb63d329eb06406d07b544373929414713c7844bd3a0fe6e5a070dd2fdef45341930adc3b17a318abe9e6c5a43e3c329ea2d8ab9f4175c731fb63ebe8a89b67b86266a7d4b9dd3ee7838ee57840532da263d7f5a0858abea51b1b77c4a63566587c4f18ebbb48b0b287770edab562", 0x1000, 0x595}, {&(0x7f0000000200)="a77a5b88544d61e1105d2524b86b0a290eec5e1b38732a3e195bebf628b47e6ca8a4504524d298a800634b2969096d5b41b4a937bc6db2f8c12de5a6093159123f8fb55c38db53437d059f981ac69b5590648a4d73b44ccb5def695210f7e33e2b4fb6cee4d04d22812347ac2cafa08fa68f9ee00fe55f02e1020524f7c753dc7039a5f917025bc4f374143f0dbeb3afc0092acd331607814d3caa3f79e000c7a7e79658568eaff0d6ebdd09f8bcff1abd068b94a659fff3188c56e59a15382fba028628cba4823789560138", 0xcc, 0xa7}], 0x2000, &(0x7f00000014c0)={[{@inode_cache='inode_cache'}], [{@subj_user={'subj_user', 0x3d, '\''}}, {@subj_user={'subj_user'}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@fowner_gt={'fowner>', r2}}, {@permit_directio='permit_directio'}]}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x34) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000001540)={0x10, 0x30, 0xfa00, {&(0x7f0000000340), 0x4, {0xa, 0x4e20, 0xfffffffffffffffb, @remote, 0x9}, r3}}, 0x38) finit_module(r1, &(0x7f0000000380)='-\x00', 0x1) 05:22:59 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xfffffdef) [ 726.491942] EXT4-fs warning (device sda1): ext4_resize_begin:46: There are errors in the filesystem, so online resizing is not allowed [ 726.514816] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:22:59 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x10) write$smack_current(r0, &(0x7f0000000000)="0000cd779a5cc4f802354d2a36ff55662de7a83c2caf4968b67c5968f78fe3fe8ed7eb8f383e20c6014b10d7817693c85343f5e8a22675b6a82ec605491affa800ed4390e19397bd48cb4562006524ae20030bca167a94d4669f4cba3f9cd3e3624a139890", 0x65) [ 726.563676] FAULT_INJECTION: forcing a failure. [ 726.563676] name failslab, interval 1, probability 0, space 0, times 0 05:22:59 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = semget$private(0x0, 0x0, 0x55a) semctl$GETZCNT(r2, 0x3, 0xf, &(0x7f00000003c0)=""/4096) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000000)="b55a323a041dfc5e27faf8df639af897ee85d9b256cce1139647418cae392fdd38644e1604f2b09b8098be0bf214bc0ec3e094b5b35ba1aac889b70d12") write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000040), 0x2) fchown(r0, 0x0, r3) accept$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000013c0)=0x14) sendmsg$can_raw(r0, &(0x7f0000001500)={&(0x7f0000001400)={0x1d, r4}, 0x10, &(0x7f00000014c0)={&(0x7f0000001440)=@canfd={{0x0, 0x20, 0x0, 0x8001}, 0x37, 0x2, 0x0, 0x0, "99cd92c9d4254507dd40b4baed24f3f18e65c271519bfb031fd71a2a597c06f1db513b7fde16854af184ea0695d7d3ea862128fb2537177f0107c9ce25b39132"}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x24004000) [ 726.637575] CPU: 0 PID: 16164 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 726.644896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.644903] Call Trace: [ 726.644935] dump_stack+0x1c4/0x2b4 [ 726.644964] ? dump_stack_print_info.cold.2+0x52/0x52 [ 726.665676] ? do_raw_spin_lock+0xc1/0x200 [ 726.669923] should_fail.cold.4+0xa/0x17 [ 726.673998] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 726.679111] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 726.679129] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.679146] ? check_preemption_disabled+0x48/0x200 [ 726.679167] ? rcu_is_watching+0x30/0x30 [ 726.679192] ? rcu_is_watching+0x30/0x30 [ 726.703293] ? __dentry_kill+0x51f/0x7a0 [ 726.707373] ? fs_reclaim_acquire+0x20/0x20 [ 726.711706] ? lock_downgrade+0x900/0x900 [ 726.715872] ? ___might_sleep+0x1ed/0x300 [ 726.720029] ? arch_local_save_flags+0x40/0x40 [ 726.724621] ? lock_downgrade+0x900/0x900 [ 726.728783] __should_failslab+0x124/0x180 [ 726.733029] should_failslab+0x9/0x14 05:23:00 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x3f}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r2, @in6={{0xa, 0x4e22, 0xfff, @dev={0xfe, 0x80, [], 0x1c}, 0x5}}, 0x1ff, 0x7, 0x4, 0x100000001}, &(0x7f0000000180)=0x98) [ 726.736840] __kmalloc_track_caller+0x2d0/0x750 [ 726.741517] ? kasan_check_write+0x14/0x20 [ 726.745765] ? do_raw_spin_lock+0xc1/0x200 [ 726.750014] ? ext4_remount+0x117/0x2640 [ 726.754089] kstrdup+0x39/0x70 [ 726.757291] ext4_remount+0x117/0x2640 [ 726.761441] ? is_subdir+0x4a0/0x4a0 [ 726.765175] ? list_lru_walk_node+0x20d/0x280 [ 726.769687] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.775243] ? ext4_register_li_request+0x9b0/0x9b0 [ 726.775265] ? shrink_dentry_list+0x800/0x800 [ 726.775284] ? do_mount+0xbcc/0x31f0 [ 726.788494] ? lock_release+0x970/0x970 [ 726.792477] ? arch_local_save_flags+0x40/0x40 [ 726.797073] do_remount_sb+0x350/0x7b0 [ 726.800974] ? ext4_register_li_request+0x9b0/0x9b0 [ 726.806001] ? user_get_super+0x250/0x250 [ 726.810162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.815713] ? security_capable+0x99/0xc0 [ 726.819879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.825429] ? ns_capable_common+0x13f/0x170 [ 726.829854] do_mount+0x1513/0x31f0 [ 726.833492] ? kasan_check_read+0x11/0x20 [ 726.837654] ? copy_mount_string+0x40/0x40 [ 726.841896] ? kasan_check_write+0x14/0x20 [ 726.846144] ? kasan_unpoison_shadow+0x35/0x50 [ 726.850732] ? kasan_kmalloc+0xc7/0xe0 [ 726.854647] ? kmem_cache_alloc_trace+0x31f/0x750 [ 726.859501] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 726.865052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.870604] ? copy_mount_options+0x288/0x380 [ 726.875109] ksys_mount+0x12d/0x140 [ 726.878744] __x64_sys_mount+0xbe/0x150 [ 726.882733] do_syscall_64+0x1b9/0x820 [ 726.886635] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 726.892032] ? syscall_return_slowpath+0x5e0/0x5e0 [ 726.896978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.901828] ? trace_hardirqs_on_caller+0x310/0x310 [ 726.906871] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 726.911895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.917444] ? prepare_exit_to_usermode+0x291/0x3b0 [ 726.922474] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 726.927336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 726.932530] RIP: 0033:0x459fea [ 726.935729] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 726.954638] RSP: 002b:00007fa377faaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 726.962353] RAX: ffffffffffffffda RBX: 00007fa377faab30 RCX: 0000000000459fea [ 726.969633] RDX: 00007fa377faaad0 RSI: 0000000020000080 RDI: 00007fa377faaaf0 [ 726.976906] RBP: 0000000020000080 R08: 00007fa377faab30 R09: 00007fa377faaad0 05:23:00 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02cc1f2334173f74fdd886123ce19c029fece108442f2ffd79a5c25a3c5553cd4251936008d829abc4ab04b7c737f206541994270256cfda82f2f318d8334c9367b56aff38e0234e9870225d20b6879eea211f8b24f3c08e4d94dd2b65a5320300400e4d8879902c68dd4b51aac69fd9d3e57db169dabb80b402dc27110e5a1452957927cfd75ff36588d2204c7e1c0957c5b1b63db06751e9e2e49c2abc85b669a08e8944923c5a854dbdfa86151f01a205"], 0x2, 0x0) 05:23:00 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000000)=""/126) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/217, 0xd9) fchown(r0, 0x0, r2) [ 726.984178] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 726.991453] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 727.026777] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:00 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000140)="2812e959bc5a703f0ecab269a96b0ca19c7aec667c5d84544ba121bad15bbbdbcbc20e57d84c0f7ee14aae532b098664d58cfcdea1d8ea5324a06ceb018211373f84a2937e6dbbb21c887cefb38cb1f19c4c017019d0918151e808c185e0028d8977ca65a7d3301ab3eeda8f34700c1c96efb6497fe175510285929bbc60efc463c2032413960d96bee092ed74cf9146", 0x90, 0xfffffffffffffffa) keyctl$get_security(0x11, r0, &(0x7f00000002c0)=""/169, 0xa9) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000200)) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) rseq(&(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x5, 0x3ff, 0x8}}, 0x20, 0x1, 0x0) write$smack_current(r2, &(0x7f0000000280)='\'\x00', 0x86) 05:23:00 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:00 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) pwrite64(r0, &(0x7f0000000100)="80b40900a51b72611dbc7c84cf83f92ef5a1a225fb5ca044c51f143871339d3ac3feeee0c0128e87c48229154d22d0e62d73e7ff181a26dabbacbd877bab09138559eeee16e147c7c4467f9daa839f6bc9f6", 0x52, 0x0) 05:23:00 executing program 0 (fault-call:2 fault-nth:31): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:00 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) r3 = getpid() r4 = geteuid() ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000000)={0x8000, 0xffffffff80000001, r3, 0x81, r4, 0x5, 0xfffffffffffffff7, 0x24000000000}) fchown(r0, 0x0, r2) 05:23:00 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0xfffffffffffffd1f) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f00000002c0)) bind$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x8e2b, 0x0, 0x6, 0x5, 0x7, 0xffffffffffff7fff}, 0x7}, 0xa) [ 727.250781] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 727.290166] FAULT_INJECTION: forcing a failure. [ 727.290166] name failslab, interval 1, probability 0, space 0, times 0 [ 727.326339] CPU: 0 PID: 16212 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 727.333638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.343012] Call Trace: [ 727.345635] dump_stack+0x1c4/0x2b4 [ 727.349285] ? dump_stack_print_info.cold.2+0x52/0x52 [ 727.354498] ? do_raw_spin_lock+0xc1/0x200 [ 727.358760] should_fail.cold.4+0xa/0x17 [ 727.362835] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 727.367949] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 727.373499] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.379050] ? check_preemption_disabled+0x48/0x200 [ 727.384088] ? rcu_is_watching+0x30/0x30 [ 727.388159] ? __dentry_kill+0x51f/0x7a0 [ 727.392243] ? fs_reclaim_acquire+0x20/0x20 [ 727.396573] ? lock_downgrade+0x900/0x900 [ 727.400733] ? ___might_sleep+0x1ed/0x300 [ 727.404894] ? arch_local_save_flags+0x40/0x40 [ 727.409486] ? lock_downgrade+0x900/0x900 [ 727.413646] __should_failslab+0x124/0x180 [ 727.417889] should_failslab+0x9/0x14 [ 727.421699] __kmalloc_track_caller+0x2d0/0x750 [ 727.426372] ? kasan_check_write+0x14/0x20 [ 727.430616] ? do_raw_spin_lock+0xc1/0x200 [ 727.434858] ? ext4_remount+0x117/0x2640 [ 727.438927] kstrdup+0x39/0x70 [ 727.442126] ext4_remount+0x117/0x2640 [ 727.446026] ? is_subdir+0x4a0/0x4a0 [ 727.449751] ? list_lru_walk_node+0x20d/0x280 [ 727.454262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.459806] ? ext4_register_li_request+0x9b0/0x9b0 [ 727.464833] ? shrink_dentry_list+0x800/0x800 [ 727.469332] ? do_mount+0xbcc/0x31f0 [ 727.473054] ? lock_release+0x970/0x970 [ 727.473075] ? arch_local_save_flags+0x40/0x40 [ 727.481622] do_remount_sb+0x350/0x7b0 [ 727.481642] ? ext4_register_li_request+0x9b0/0x9b0 [ 727.490527] ? user_get_super+0x250/0x250 [ 727.494687] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.500239] ? security_capable+0x99/0xc0 [ 727.504394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.509938] ? ns_capable_common+0x13f/0x170 [ 727.514355] do_mount+0x1513/0x31f0 [ 727.517985] ? kasan_check_read+0x11/0x20 [ 727.522141] ? copy_mount_string+0x40/0x40 [ 727.526380] ? kasan_check_write+0x14/0x20 [ 727.530625] ? kasan_unpoison_shadow+0x35/0x50 [ 727.535213] ? kasan_kmalloc+0xc7/0xe0 [ 727.539124] ? kmem_cache_alloc_trace+0x31f/0x750 [ 727.543975] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 727.549521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.555065] ? copy_mount_options+0x288/0x380 [ 727.559569] ksys_mount+0x12d/0x140 [ 727.563202] __x64_sys_mount+0xbe/0x150 [ 727.567197] do_syscall_64+0x1b9/0x820 [ 727.571097] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 727.576480] ? syscall_return_slowpath+0x5e0/0x5e0 [ 727.581413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.586269] ? trace_hardirqs_on_caller+0x310/0x310 [ 727.591290] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 727.596314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.601856] ? prepare_exit_to_usermode+0x291/0x3b0 [ 727.606885] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 727.611738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 727.616932] RIP: 0033:0x459fea [ 727.620133] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 727.639033] RSP: 002b:00007fa377faaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 727.646758] RAX: ffffffffffffffda RBX: 00007fa377faab30 RCX: 0000000000459fea [ 727.654511] RDX: 00007fa377faaad0 RSI: 0000000020000080 RDI: 00007fa377faaaf0 [ 727.661787] RBP: 0000000020000080 R08: 00007fa377faab30 R09: 00007fa377faaad0 [ 727.669059] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 05:23:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r1}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)="04"}, 0x20) close(r2) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:23:01 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x27) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:23:01 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$UHID_INPUT(r0, &(0x7f00000003c0)={0x8, "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", 0x1000}, 0x1006) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:01 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_bt(r0, 0x8907, &(0x7f0000000140)="4f379940e13f91741e029416582954b915760d9804a9860a0cbafbef9c8afdd80ccda1d697775aae63b951e1a3a89cb71eab917506ea8eb57e7facb4ab4c3e0ee6a9f046a8e9797086fb560344f60f01e268944483bfc324bee6b948e8f5b2e52fba2e66d0094b150bc2df9ac4c6995e75e818d894d9453e72b4029bf086cfad133b7ea9d5035da75f9bfb05e11a9b91043fa75685585395651c320dd22cd03e4f3289959dc4a3b98aa6eb01501af74e452343dbd236c47bb31031760e81328b4e6523a27edec840899d011a175da657cb1fc36afad950d0e3a8") ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000340)={r1, r1, 0x6}) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x0, 0x7530}}, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x4, 0x6) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f00000000c0)={0x8001, 0x800, 0x80, 0x0, 0x100000000, 0x1ff, 0xf8, 0x4, 0x101, 0x2, 0x79b, 0x5, 0x0, 0x2, 0x314f784c, 0x4, 0x0, 0xc70, 0x8000}) write$smack_current(r1, &(0x7f0000000280)='\'\x00', 0x86) [ 727.676329] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 05:23:01 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000040)="8000", 0x2) 05:23:01 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e21, @multicast1}], 0x10) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x208000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={0x0, 0xffffffffffffffe0, 0x4, 0x48, &(0x7f0000ffd000/0x3000)=nil, 0x99}) getresgid(&(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)) getgroups(0x3, &(0x7f0000000180)=[0xffffffffffffffff, 0x0, 0xee01]) getgroups(0x2, &(0x7f0000000200)=[r2, r2]) fchown(r0, 0x0, 0x0) 05:23:01 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xd}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r1}, 0xc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000080), &(0x7f00000000c0)="04"}, 0x20) close(r2) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, &(0x7f0000000500), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xa}, 0x0) 05:23:01 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:01 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000000)) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x2) [ 727.877774] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:01 executing program 0 (fault-call:2 fault-nth:32): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:01 executing program 2: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x22) socketpair$unix(0x1, 0xfffffff7fffffffe, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000140)={@my=0x0}) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000080)=0x2, &(0x7f0000000100)=0x1) 05:23:01 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x2}, 0x10) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x20, 0x0, 0x2000}, 0x4) 05:23:01 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0xfffffffffffffffe) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000000)={[0x100000000, 0x80000000, 0x3, 0xcc8, 0x4, 0x0, 0x5, 0x8, 0x82, 0xfffffffffffffffa, 0x0, 0x1ff, 0x5, 0x3f, 0x1, 0x100000001], 0x100001, 0x88000}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f00000000c0)={0x7fffffff, 0x7ff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x2}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r1, @ANYBLOB="e90004b35035984677750006"], &(0x7f0000000200)=0x10) 05:23:01 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001400)='/dev/zero\x00', 0x60000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000015c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001740)=0x0, &(0x7f0000001780), &(0x7f00000017c0)) r4 = getgid() setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000002a00)=@nat={'nat\x00', 0x19, 0x6, 0x11f0, [0x20001800, 0x0, 0x0, 0x20001830, 0x20001a90], 0x0, &(0x7f0000001440), &(0x7f0000001800)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x1d, 0x8877, 'yam0\x00', 'ip6gretap0\x00', 'bond0\x00', 'bond_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}, {{{0x11, 0x21, 0xf7, 'bcsh0\x00', 'ip6gretap0\x00', 'bridge_slave_1\x00', 'veth1\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xd0, 0x150, 0x188, [@m802_3={'802_3\x00', 0x8, {{0xfc, 0x10, 0x0, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0xe, 0x8000, 0x6, 0x2}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x10000, 0xfffffffffffffc00, 0x1}}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x5, 0x48, 0x8ebf, 'gre0\x00', 'team_slave_0\x00', 'veth1_to_bond\x00', 'teql0\x00', @local, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @remote, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x120, 0x120, 0x158, [@rateest={'rateest\x00', 0x48, {{'bond0\x00', 'teql0\x00', 0x29, 0x0, 0x9, 0x200, 0x8, 0x9, 0x6, 0x20}}}, @owner={'owner\x00', 0x18, {{r1, r2, r3, r4, 0x0, 0x1}}}]}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}, {{{0x3, 0x42, 0x8835, 'gre0\x00', 'ip6_vti0\x00', 'syzkaller1\x00', 'veth0\x00', @empty, [0xff, 0xff, 0x0, 0x0, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x140, 0x178, 0x1c0, [@arp={'arp\x00', 0x38, {{0x1, 0x884c, 0xb, @multicast2, 0xff, @multicast1, 0xff, @empty, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x10, 0x4c}}}, @rateest={'rateest\x00', 0x48, {{'bond_slave_0\x00', 'bcsh0\x00', 0x1, 0x3, 0x10001, 0x101, 0x1ff, 0x5, 0x8000, 0xb1}}}]}, [@snat={'snat\x00', 0x10, {{@link_local, 0x10}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x0, 0x774f, 0x80000000}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x2, [{{{0x9, 0x8, 0x998e, 'veth0_to_team\x00', 'bond_slave_1\x00', 'sit0\x00', 'bpq0\x00', @local, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="9afac65fe32e", [0x0, 0xff, 0x0, 0xff, 0xff], 0x138, 0x170, 0x1a8, [@physdev={'physdev\x00', 0x70, {{'bpq0\x00', {}, 'syzkaller0\x00', {0xff}, 0x1, 0x4}}}, @state={'state\x00', 0x8, {{0x6}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@random="72e8335d3cc9"}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xfffffffffffffffe}}}}, {{{0x11, 0x2, 0x600b, 'syzkaller0\x00', 'syzkaller1\x00', 'veth0\x00', 'bridge_slave_0\x00', @local, [0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0x9b0, 0xa10, 0xa40, [@among={'among\x00', 0x8a0, {{0x0, 0xff, 0x3c4c3940c12b701a, {[0x100, 0x8, 0xfffffffffffffff8, 0x4, 0x8, 0x5, 0x0, 0xdf4, 0x10001, 0x7, 0x9, 0x1, 0x9e13, 0x7, 0x8, 0x3, 0x81, 0xd4d, 0x4, 0x7, 0x3, 0x9, 0x9, 0xfffffffffffffff8, 0x0, 0xfffffffffffffff9, 0x0, 0xb33e, 0x16, 0x4, 0x9964, 0x5, 0x9123, 0x6, 0x7, 0x9, 0x1ff, 0xfffffffffffffffd, 0x2, 0xca2, 0xfff, 0x9feb, 0x8, 0x8, 0x1, 0xe000000, 0x1, 0x10c, 0xe1, 0x8, 0x6, 0x5, 0x7b51, 0x8, 0x4, 0xfffffffffffffff7, 0x6, 0x8, 0x1, 0x80000000, 0x80000000, 0x2, 0x7, 0x2, 0x3, 0x5, 0x101, 0x4, 0x8, 0xffffffffffffff5d, 0x53, 0x47734c57, 0x5, 0xff, 0x100000000, 0x5, 0x100, 0x1, 0x3, 0x6, 0x3, 0x0, 0x0, 0x3f, 0x2, 0x8, 0x8, 0x2, 0x7f, 0xa9, 0x2, 0x8, 0x3f, 0xff, 0xb80e, 0x7f8f, 0x7f, 0xaf, 0x7, 0x800, 0x3f, 0x0, 0x6af, 0x2ac, 0x1, 0x3f, 0x1, 0x81, 0xfd19, 0x8, 0x9, 0xae2, 0x1000, 0xfffffffffffffffe, 0x4, 0x3f, 0x400, 0x6, 0x3, 0x7, 0x2, 0x7, 0x0, 0x4, 0x898b, 0x8, 0x80, 0xfffffffffffffffc, 0x5, 0x1b, 0xffffffffffffffff, 0x4, 0x4, 0x18, 0x1, 0x4, 0x3f, 0x1, 0x2, 0x10000, 0x9, 0x559, 0x7, 0xfffffffffffffff8, 0x0, 0x7, 0x2, 0x0, 0x6, 0x2, 0x5, 0x4, 0x5, 0x5, 0xa3, 0x0, 0x7, 0x401, 0x8, 0x65e1, 0x6, 0x0, 0x83ae, 0x8, 0x6, 0xffffffff, 0x5, 0x6, 0x3, 0xf735, 0x7f, 0x101, 0x5, 0x8, 0x401, 0x8, 0x7fffffff, 0x100000000, 0x2, 0x3bb, 0xa366, 0x7f8, 0xd73, 0x5a96, 0x4, 0x6, 0x3f, 0x4, 0x10001, 0x4, 0x30, 0x1c, 0x5, 0x8, 0x2, 0x9, 0x9, 0x3f, 0x8e3, 0xfffffffffffffe00, 0x5, 0x7, 0x101, 0x4, 0xfffffffffffff8b5, 0x2a0, 0x80000001, 0x5d2, 0x4, 0xb4, 0x7f, 0xde0, 0x10001, 0x2, 0x1f, 0x47, 0x2, 0x1, 0x2, 0x8, 0x8, 0x20, 0x1, 0x1e, 0x200000000000000, 0x401, 0x200, 0x10001, 0xce, 0x400, 0x2, 0x400, 0xffffffffffff8000, 0x400, 0x100000001, 0x3, 0x3, 0x80000001, 0x962, 0x3, 0x7ff, 0x3, 0x5, 0x8, 0x20, 0x268e, 0x0, 0x8000, 0xffffffffffffffff, 0x4, 0x14c, 0x1, 0xac, 0x0, 0x8, 0xfffffffffffffffe, 0x11bc], 0x6, [{[0x5, 0xfff], @multicast2}, {[0x6, 0x800], @remote}, {[0xffffffffffffff59, 0x3ff]}, {[0xffffffffa37476aa, 0x1ff], @loopback}, {[0x3, 0x400], @multicast2}, {[0x4, 0x8], @loopback}]}, {[0x0, 0x7ff, 0x10001, 0xeba4, 0x5, 0xffff, 0x1, 0x100, 0x6, 0x1000, 0x57be, 0x1, 0x1, 0x2eed, 0x7, 0xffff, 0x6, 0xc851, 0x101, 0x8, 0x1, 0x1, 0x1, 0xfffffffffffffffd, 0x0, 0x9a8b, 0x0, 0x6, 0x100000001, 0x3, 0x3, 0x2239, 0x3, 0x10001, 0x2, 0x7, 0xfb60, 0x9, 0x180000000000000, 0x6, 0x9, 0x5, 0x401, 0x1000, 0x9, 0x9, 0x1000, 0x10000, 0x7f, 0x12, 0x1, 0x3b0, 0x9, 0x7, 0xa4a, 0x5, 0x5, 0x100000, 0x4, 0x2, 0x8001, 0x101, 0x7, 0x9, 0xd6, 0xffffffffffffff83, 0x3, 0x3, 0x8, 0x9, 0x8, 0x0, 0x0, 0x3, 0x8000, 0x2, 0x7, 0x4, 0x35, 0x8, 0x2, 0x83b, 0x7fffffff, 0x7, 0x3ff, 0x7fff, 0x3, 0xa8d, 0xfffffffffffffffd, 0x3, 0x6, 0x45, 0x0, 0x6, 0x7, 0x4a8, 0x6, 0x0, 0x6674960d, 0x1, 0x3, 0x80000000, 0x1ff, 0x0, 0x2, 0x95c3, 0x7, 0x7, 0x6, 0x2, 0x3, 0x7636578b, 0x80000000, 0x7ff, 0x418, 0x1000, 0x80, 0xc7, 0xffffffffffffff37, 0x1, 0x4, 0x80000000, 0x2, 0x8000000100000000, 0x80000001, 0x19, 0x7ff, 0x73, 0x2b0, 0xd6, 0x6ae42eb8, 0x2, 0x5c7, 0x2, 0x7, 0x200, 0x8, 0x5, 0x80000001, 0x2, 0xe5e, 0x7, 0x1, 0x401, 0x0, 0x9c2, 0x7, 0x2, 0x9, 0x7, 0x1, 0x0, 0x3, 0x2, 0x6, 0x6, 0x4, 0x3fe000000000000, 0x7ff, 0x8, 0x8, 0x7, 0xf9f, 0x5, 0xba0, 0x4, 0xa6d, 0x6, 0x3800000000000, 0x2, 0x8001, 0x3f7e, 0x9, 0x20, 0x6, 0x2, 0x6, 0xfff, 0xffffffffffffff01, 0x0, 0x155e9351, 0x4, 0x0, 0x1f, 0x8, 0x120000000000, 0x1, 0xffffffffffffdc69, 0x7, 0x3, 0x5, 0x9, 0x0, 0x5, 0x7, 0x8, 0x7fff, 0x100000001, 0x2, 0x9, 0x8, 0x58c, 0x400, 0x55, 0x7ff, 0x3, 0x0, 0x20000000, 0x6, 0x7, 0x2, 0x3, 0xf738, 0x4e80c883, 0x5, 0x7, 0x0, 0x1f, 0x3f, 0x1, 0x10001, 0x401, 0x6, 0x80000001, 0x9, 0x4, 0x401, 0x2, 0x40b8, 0x8, 0x1, 0x7, 0x0, 0x7, 0x882c, 0x3ff, 0x9, 0x1, 0x3, 0x80, 0x1, 0x0, 0x5d, 0x1ff, 0x10001, 0x2, 0x5, 0xf7b, 0x6, 0x8c, 0x10001, 0x400, 0x2, 0x4a034079, 0x6, 0x0, 0x8001], 0x5, [{[0x4, 0x2], @remote}, {[0x10000, 0x9], @broadcast}, {[0x9, 0x2], @local}, {[0x9, 0x8000], @loopback}, {[0x7, 0x80e7], @broadcast}]}}}}, @ip6={'ip6\x00', 0x50, {{@ipv4={[], [], @broadcast}, @remote, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffffff], 0x8000, 0x89, 0xa, 0x10, 0x4e22, 0x4e21, 0x4e21, 0x4e20}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x38}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x3ff}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x200}}}}]}]}, 0x1268) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000040)=0x0) ptrace$getregs(0xc, r6, 0x9, &(0x7f00000003c0)=""/4096) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) fchown(r5, 0x0, r7) 05:23:01 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x44400, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x6, 0x7fff, 0x8, 0x3}) creat(&(0x7f0000000100)='./file0\x00', 0x0) 05:23:01 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001400)='/dev/zero\x00', 0x60000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in6=@mcast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000015c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001740)=0x0, &(0x7f0000001780), &(0x7f00000017c0)) r4 = getgid() setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000002a00)=@nat={'nat\x00', 0x19, 0x6, 0x11f0, [0x20001800, 0x0, 0x0, 0x20001830, 0x20001a90], 0x0, &(0x7f0000001440), &(0x7f0000001800)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x1d, 0x8877, 'yam0\x00', 'ip6gretap0\x00', 'bond0\x00', 'bond_slave_0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @local, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}, {{{0x11, 0x21, 0xf7, 'bcsh0\x00', 'ip6gretap0\x00', 'bridge_slave_1\x00', 'veth1\x00', @broadcast, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xd0, 0x150, 0x188, [@m802_3={'802_3\x00', 0x8, {{0xfc, 0x10, 0x0, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0xe, 0x8000, 0x6, 0x2}}}]}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x10000, 0xfffffffffffffc00, 0x1}}}, @snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{{{0x5, 0x48, 0x8ebf, 'gre0\x00', 'team_slave_0\x00', 'veth1_to_bond\x00', 'teql0\x00', @local, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @remote, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x120, 0x120, 0x158, [@rateest={'rateest\x00', 0x48, {{'bond0\x00', 'teql0\x00', 0x29, 0x0, 0x9, 0x200, 0x8, 0x9, 0x6, 0x20}}}, @owner={'owner\x00', 0x18, {{r1, r2, r3, r4, 0x0, 0x1}}}]}}, @snat={'snat\x00', 0x10, {{@local, 0xffffffffffffffff}}}}, {{{0x3, 0x42, 0x8835, 'gre0\x00', 'ip6_vti0\x00', 'syzkaller1\x00', 'veth0\x00', @empty, [0xff, 0xff, 0x0, 0x0, 0xff], @local, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x140, 0x178, 0x1c0, [@arp={'arp\x00', 0x38, {{0x1, 0x884c, 0xb, @multicast2, 0xff, @multicast1, 0xff, @empty, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff], @empty, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], 0x10, 0x4c}}}, @rateest={'rateest\x00', 0x48, {{'bond_slave_0\x00', 'bcsh0\x00', 0x1, 0x3, 0x10001, 0x101, 0x1ff, 0x5, 0x8000, 0xb1}}}]}, [@snat={'snat\x00', 0x10, {{@link_local, 0x10}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x0, 0x774f, 0x80000000}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc, 0x2, [{{{0x9, 0x8, 0x998e, 'veth0_to_team\x00', 'bond_slave_1\x00', 'sit0\x00', 'bpq0\x00', @local, [0xff, 0x0, 0x0, 0x0, 0xff, 0xff], @random="9afac65fe32e", [0x0, 0xff, 0x0, 0xff, 0xff], 0x138, 0x170, 0x1a8, [@physdev={'physdev\x00', 0x70, {{'bpq0\x00', {}, 'syzkaller0\x00', {0xff}, 0x1, 0x4}}}, @state={'state\x00', 0x8, {{0x6}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@random="72e8335d3cc9"}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xfffffffffffffffe}}}}, {{{0x11, 0x2, 0x600b, 'syzkaller0\x00', 'syzkaller1\x00', 'veth0\x00', 'bridge_slave_0\x00', @local, [0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0x9b0, 0xa10, 0xa40, [@among={'among\x00', 0x8a0, {{0x0, 0xff, 0x3c4c3940c12b701a, {[0x100, 0x8, 0xfffffffffffffff8, 0x4, 0x8, 0x5, 0x0, 0xdf4, 0x10001, 0x7, 0x9, 0x1, 0x9e13, 0x7, 0x8, 0x3, 0x81, 0xd4d, 0x4, 0x7, 0x3, 0x9, 0x9, 0xfffffffffffffff8, 0x0, 0xfffffffffffffff9, 0x0, 0xb33e, 0x16, 0x4, 0x9964, 0x5, 0x9123, 0x6, 0x7, 0x9, 0x1ff, 0xfffffffffffffffd, 0x2, 0xca2, 0xfff, 0x9feb, 0x8, 0x8, 0x1, 0xe000000, 0x1, 0x10c, 0xe1, 0x8, 0x6, 0x5, 0x7b51, 0x8, 0x4, 0xfffffffffffffff7, 0x6, 0x8, 0x1, 0x80000000, 0x80000000, 0x2, 0x7, 0x2, 0x3, 0x5, 0x101, 0x4, 0x8, 0xffffffffffffff5d, 0x53, 0x47734c57, 0x5, 0xff, 0x100000000, 0x5, 0x100, 0x1, 0x3, 0x6, 0x3, 0x0, 0x0, 0x3f, 0x2, 0x8, 0x8, 0x2, 0x7f, 0xa9, 0x2, 0x8, 0x3f, 0xff, 0xb80e, 0x7f8f, 0x7f, 0xaf, 0x7, 0x800, 0x3f, 0x0, 0x6af, 0x2ac, 0x1, 0x3f, 0x1, 0x81, 0xfd19, 0x8, 0x9, 0xae2, 0x1000, 0xfffffffffffffffe, 0x4, 0x3f, 0x400, 0x6, 0x3, 0x7, 0x2, 0x7, 0x0, 0x4, 0x898b, 0x8, 0x80, 0xfffffffffffffffc, 0x5, 0x1b, 0xffffffffffffffff, 0x4, 0x4, 0x18, 0x1, 0x4, 0x3f, 0x1, 0x2, 0x10000, 0x9, 0x559, 0x7, 0xfffffffffffffff8, 0x0, 0x7, 0x2, 0x0, 0x6, 0x2, 0x5, 0x4, 0x5, 0x5, 0xa3, 0x0, 0x7, 0x401, 0x8, 0x65e1, 0x6, 0x0, 0x83ae, 0x8, 0x6, 0xffffffff, 0x5, 0x6, 0x3, 0xf735, 0x7f, 0x101, 0x5, 0x8, 0x401, 0x8, 0x7fffffff, 0x100000000, 0x2, 0x3bb, 0xa366, 0x7f8, 0xd73, 0x5a96, 0x4, 0x6, 0x3f, 0x4, 0x10001, 0x4, 0x30, 0x1c, 0x5, 0x8, 0x2, 0x9, 0x9, 0x3f, 0x8e3, 0xfffffffffffffe00, 0x5, 0x7, 0x101, 0x4, 0xfffffffffffff8b5, 0x2a0, 0x80000001, 0x5d2, 0x4, 0xb4, 0x7f, 0xde0, 0x10001, 0x2, 0x1f, 0x47, 0x2, 0x1, 0x2, 0x8, 0x8, 0x20, 0x1, 0x1e, 0x200000000000000, 0x401, 0x200, 0x10001, 0xce, 0x400, 0x2, 0x400, 0xffffffffffff8000, 0x400, 0x100000001, 0x3, 0x3, 0x80000001, 0x962, 0x3, 0x7ff, 0x3, 0x5, 0x8, 0x20, 0x268e, 0x0, 0x8000, 0xffffffffffffffff, 0x4, 0x14c, 0x1, 0xac, 0x0, 0x8, 0xfffffffffffffffe, 0x11bc], 0x6, [{[0x5, 0xfff], @multicast2}, {[0x6, 0x800], @remote}, {[0xffffffffffffff59, 0x3ff]}, {[0xffffffffa37476aa, 0x1ff], @loopback}, {[0x3, 0x400], @multicast2}, {[0x4, 0x8], @loopback}]}, {[0x0, 0x7ff, 0x10001, 0xeba4, 0x5, 0xffff, 0x1, 0x100, 0x6, 0x1000, 0x57be, 0x1, 0x1, 0x2eed, 0x7, 0xffff, 0x6, 0xc851, 0x101, 0x8, 0x1, 0x1, 0x1, 0xfffffffffffffffd, 0x0, 0x9a8b, 0x0, 0x6, 0x100000001, 0x3, 0x3, 0x2239, 0x3, 0x10001, 0x2, 0x7, 0xfb60, 0x9, 0x180000000000000, 0x6, 0x9, 0x5, 0x401, 0x1000, 0x9, 0x9, 0x1000, 0x10000, 0x7f, 0x12, 0x1, 0x3b0, 0x9, 0x7, 0xa4a, 0x5, 0x5, 0x100000, 0x4, 0x2, 0x8001, 0x101, 0x7, 0x9, 0xd6, 0xffffffffffffff83, 0x3, 0x3, 0x8, 0x9, 0x8, 0x0, 0x0, 0x3, 0x8000, 0x2, 0x7, 0x4, 0x35, 0x8, 0x2, 0x83b, 0x7fffffff, 0x7, 0x3ff, 0x7fff, 0x3, 0xa8d, 0xfffffffffffffffd, 0x3, 0x6, 0x45, 0x0, 0x6, 0x7, 0x4a8, 0x6, 0x0, 0x6674960d, 0x1, 0x3, 0x80000000, 0x1ff, 0x0, 0x2, 0x95c3, 0x7, 0x7, 0x6, 0x2, 0x3, 0x7636578b, 0x80000000, 0x7ff, 0x418, 0x1000, 0x80, 0xc7, 0xffffffffffffff37, 0x1, 0x4, 0x80000000, 0x2, 0x8000000100000000, 0x80000001, 0x19, 0x7ff, 0x73, 0x2b0, 0xd6, 0x6ae42eb8, 0x2, 0x5c7, 0x2, 0x7, 0x200, 0x8, 0x5, 0x80000001, 0x2, 0xe5e, 0x7, 0x1, 0x401, 0x0, 0x9c2, 0x7, 0x2, 0x9, 0x7, 0x1, 0x0, 0x3, 0x2, 0x6, 0x6, 0x4, 0x3fe000000000000, 0x7ff, 0x8, 0x8, 0x7, 0xf9f, 0x5, 0xba0, 0x4, 0xa6d, 0x6, 0x3800000000000, 0x2, 0x8001, 0x3f7e, 0x9, 0x20, 0x6, 0x2, 0x6, 0xfff, 0xffffffffffffff01, 0x0, 0x155e9351, 0x4, 0x0, 0x1f, 0x8, 0x120000000000, 0x1, 0xffffffffffffdc69, 0x7, 0x3, 0x5, 0x9, 0x0, 0x5, 0x7, 0x8, 0x7fff, 0x100000001, 0x2, 0x9, 0x8, 0x58c, 0x400, 0x55, 0x7ff, 0x3, 0x0, 0x20000000, 0x6, 0x7, 0x2, 0x3, 0xf738, 0x4e80c883, 0x5, 0x7, 0x0, 0x1f, 0x3f, 0x1, 0x10001, 0x401, 0x6, 0x80000001, 0x9, 0x4, 0x401, 0x2, 0x40b8, 0x8, 0x1, 0x7, 0x0, 0x7, 0x882c, 0x3ff, 0x9, 0x1, 0x3, 0x80, 0x1, 0x0, 0x5d, 0x1ff, 0x10001, 0x2, 0x5, 0xf7b, 0x6, 0x8c, 0x10001, 0x400, 0x2, 0x4a034079, 0x6, 0x0, 0x8001], 0x5, [{[0x4, 0x2], @remote}, {[0x10000, 0x9], @broadcast}, {[0x9, 0x2], @local}, {[0x9, 0x8000], @loopback}, {[0x7, 0x80e7], @broadcast}]}}}}, @ip6={'ip6\x00', 0x50, {{@ipv4={[], [], @broadcast}, @remote, [0xffffffff, 0xffffffff, 0xff000000, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffffff], 0x8000, 0x89, 0xa, 0x10, 0x4e22, 0x4e21, 0x4e21, 0x4e20}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x38}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x3ff}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x200}}}}]}]}, 0x1268) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000040)=0x0) ptrace$getregs(0xc, r6, 0x9, &(0x7f00000003c0)=""/4096) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) fchown(r5, 0x0, r7) 05:23:01 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:01 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x5bc, 0x6]) fchown(r0, 0x0, r2) [ 728.061399] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 728.108463] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 728.146637] FAULT_INJECTION: forcing a failure. [ 728.146637] name failslab, interval 1, probability 0, space 0, times 0 [ 728.159800] CPU: 0 PID: 16252 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 728.167087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.167094] Call Trace: [ 728.167126] dump_stack+0x1c4/0x2b4 [ 728.167152] ? dump_stack_print_info.cold.2+0x52/0x52 [ 728.167180] should_fail.cold.4+0xa/0x17 [ 728.167216] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 728.167249] ? __save_stack_trace+0x8d/0xf0 [ 728.197140] ? save_stack+0xa9/0xd0 [ 728.205061] ? save_stack+0x43/0xd0 05:23:01 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080)=0x4000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='bridge_slave_0\x00', 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0xfd54, 0xfa00, {0x2, &(0x7f0000000180), 0x13f}}, 0x20) [ 728.208702] ? kasan_kmalloc+0xc7/0xe0 [ 728.212593] ? kasan_slab_alloc+0x12/0x20 [ 728.216749] ? kmem_cache_alloc_node+0x144/0x730 [ 728.221511] ? __alloc_skb+0x119/0x770 [ 728.225404] ? alloc_uevent_skb+0x84/0x1da [ 728.229655] ? kobject_uevent_env+0xa52/0x101e [ 728.234248] ? kobject_uevent+0x1f/0x24 [ 728.238230] ? loop_clr_fd+0x607/0xd00 [ 728.242100] ? lo_ioctl+0x875/0x1d80 [ 728.245809] ? blkdev_ioctl+0x9ac/0x2010 [ 728.249870] ? block_ioctl+0xee/0x130 [ 728.253673] ? do_vfs_ioctl+0x1de/0x1720 [ 728.257744] ? fs_reclaim_acquire+0x20/0x20 [ 728.262049] ? lock_downgrade+0x900/0x900 [ 728.266183] ? ___might_sleep+0x1ed/0x300 [ 728.270329] ? arch_local_save_flags+0x40/0x40 [ 728.274912] ? lock_downgrade+0x900/0x900 [ 728.279046] __should_failslab+0x124/0x180 [ 728.283279] should_failslab+0x9/0x14 [ 728.287067] kmem_cache_alloc_node_trace+0x270/0x740 [ 728.292164] ? kasan_unpoison_shadow+0x35/0x50 [ 728.296731] ? kasan_kmalloc+0xc7/0xe0 [ 728.300608] __kmalloc_node_track_caller+0x33/0x70 [ 728.305527] __kmalloc_reserve.isra.39+0x41/0xe0 [ 728.310278] __alloc_skb+0x155/0x770 [ 728.314011] ? skb_scrub_packet+0x490/0x490 [ 728.318354] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 728.324139] ? pointer+0x990/0x990 [ 728.327667] ? device_get_devnode+0x2d0/0x2d0 [ 728.332149] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 728.337152] ? netlink_has_listeners+0x2cb/0x4a0 [ 728.341894] ? netlink_tap_init_net+0x3d0/0x3d0 [ 728.346552] alloc_uevent_skb+0x84/0x1da [ 728.350599] kobject_uevent_env+0xa52/0x101e [ 728.354996] kobject_uevent+0x1f/0x24 [ 728.358795] loop_clr_fd+0x607/0xd00 [ 728.362500] ? loop_attr_do_show_backing_file+0x1a0/0x1a0 [ 728.368026] lo_ioctl+0x875/0x1d80 [ 728.371580] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 728.377365] ? lo_rw_aio_complete+0x470/0x470 [ 728.381877] blkdev_ioctl+0x9ac/0x2010 [ 728.385761] ? blkpg_ioctl+0xc10/0xc10 [ 728.389632] ? lock_downgrade+0x900/0x900 [ 728.393782] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 728.399579] ? __kernel_text_address+0xd/0x40 [ 728.404074] ? unwind_get_return_address+0x61/0xa0 [ 728.408989] ? __save_stack_trace+0x8d/0xf0 [ 728.413317] ? __fget+0x4d1/0x740 [ 728.416775] ? ksys_dup3+0x680/0x680 [ 728.420474] ? kasan_slab_free+0xe/0x10 [ 728.424449] ? ksys_mount+0xa3/0x140 [ 728.428161] ? __x64_sys_mount+0xbe/0x150 [ 728.432303] ? do_syscall_64+0x1b9/0x820 [ 728.436355] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.441754] block_ioctl+0xee/0x130 [ 728.445369] ? blkdev_fallocate+0x400/0x400 [ 728.449677] do_vfs_ioctl+0x1de/0x1720 [ 728.453560] ? kasan_check_write+0x14/0x20 [ 728.457789] ? ioctl_preallocate+0x300/0x300 [ 728.462193] ? memset+0x31/0x40 [ 728.465459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.470982] ? smack_file_ioctl+0x210/0x3c0 [ 728.475286] ? fget_raw+0x20/0x20 [ 728.478728] ? smack_file_lock+0x2e0/0x2e0 [ 728.482968] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.488509] ? security_file_ioctl+0x94/0xc0 [ 728.492914] ksys_ioctl+0xa9/0xd0 [ 728.496368] __x64_sys_ioctl+0x73/0xb0 [ 728.500260] do_syscall_64+0x1b9/0x820 [ 728.504143] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 728.509491] ? syscall_return_slowpath+0x5e0/0x5e0 [ 728.514403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.519236] ? trace_hardirqs_on_caller+0x310/0x310 [ 728.524240] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 728.529260] ? prepare_exit_to_usermode+0x291/0x3b0 [ 728.534281] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 728.539122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 728.544322] RIP: 0033:0x4573e7 [ 728.547504] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 728.566388] RSP: 002b:00007fa377faaa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 728.574078] RAX: ffffffffffffffda RBX: 00007fa377faab30 RCX: 00000000004573e7 [ 728.581328] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 728.588586] RBP: 0000000020000080 R08: 00007fa377faab30 R09: 00007fa377faaad0 [ 728.595860] R10: 0000000000100020 R11: 0000000000000246 R12: 0000000000000004 [ 728.603124] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 728.627672] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:02 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:02 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)="27e0", 0x86) 05:23:02 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:02 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xe5, "78461bb96c6a7ce31a4b82ad2c9798cac4bde5f96b9d10fc660db64f09c5342149307f70504a63e3f77041906adfa16c2c08d38909d4b0de34cc4ceb1c8304867bfb81540f0ea0f27544e8e6ec2d00fb8c69d9af87da9a37153231133b007ebcfd3a6391d7ed1467e5f14155c388f1d6fb928f0b54f782fc937d4f6899119d8d13527b8360f498fd7e77a97167bf6570321973396868fdbeef73e6991db3fd0c44e58a2737bb68d859578fce54ef446e0bf8f38faaf6fc08df780a95eabe3198dc96174876324a51a2d5f90f064b65baef728de888abbb15fd62f47e086fa6a766ab40197b"}, &(0x7f0000000100)=0xed) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e24, 0x5, @loopback, 0x6}}, 0x0, 0x4}, 0x90) 05:23:02 executing program 0 (fault-call:2 fault-nth:33): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:02 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x80000000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) socket$pppoe(0x18, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$TCSBRKP(r0, 0x5425, 0x7) creat(&(0x7f0000000100)='./file0\x00', 0x80) 05:23:02 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6}, 0x10) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r2, &(0x7f0000000280)='\'\x00', 0x86) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) 05:23:02 executing program 4 (fault-call:3 fault-nth:0): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) [ 728.777317] FAULT_INJECTION: forcing a failure. [ 728.777317] name failslab, interval 1, probability 0, space 0, times 0 [ 728.823407] CPU: 1 PID: 16278 Comm: syz-executor0 Not tainted 4.19.0-rc6+ #48 [ 728.830733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.840094] Call Trace: [ 728.842747] dump_stack+0x1c4/0x2b4 [ 728.846393] ? dump_stack_print_info.cold.2+0x52/0x52 [ 728.851603] ? do_raw_spin_lock+0xc1/0x200 [ 728.855900] should_fail.cold.4+0xa/0x17 [ 728.859993] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 728.865104] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 728.870563] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.876113] ? check_preemption_disabled+0x48/0x200 [ 728.881145] ? rcu_is_watching+0x30/0x30 [ 728.885226] ? rcu_is_watching+0x30/0x30 [ 728.889308] ? __dentry_kill+0x51f/0x7a0 [ 728.893382] ? fs_reclaim_acquire+0x20/0x20 [ 728.897720] ? lock_downgrade+0x900/0x900 [ 728.901895] ? ___might_sleep+0x1ed/0x300 [ 728.905127] FAULT_INJECTION: forcing a failure. [ 728.905127] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 728.906047] ? arch_local_save_flags+0x40/0x40 [ 728.906062] ? lock_downgrade+0x900/0x900 [ 728.906083] __should_failslab+0x124/0x180 [ 728.906098] should_failslab+0x9/0x14 [ 728.906115] __kmalloc_track_caller+0x2d0/0x750 [ 728.906139] ? kasan_check_write+0x14/0x20 [ 728.906156] ? do_raw_spin_lock+0xc1/0x200 [ 728.906175] ? ext4_remount+0x117/0x2640 [ 728.906202] kstrdup+0x39/0x70 [ 728.906220] ext4_remount+0x117/0x2640 [ 728.906240] ? is_subdir+0x4a0/0x4a0 [ 728.906256] ? list_lru_walk_node+0x20d/0x280 [ 728.906278] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 728.906293] ? ext4_register_li_request+0x9b0/0x9b0 [ 728.906311] ? shrink_dentry_list+0x800/0x800 [ 728.906324] ? do_mount+0xbcc/0x31f0 [ 728.906341] ? lock_release+0x970/0x970 [ 728.906356] ? arch_local_save_flags+0x40/0x40 [ 728.906374] do_remount_sb+0x350/0x7b0 [ 728.906402] ? ext4_register_li_request+0x9b0/0x9b0 [ 729.003483] ? user_get_super+0x250/0x250 [ 729.007646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.013187] ? security_capable+0x99/0xc0 [ 729.017352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.022894] ? ns_capable_common+0x13f/0x170 [ 729.027314] do_mount+0x1513/0x31f0 [ 729.030954] ? kasan_check_read+0x11/0x20 [ 729.035115] ? copy_mount_string+0x40/0x40 [ 729.039358] ? kasan_check_write+0x14/0x20 [ 729.043601] ? kasan_unpoison_shadow+0x35/0x50 [ 729.048187] ? kasan_kmalloc+0xc7/0xe0 [ 729.052093] ? kmem_cache_alloc_trace+0x31f/0x750 [ 729.056944] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.062495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.068032] ? copy_mount_options+0x288/0x380 [ 729.072537] ksys_mount+0x12d/0x140 [ 729.076173] __x64_sys_mount+0xbe/0x150 [ 729.080164] do_syscall_64+0x1b9/0x820 [ 729.084067] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 729.089452] ? syscall_return_slowpath+0x5e0/0x5e0 [ 729.094385] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.099244] ? trace_hardirqs_on_caller+0x310/0x310 [ 729.104270] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 729.109299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.114870] ? prepare_exit_to_usermode+0x291/0x3b0 [ 729.119893] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.124790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.129976] RIP: 0033:0x459fea [ 729.133172] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 729.152081] RSP: 002b:00007fa377faaa88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 729.159801] RAX: ffffffffffffffda RBX: 00007fa377faab30 RCX: 0000000000459fea [ 729.167082] RDX: 00007fa377faaad0 RSI: 0000000020000080 RDI: 00007fa377faaaf0 05:23:02 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={0x0, 0xffffffff}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYBLOB="a300234d3800001572291d288fb36c4fe13aea18f6d5632af358b8c534f65a9f0410c4a95a3d362b2fc7a7370a987dbb81a49893b5f4bd3cc6b2d0c0e8c18fcf744cfce755abc94543fa91ec12ff595a6ead0514d90952f2d5f665e9d6c6c5e9c2de72d85ec9db3aad502048a27887ed46a7271be76a593a4d9524db3ae5e2dc228f01e8fea8cd69576d99faef353700dc09160c1a4b4600030000000000000000000000000000"], &(0x7f00000003c0)=0xab) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000100)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r3, @in6={{0xa, 0x4e24, 0x8, @remote, 0x34}}, 0x40, 0xffffffffffffffc0, 0x8, 0x5, 0x20}, 0x98) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:02 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fcntl$setflags(r0, 0x2, 0x1) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:02 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) 05:23:02 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 729.174348] RBP: 0000000020000080 R08: 00007fa377faab30 R09: 00007fa377faaad0 [ 729.181624] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 729.188890] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 729.196177] CPU: 0 PID: 16289 Comm: syz-executor4 Not tainted 4.19.0-rc6+ #48 [ 729.203471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.203477] Call Trace: [ 729.203499] dump_stack+0x1c4/0x2b4 [ 729.203521] ? dump_stack_print_info.cold.2+0x52/0x52 [ 729.215460] should_fail.cold.4+0xa/0x17 [ 729.215480] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 729.224279] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.224301] ? __radix_tree_lookup+0x358/0x4c0 [ 729.233447] ? __radix_tree_insert+0x8f0/0x8f0 [ 729.233466] ? kasan_check_read+0x11/0x20 [ 729.243569] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 729.243592] ? fs_reclaim_acquire+0x20/0x20 [ 729.243612] ? lock_downgrade+0x900/0x900 [ 729.252320] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 729.252339] ? ___might_sleep+0x1ed/0x300 [ 729.252358] ? lock_release+0x970/0x970 [ 729.261940] ? arch_local_save_flags+0x40/0x40 [ 729.261964] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 729.271897] ? __might_sleep+0x95/0x190 [ 729.271916] __alloc_pages_nodemask+0x34b/0xde0 [ 729.271928] ? lock_acquire+0x1ed/0x520 [ 729.271944] ? smack_d_instantiate+0x136/0xea0 [ 729.271963] ? __alloc_pages_slowpath+0x2d80/0x2d80 [ 729.280057] ? mark_held_locks+0x130/0x130 [ 729.280072] ? lock_release+0x970/0x970 [ 729.280091] ? arch_local_save_flags+0x40/0x40 [ 729.289678] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 729.289694] ? unwind_dump+0x190/0x190 [ 729.289710] ? trace_hardirqs_on+0xbd/0x310 [ 729.289730] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.298374] ? check_preemption_disabled+0x48/0x200 [ 729.298390] ? __mutex_lock+0x85e/0x1700 [ 729.298408] ? __find_get_block+0x3be/0xf20 [ 729.298426] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 729.298443] alloc_pages_current+0x10c/0x210 [ 729.298462] __page_cache_alloc+0x38f/0x5b0 [ 729.298476] ? ___might_sleep+0x1ed/0x300 [ 729.298490] ? arch_local_save_flags+0x40/0x40 [ 729.298504] ? __filemap_set_wb_err+0x3b0/0x3b0 [ 729.298518] ? __wake_up_common_lock+0x1d0/0x330 [ 729.298537] pagecache_get_page+0x396/0xf00 [ 729.298556] ? find_get_pages_contig+0x15b0/0x15b0 [ 729.298569] ? lock_downgrade+0x900/0x900 [ 729.298584] ? do_raw_spin_lock+0xc1/0x200 [ 729.298599] ? __find_get_block+0xf20/0xf20 [ 729.298615] ? __wake_up_common_lock+0x1d0/0x330 [ 729.298638] ? __wake_up_common+0x7d0/0x7d0 [ 729.307172] ? __lockdep_init_map+0x105/0x590 [ 729.307199] ? mark_held_locks+0x130/0x130 [ 729.307217] ? mark_held_locks+0x130/0x130 [ 729.307245] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 729.316476] ? ext4_get_group_desc+0x1c6/0x2c0 [ 729.316493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.316508] ? ext4_ext_index_trans_blocks+0x11f/0x150 [ 729.316530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.325070] ? ext4_meta_trans_blocks+0x25f/0x310 [ 729.338556] grab_cache_page_write_begin+0x75/0xa0 [ 729.338573] ext4_write_begin+0x336/0x1830 [ 729.338610] ? ext4_truncate+0x1650/0x1650 [ 729.338638] ? ext4_xattr_get+0x1a8/0xb30 [ 729.338653] ? lock_downgrade+0x900/0x900 [ 729.338668] ? ext4_xattr_ibody_get+0x107/0x630 [ 729.338688] ? ext4_xattr_inode_set_class+0x60/0x60 [ 729.338729] ? current_time+0x72/0x1b0 [ 729.349272] ? lock_downgrade+0x900/0x900 [ 729.349292] ? trace_hardirqs_on+0xbd/0x310 [ 729.349306] ? current_time+0x72/0x1b0 [ 729.349321] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 729.349344] ? ext4_xattr_ibody_get+0x630/0x630 [ 729.522201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.527773] ? iov_iter_fault_in_readable+0x22a/0x450 [ 729.532967] ? copy_page_from_iter+0x8e0/0x8e0 [ 729.537551] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 729.542571] ? ktime_get_coarse_real_ts64+0x243/0x3b0 [ 729.547772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.553313] ? timespec64_trunc+0xea/0x180 [ 729.557551] ? inode_init_owner+0x340/0x340 [ 729.561891] generic_perform_write+0x3aa/0x6a0 [ 729.566490] ? page_endio+0xb60/0xb60 [ 729.570299] ? file_update_time+0xe4/0x640 [ 729.574541] ? current_time+0x1b0/0x1b0 [ 729.578528] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 729.583549] ? generic_write_checks+0x382/0x5d0 [ 729.588234] ? wait_on_page_locked_killable+0x520/0x520 [ 729.593608] ? ext4_file_write_iter+0x2a1/0x1420 [ 729.598378] __generic_file_write_iter+0x26e/0x630 [ 729.603325] ext4_file_write_iter+0x390/0x1420 [ 729.607924] ? ext4_file_mmap+0x410/0x410 [ 729.612086] ? ksys_dup3+0x680/0x680 [ 729.615808] ? __f_unlock_pos+0x19/0x20 [ 729.619788] ? lock_downgrade+0x900/0x900 [ 729.623944] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 729.623966] ? proc_fail_nth_write+0x9e/0x210 [ 729.633979] ? proc_cwd_link+0x1d0/0x1d0 [ 729.633997] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 729.634017] ? iov_iter_init+0xc2/0x1e0 [ 729.647568] __vfs_write+0x6b8/0x9f0 [ 729.651751] ? kernel_read+0x120/0x120 [ 729.655647] ? lock_release+0x970/0x970 [ 729.659625] ? arch_local_save_flags+0x40/0x40 [ 729.664243] ? check_preemption_disabled+0x48/0x200 [ 729.669273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.674840] ? check_preemption_disabled+0x48/0x200 [ 729.679865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.685409] ? __sb_start_write+0x1b2/0x370 [ 729.689741] vfs_write+0x1fc/0x560 [ 729.693295] ksys_write+0x101/0x260 [ 729.696928] ? __ia32_sys_read+0xb0/0xb0 [ 729.701000] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 729.706463] __x64_sys_write+0x73/0xb0 [ 729.710357] do_syscall_64+0x1b9/0x820 [ 729.714258] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 729.719628] ? syscall_return_slowpath+0x5e0/0x5e0 [ 729.725352] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.730216] ? trace_hardirqs_on_caller+0x310/0x310 [ 729.735255] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 729.740280] ? prepare_exit_to_usermode+0x291/0x3b0 [ 729.745309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 729.750162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 729.755363] RIP: 0033:0x457579 [ 729.758570] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 729.777480] RSP: 002b:00007fdcb7e0ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 729.785203] RAX: ffffffffffffffda RBX: 00007fdcb7e0ec90 RCX: 0000000000457579 [ 729.792484] RDX: 00000000fffffc85 RSI: 00000000200000c0 RDI: 0000000000000003 [ 729.799767] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 729.807041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdcb7e0f6d4 [ 729.814319] R13: 00000000004cb4e8 R14: 00000000004d8b50 R15: 0000000000000006 [ 729.858458] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:03 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000080)=0x97b5) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:03 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f00000002c0)='wlan0\x00vmnet1,)\x00', 0xfffffddd) 05:23:03 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x0, 0x8000, 0x8, 0x9, 0x7ff, 0x3, 0x80000000, {0x0, @in6={{0xa, 0x4e21, 0x1, @loopback, 0x91a}}, 0x0, 0x1000, 0x100000001, 0x2, 0x8001}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={r2, 0x2}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x8, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x4, 0x7, 0x4, 0x7fffffff, 0x5, 0x1f, 0x3ff, 0x1000, 0x0}, 0xfffffffffffffffd) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000040)={r4, @in={{0x2, 0x4e21}}, 0xfffffffffffff1d2, 0xffff, 0x9, 0xfffffffffffffffc, 0x24}, &(0x7f0000000100)=0x98) fchown(r0, 0x0, r3) 05:23:03 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:03 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:03 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x800000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x3, {0x82, 0x6, 0x5, 0x7fffffff, 0xffff, 0x2}, 0x5, 0xffffffff}, 0xe) [ 730.020311] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:23:03 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) renameat(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 05:23:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\nxt2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:03 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x9, 0x800) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:23:03 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:03 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={r3, 0x80000000}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0x0, 0x4d, 0x9d, &(0x7f0000000200)="57a0279f3fc7a19fdb2977360866b1e44258e11ab63a8498f9f9f06005ffdb56fa70251ea27b19484f361fbaf64ed7a6f1a1746cf6b42dd9316935803b50337247cf48dab05fb2b8325e89f8dc", &(0x7f0000000280)=""/157, 0x5}, 0x28) r4 = getpgid(0xffffffffffffffff) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={[], 0xfffffffffffff000, 0x4, 0x0, 0x5, 0x80000000, r4}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:03 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) mq_timedsend(r0, &(0x7f0000000000)="7715e8059a2f687dbf9f18df5eb239f609703bbe10424cc5baf9a5d97f0c17b40be4028b1c14c1819beb3e6a7267b6e5275b01656726728081e68607479034f9b2ff3d5235475659d16ab61eb1d1db45b99e286319ed071201c9b741567002ac7f4460d311a97e655f4f99052f13e0cec50781fc24e66bbe7bb592de35a3ac5f786c97b80aa8077b7076846fc0b82b8b3c3b70", 0x93, 0x8, &(0x7f00000000c0)={0x77359400}) 05:23:04 executing program 3: r0 = geteuid() r1 = geteuid() syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffff8, 0x8, &(0x7f0000000600)=[{&(0x7f0000000140)="9faf5ac22db909baa596a0ca3daa4ee0de8b7d554f2c3fb2f4cae2710de844ea9f3b2f648ca2ef2d8f2e0f1a5d99e1edd13eb5e18b437295b923bf2ec34732a32ca8a4c66df40510473e4252200d807cbbdd67bfbc6acacac0dfe208d9f3a0d7bc16523e91986c30aefc390a08c1efedadd35eab98995637ecd8a99eba1da4578b4b05af1ae98b4951dd1fe3a0c40d318252", 0x92, 0x7ff}, {&(0x7f0000000080)="c4be5d5c0b5e", 0x6, 0xffff}, {&(0x7f00000002c0)="03540c645031248c6e3d037fbd3dc634070af24b2c0932f6ea0fe84c4ce83bfb542f60996e2f33c214b46a802eb0a92d642338c0b51eab897bee5337455ca47d8be2097fdfee019853a12c44de896d9f694ab25cf804b6bd6de88702084ce0afd2be76ee7766c201e65d956ebf382737acb3c9e7c126de4b87b84147c73183441c33902a48a371410acf6d838b53720c98a9547d220ec43f5733748cf031b6bfbce9987b7550dedd", 0xa8, 0x1a6}, {&(0x7f00000000c0)="30718c6b5432867d077254a1f7edb49cbe6a5242a0f4c38c27cdbf9cbceb5af2a802d0c26fa912e1c4962e785efbad02cb352a60a8", 0x35, 0x3}, {&(0x7f0000000200)="12aca00bfed388414127353b9a3d99e5bbea6528db2f29f7e33dcc46a5d51e74c317ed2ca3fa260194fec35a613a5da9b09e13146be731009ebc9fdeed1fe19f7695ab07e982220a776072b9f8fb5cc331d74477", 0x54, 0x8}, {&(0x7f0000000380)="8ae188327846cf758f1862ac2319b2d355baccd8206f47f4e9999cd020784d31c3d0e1cf68baac007b228238ecfb39db92f13d73d0593a186411b38e326b2ce0791a41cf9175af311fb5ee460be0f870dfe8a1c77fa8a863", 0x58, 0x3}, {&(0x7f0000000400)="72154bfc65cc3233dcb220020d15ff389f499ef045f961e56670e07e516af6d188d6a94624496bd95fc2850354f17ed0584f2e17fb4ecacc05b78c89f0a200248b9d25362be89b1e297049fdd957094d9140af26f5ba9354fec0197e4f441ea8e7f2a6640759c49ef23e1c7b07e50d357c5ddf1206cd70fd22f6ee92e7d3d4f2aa5bf3b7714981593dce31103ebc4ca36cb9c77869327c96794ccbf6b4a55dea7f5854ec2f4a30379c02d46c2789e71198b314168d1d214a2482f46993d0af87f0d7d478099f547652e735c6a603", 0xce, 0x9}, {&(0x7f0000000500)="0a640edc601490b26bae10ed461320ed1cfebd5e5124c6d23abce61b33b0609e730e01923a9f95dc47a3349a9c23c62b341f12f2156f0d7b1cfd95b7fa175349457c05f153a19769d016e69634b75d296d300d983058a2a430b57e8ac91d7178a88d880defedcda7c633889fc6d3b96a6d5b63755a34ae98b4e15858ff2a1568e2a75807c2ecbf4eb834253179cb03f03956c68a2e32a5e9a477a425ee64fb06ff47793bb1a96ebda7dad1c1a32b9eaec3b9caefcaf9bf54567de6d46ef2222fd0452e5c08045c71e787", 0xca}], 0x810, &(0x7f00000006c0)=ANY=[@ANYBLOB="64697361626c655f73706100000000a8ada1caf4797241626c655f7371617273653d6e6f2c636173655f73656e6f69746976653d6e643d00000000", @ANYRESHEX=r0, @ANYBLOB=',errors=recover,fsmagic=0x0000000000000007,defcontext=system_u,fowner<', @ANYRESDEC=r1, @ANYBLOB=',fsmagic=0x0000000000000100,\x00']) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000880)) getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000800), &(0x7f0000000840)=0x8) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r2, &(0x7f0000000280)='\'\x00', 0x86) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000900)={0x0, 0x83, "0a28c5fad44ef1d46fcf6a11fd511fbc366bad840fe076ff7bcf35894472d9a63cc0b5fe603b773320efba26ed788fbe827b54e961557b0884f9a51d0acbee6f9fa606deb37a3419600eb294f660d0dddebbf66f98569eb484cd7f9d47968927d47df239e37140421137509000fa4e5705655963ee3f1a79cfd509837ba2137b35bcce"}, &(0x7f00000009c0)=0x8b) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000a00)={r3, 0x1000}, &(0x7f0000000a40)=0x8) getuid() 05:23:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='%xt2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:04 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000080)) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000100)={0x2, 0x7fff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000180)={r2, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:04 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgroups(0x2, &(0x7f0000000300)=[0x0, 0xee01]) fchown(r0, 0x0, r2) 05:23:04 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432a0", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:04 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0xf0ff, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:04 executing program 5: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f00000002c0)='wlan0\x00vmnet1,)\x00', 0xfffffddd) 05:23:04 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0xb, 0xfa00, {0x8000002, &(0x7f0000000200), 0x0, 0xf}}, 0x20) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x808, &(0x7f00000003c0)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@debug={'debug', 0x3d, 0x10000}}, {@uname={'uname', 0x3d, '({em0.vboxnet1-keyringppp1system'}}, {@access_any='access=any'}, {@privport='privport'}, {@access_user='access=user'}], [{@fowner_lt={'fowner<', r3}}]}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000040)={{0x9, 0x8}, 'port0\x00', 0x80, 0x40010, 0xe36, 0xffffffffffffffff, 0x100000000, 0x8, 0x7, 0x0, 0x6, 0x3}) 05:23:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ex\n2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 731.188718] ntfs: (device loop3): parse_options(): Unrecognized mount option disable_spa. 05:23:04 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:04 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000000)="2c84", 0x22) [ 731.243812] ntfs: (device loop3): parse_options(): Unrecognized mount option disable_spa. [ 731.276891] 9pnet: p9_fd_create_tcp (16376): problem connecting socket to 127.0.0.1 [ 731.321562] 9pnet: p9_fd_create_tcp (16382): problem connecting socket to 127.0.0.1 05:23:04 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:04 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x7f) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ex%2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 731.448691] EXT4-fs: 13 callbacks suppressed [ 731.448702] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:04 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x4, 0x7, 0x7f, 0x7f, 0x8}, &(0x7f0000000040)=0x14) write$FUSE_NOTIFY_POLL(r0, &(0x7f00000000c0)={0x18, 0x1, 0x0, {0x5}}, 0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={r1, 0x3}, 0x8) 05:23:04 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x41095ff1401d81a9, 0x0, [0x2, 0x8001, 0xa9, 0x7, 0x6, 0x80000000, 0x4, 0x2, 0x5, 0x8, 0xffffffffffffff76, 0x1, 0x7f, 0x400000, 0x3, 0x6]}, {0x19, 0x0, [0x6, 0x5a9c, 0x6, 0xed, 0x1, 0x6, 0x4, 0x1000, 0x7, 0x101, 0x9, 0x10000, 0xae4, 0x10001, 0x6, 0xfffffffffffffffe]}, {0x8e3edea9fc1fbb8d, 0x0, [0x8001, 0x5, 0xfff, 0x1, 0x9, 0x4, 0x7, 0x80, 0x9, 0x0, 0x7, 0x100000001, 0x7fff, 0x80000001, 0x8, 0x10001]}, {0x31, 0x0, [0x6, 0x5, 0x6, 0x4, 0x1, 0x5f, 0x9, 0x5, 0x3, 0x6, 0x78, 0xfffffffffffffff8, 0x814, 0x3, 0x8001, 0x87dc]}, {0x0, 0x0, [0x6, 0x3fffc000000000, 0x2, 0x80000001, 0x0, 0x0, 0x8, 0x2, 0x1ff, 0xffff, 0x41, 0x2, 0x66b, 0x80, 0x100000001, 0x2]}, {0x39, 0x0, [0x5af, 0x2, 0x339, 0x5, 0x401, 0x8001, 0x5, 0x0, 0x7, 0x4, 0x200, 0x3, 0x4, 0x4, 0x70b, 0xffffffffffffff14]}, {0xe, 0x0, [0x8, 0x400, 0x9, 0x4, 0x53e8d082, 0xef09, 0x4, 0x3, 0x8, 0xc, 0x5, 0x0, 0x2, 0x7fffffff, 0x8000, 0x6]}, {0x34, 0x0, [0xffff, 0x3cd9, 0x81, 0x80000001, 0xd21b, 0x32, 0x5, 0x50f7, 0x8, 0x2, 0xab3, 0xa63f, 0x81, 0x22, 0x0, 0x1ff]}], r1, 0x1, 0x1, 0x240}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 731.519887] EXT4-fs (sda1): re-mounted. Opts: 05:23:04 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 731.577576] EXT4-fs (sda1): re-mounted. Opts: [ 731.683001] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 731.745275] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:05 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x2eb28, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:05 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$P9_RCLUNK(r0, &(0x7f0000000000)={0x7, 0x79, 0x2}, 0x7) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000040)) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f00000002c0)=""/4096) 05:23:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext\n\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:05 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000100)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r2}}, 0x18) 05:23:05 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:05 executing program 5 (fault-call:4 fault-nth:0): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:23:05 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x1, 0x0, 0x10001, 0x36}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f0000000040)={0x2, r1}) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x2) 05:23:05 executing program 3: r0 = memfd_create(&(0x7f0000000040)='cpuset\x00', 0x4) setsockopt$packet_buf(r0, 0x107, 0x1f, &(0x7f0000000080)="60e792312892c0cc3fb112543ede7bfb8c7f3c70757408e6a42a57a66874868bde90a4957f9597930fb076f447afa986342d4b6d21958727c6422119adc1296db248c5dc201bac864592d4deac0f7b515c162776d161cf75e261", 0x5a) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r1, &(0x7f0000000000)='\'\x00', 0xe8) 05:23:05 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x2) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000080)={0x6}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) accept4(r1, &(0x7f0000000140)=@nfc, &(0x7f00000001c0)=0x26c, 0x80000) write$smack_current(r1, &(0x7f0000000280)='\'\x00', 0x86) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000000)=0xc8) socketpair(0x1f, 0x800, 0x4, &(0x7f00000000c0)) 05:23:05 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x2) 05:23:06 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000000)={0x4000000000000000, 0x100000, 0x1000000000000000, 0x2, 0x3}) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:06 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000000)=0x3) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:06 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x14, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:06 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000080)={0xc36e, 0x24, [0x3, 0x0, 0x6, 0x1, 0x400, 0x0, 0x400, 0x58fe, 0x1]}) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) [ 737.834240] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 737.850136] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='extB\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 737.881509] FAULT_INJECTION: forcing a failure. [ 737.881509] name failslab, interval 1, probability 0, space 0, times 0 [ 737.884914] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 737.894944] CPU: 0 PID: 16473 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #48 [ 737.908979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.918372] Call Trace: [ 737.918396] dump_stack+0x1c4/0x2b4 [ 737.918416] ? dump_stack_print_info.cold.2+0x52/0x52 [ 737.918435] ? __wake_up_common_lock+0x1d0/0x330 [ 737.918456] should_fail.cold.4+0xa/0x17 [ 737.929836] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 737.938633] ? mark_held_locks+0x130/0x130 [ 737.938653] ? arch_local_save_flags+0x40/0x40 [ 737.938686] ? mark_held_locks+0x130/0x130 [ 737.938704] ? mark_held_locks+0x130/0x130 [ 737.961057] ? mark_held_locks+0x130/0x130 [ 737.965298] ? mark_held_locks+0x130/0x130 [ 737.969652] ? mark_held_locks+0x130/0x130 [ 737.973897] ? ___might_sleep+0x1ed/0x300 [ 737.978053] ? arch_local_save_flags+0x40/0x40 [ 737.982648] __should_failslab+0x124/0x180 [ 737.986891] should_failslab+0x9/0x14 [ 737.990699] kmem_cache_alloc+0x2be/0x730 [ 737.994878] ? mark_held_locks+0x130/0x130 [ 737.999128] jbd2__journal_start+0x1e7/0xa90 [ 738.003541] ? arch_local_save_flags+0x40/0x40 [ 738.008134] ? jbd2_write_access_granted.part.8+0x410/0x410 [ 738.013850] ? mark_held_locks+0x130/0x130 [ 738.018100] ? __might_sleep+0x95/0x190 [ 738.022088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.027633] __ext4_journal_start_sb+0x1a5/0x5f0 [ 738.032391] ? ext4_ioctl_setflags+0x275/0x7d0 [ 738.036978] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 738.042694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.048245] ? security_capable+0x99/0xc0 [ 738.052428] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.057970] ? ns_capable_common+0x13f/0x170 [ 738.062389] ext4_ioctl_setflags+0x275/0x7d0 [ 738.066802] ? ext4_ioc_getfsmap+0xee0/0xee0 [ 738.071236] ? down_read+0x1d0/0x1d0 [ 738.074957] ? mnt_clone_write+0x10a/0x160 [ 738.079210] ? __mnt_want_write_file+0xa2/0xc0 [ 738.083804] ext4_ioctl+0xe2f/0x4210 [ 738.087521] ? lock_release+0x970/0x970 [ 738.091497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.097040] ? ext4_ioctl_group_add+0x560/0x560 [ 738.101719] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 738.107264] ? _kstrtoull+0x188/0x250 [ 738.111068] ? _parse_integer+0x180/0x180 [ 738.115224] ? lock_release+0x970/0x970 [ 738.119238] ? arch_local_save_flags+0x40/0x40 [ 738.123826] ? usercopy_warn+0x110/0x110 [ 738.127900] ? __fget+0x4aa/0x740 [ 738.131356] ? lock_downgrade+0x900/0x900 [ 738.135512] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 738.141320] ? smk_access+0x53b/0x700 [ 738.145133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.150670] ? smack_log+0x423/0x590 [ 738.154392] ? smk_access_entry+0x310/0x310 [ 738.158716] ? __fget+0x4d1/0x740 [ 738.162181] ? smk_tskacc+0x3dd/0x520 [ 738.165998] ? smack_privileged+0xd0/0xd0 [ 738.170151] ? ext4_ioctl_group_add+0x560/0x560 [ 738.174823] do_vfs_ioctl+0x1de/0x1720 [ 738.178727] ? fsnotify_first_mark+0x350/0x350 [ 738.183313] ? __fsnotify_parent+0xcc/0x420 [ 738.187643] ? ioctl_preallocate+0x300/0x300 [ 738.192058] ? smk_curacc+0x7f/0xa0 [ 738.195694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.201243] ? smack_file_ioctl+0x210/0x3c0 [ 738.205569] ? fget_raw+0x20/0x20 [ 738.209030] ? smack_file_lock+0x2e0/0x2e0 [ 738.213271] ? fput+0x130/0x1a0 [ 738.216565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.222106] ? security_file_ioctl+0x94/0xc0 [ 738.226525] ksys_ioctl+0xa9/0xd0 [ 738.229991] __x64_sys_ioctl+0x73/0xb0 [ 738.233886] do_syscall_64+0x1b9/0x820 [ 738.237782] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 738.243171] ? syscall_return_slowpath+0x5e0/0x5e0 [ 738.248124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.252969] ? trace_hardirqs_on_caller+0x310/0x310 [ 738.257991] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 738.263013] ? prepare_exit_to_usermode+0x291/0x3b0 [ 738.268055] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.272906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.278097] RIP: 0033:0x457579 [ 738.281296] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.300206] RSP: 002b:00007fa151676c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 738.307934] RAX: ffffffffffffffda RBX: 00007fa151676c90 RCX: 0000000000457579 [ 738.315246] RDX: 0000000020000000 RSI: 0000000040086602 RDI: 0000000000000003 [ 738.322515] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 05:23:11 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x20000400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:11 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='com.apple.system.Security\x00', &(0x7f00000001c0)='\'\x00', 0x2, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f00000004c0)=""/218) [ 738.329786] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1516776d4 [ 738.337056] R13: 00000000004bf60e R14: 00000000004cf4a8 R15: 0000000000000006 05:23:11 executing program 5 (fault-call:4 fault-nth:1): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:23:11 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0xa0010000, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:11 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:11 executing program 3: r0 = accept$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000240)=0x1c) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={0x0, 0x1ff}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000340)={r1, 0x3}, &(0x7f0000000380)=0x8) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_setscheduler(r2, 0x0, &(0x7f0000000040)=0x10001) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r3, &(0x7f0000000280)='\'\x00', 0x86) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000140)={{0x3, 0x3, 0xc4f, 0x2, 0x6}, 0x3f, 0x1f, 'id0\x00', 'timer0\x00', 0x0, 0x4, 0x0, 0x1ff, 0x91}) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000080)=0x1) 05:23:11 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 738.440706] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 738.460535] FAULT_INJECTION: forcing a failure. [ 738.460535] name failslab, interval 1, probability 0, space 0, times 0 05:23:11 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x57186ccf, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000100)=0x3) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x124) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0xfffffffffffffe3b, 0xfa00, {0x40000000000000, &(0x7f0000000040)}}, 0x20) write$UHID_INPUT(r1, &(0x7f00000003c0)={0x8, "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", 0x1000}, 0x1006) 05:23:11 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000140)={r1, 0x1}) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) flistxattr(r0, &(0x7f0000000000)=""/161, 0xa1) [ 738.482442] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 738.506341] CPU: 1 PID: 16491 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #48 [ 738.513634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.522987] Call Trace: [ 738.525597] dump_stack+0x1c4/0x2b4 [ 738.529256] ? dump_stack_print_info.cold.2+0x52/0x52 [ 738.534473] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 738.539769] should_fail.cold.4+0xa/0x17 [ 738.539789] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 738.539810] ? __kernel_text_address+0xd/0x40 [ 738.548969] ? mark_held_locks+0x130/0x130 [ 738.548985] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 738.549002] ? radix_tree_next_chunk+0x53b/0xdb0 [ 738.549022] ? lock_acquire+0x1ed/0x520 [ 738.571464] ? fs_reclaim_acquire+0x20/0x20 [ 738.575802] ? lock_downgrade+0x900/0x900 [ 738.579979] ? ___might_sleep+0x1ed/0x300 [ 738.584134] ? arch_local_save_flags+0x40/0x40 05:23:11 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000080)="6d696d655f7479706563707573657470707030b65e00", 0x16) [ 738.588721] ? trace_hardirqs_on+0xbd/0x310 [ 738.593069] ? kasan_check_read+0x11/0x20 [ 738.597246] ? tag_pages_for_writeback+0x369/0x4a0 [ 738.602188] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 738.607659] __should_failslab+0x124/0x180 [ 738.607677] should_failslab+0x9/0x14 [ 738.615700] kmem_cache_alloc+0x2be/0x730 [ 738.619858] ? tag_pages_for_writeback+0x369/0x4a0 [ 738.619957] ? blk_start_plug+0xcc/0x370 [ 738.619980] ext4_init_io_end+0x96/0x220 [ 738.633024] ? ext4_end_io_rsv_work+0x920/0x920 05:23:11 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.opaque\x00', &(0x7f0000000080)=""/98, 0x62) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000180)="dc4b2f5f246dc5f9108c2f049df456b74fa1eaca61938e74d20fc1e389afd10aae89b99133bbcbc3d1df733b1f006ca8", 0xffffffffffffff52) [ 738.637706] ? kasan_check_read+0x11/0x20 [ 738.641872] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 738.647163] ? check_preemption_disabled+0x48/0x200 [ 738.652191] ? radix_tree_tagged+0x11/0x60 [ 738.656436] ext4_writepages+0x154c/0x4110 [ 738.660683] ? is_bpf_text_address+0xd3/0x170 [ 738.665196] ? unwind_get_return_address+0x61/0xa0 [ 738.670136] ? __save_stack_trace+0x8d/0xf0 [ 738.670163] ? ext4_mark_inode_dirty+0xb30/0xb30 [ 738.670181] ? save_stack+0x43/0xd0 [ 738.679256] ? __kasan_slab_free+0x102/0x150 [ 738.687268] ? kasan_slab_free+0xe/0x10 [ 738.691258] ? kmem_cache_free+0x83/0x290 [ 738.695418] ? jbd2_journal_stop+0x430/0x15d0 [ 738.699923] ? ext4_ioctl_setflags+0x539/0x7d0 [ 738.704518] ? trace_hardirqs_off+0xb8/0x310 [ 738.708930] ? kasan_check_read+0x11/0x20 [ 738.713081] ? trace_hardirqs_on+0x310/0x310 [ 738.717507] ? trace_hardirqs_off+0xb8/0x310 [ 738.721922] ? trace_hardirqs_on+0x310/0x310 [ 738.726340] ? debug_check_no_obj_freed+0x305/0x58d [ 738.731364] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 738.731383] ? check_preemption_disabled+0x48/0x200 [ 738.731399] ? trace_hardirqs_on+0xbd/0x310 [ 738.731418] ? jbd2_journal_stop+0x430/0x15d0 [ 738.741957] ? wbc_attach_and_unlock_inode+0x5c0/0xa30 [ 738.741975] ? lock_downgrade+0x900/0x900 [ 738.741996] ? lock_downgrade+0x900/0x900 [ 738.764889] ? kasan_check_read+0x11/0x20 [ 738.769044] ? do_raw_spin_unlock+0xa7/0x2f0 [ 738.773462] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 738.778047] ? lock_acquire+0x1ed/0x520 [ 738.782036] ? __filemap_fdatawrite_range+0x31d/0x4a0 [ 738.787240] ? __ext4_handle_dirty_metadata+0x1e0/0x5a0 [ 738.792630] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 738.798173] ? wbc_attach_and_unlock_inode+0x675/0xa30 [ 738.803468] ? ext4_mark_inode_dirty+0xb30/0xb30 [ 738.808240] do_writepages+0x9a/0x1a0 [ 738.812053] ? do_writepages+0x9a/0x1a0 [ 738.816051] __filemap_fdatawrite_range+0x364/0x4a0 [ 738.821075] ? delete_from_page_cache_batch+0x11f0/0x11f0 [ 738.826639] ? ext4_change_inode_journal_flag+0x111/0x3e0 [ 738.832185] ? down_read+0x1d0/0x1d0 [ 738.835933] filemap_write_and_wait+0x44/0xc0 [ 738.840449] ext4_change_inode_journal_flag+0x139/0x3e0 [ 738.845823] ext4_ioctl_setflags+0x606/0x7d0 [ 738.850243] ? ext4_ioc_getfsmap+0xee0/0xee0 [ 738.854655] ? down_read+0x1d0/0x1d0 [ 738.858385] ? __mnt_want_write_file+0xa2/0xc0 [ 738.862979] ext4_ioctl+0xe2f/0x4210 [ 738.866700] ? lock_release+0x970/0x970 [ 738.870710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.876258] ? ext4_ioctl_group_add+0x560/0x560 [ 738.880938] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 738.886479] ? _kstrtoull+0x188/0x250 [ 738.890301] ? _parse_integer+0x180/0x180 [ 738.894453] ? lock_release+0x970/0x970 [ 738.898436] ? arch_local_save_flags+0x40/0x40 [ 738.903025] ? usercopy_warn+0x110/0x110 [ 738.907104] ? __fget+0x4aa/0x740 [ 738.910561] ? lock_downgrade+0x900/0x900 [ 738.914732] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 738.920538] ? smk_access+0x53b/0x700 [ 738.924350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.929895] ? smack_log+0x423/0x590 [ 738.933617] ? smk_access_entry+0x310/0x310 [ 738.937943] ? __fget+0x4d1/0x740 [ 738.941413] ? smk_tskacc+0x3dd/0x520 [ 738.945232] ? smack_privileged+0xd0/0xd0 [ 738.949393] ? ext4_ioctl_group_add+0x560/0x560 [ 738.954072] do_vfs_ioctl+0x1de/0x1720 [ 738.957968] ? fsnotify_first_mark+0x350/0x350 [ 738.962597] ? __fsnotify_parent+0xcc/0x420 [ 738.966927] ? ioctl_preallocate+0x300/0x300 [ 738.971345] ? smk_curacc+0x7f/0xa0 [ 738.974981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.980527] ? smack_file_ioctl+0x210/0x3c0 [ 738.984850] ? fget_raw+0x20/0x20 [ 738.988306] ? smack_file_lock+0x2e0/0x2e0 [ 738.992549] ? fput+0x130/0x1a0 [ 738.995841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.001387] ? security_file_ioctl+0x94/0xc0 [ 739.005804] ksys_ioctl+0xa9/0xd0 [ 739.009273] __x64_sys_ioctl+0x73/0xb0 [ 739.013170] do_syscall_64+0x1b9/0x820 [ 739.017072] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 739.022447] ? syscall_return_slowpath+0x5e0/0x5e0 [ 739.027379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.032239] ? trace_hardirqs_on_caller+0x310/0x310 [ 739.037270] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 739.042292] ? prepare_exit_to_usermode+0x291/0x3b0 [ 739.047321] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.052176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.057376] RIP: 0033:0x457579 [ 739.060578] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 739.079479] RSP: 002b:00007fa151676c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 739.087191] RAX: ffffffffffffffda RBX: 00007fa151676c90 RCX: 0000000000457579 [ 739.094473] RDX: 0000000020000000 RSI: 0000000040086602 RDI: 0000000000000003 [ 739.101746] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 739.109015] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1516776d4 [ 739.116300] R13: 00000000004bf60e R14: 00000000004cf4a8 R15: 0000000000000006 [ 739.133380] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:23:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:12 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x9, &(0x7f0000000080)={0x4}, 0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000140)=0x4) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 739.173789] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:12 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x40001, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x100, 0x400) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r1, &(0x7f0000000280)='\'\x00', 0x86) [ 739.274745] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 739.307883] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:23:12 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) 05:23:12 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:12 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x280000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x1000, 0x2}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r1}, &(0x7f00000001c0)=0x8) mq_open(&(0x7f0000000000)=':.vmnet0@em0\x00', 0x800, 0x80, &(0x7f0000000040)={0x9, 0x8, 0x8, 0x6, 0x10001, 0x5, 0x101, 0x7}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0xde) write$smack_current(r2, &(0x7f0000000280)='\'\x00', 0x86) 05:23:12 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x16000000, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:12 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sigaltstack(&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140), 0x0, 0x1000}}, 0x20) 05:23:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:12 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000040)="27007adfd47bf76ec2f3474c56a9eada4735d2a5b0df0dc9db9b4fbec576885aa33b6948be31c138ff470a603748955ff97091629ff7d20e6aec443e221e79f845ccb3dedd50fbe74485e46500683d0755b9b122f81450fd345c31b3ce2062f066dc9a563d90338418be1f5682105b8469f049ae915b34fde1dd637528ec8c9e657d0b4cc5971b7ccebe4975616d844131e71d24e2bf398467206ad594f03016d6cb7bfaf5c2", 0xa6) 05:23:12 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x400c6615, &(0x7f0000000000)=0x4000) [ 739.439350] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:12 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:12 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x100000000, 0x1) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) write$evdev(r0, &(0x7f00000002c0)=[{{r1, r2/1000+10000}, 0x5, 0x10000, 0x3ff}, {{0x0, 0x7530}, 0x2, 0xbab9, 0xfffffffffffffffb}, {{}, 0x12, 0x8, 0x40}, {{0x77359400}, 0x11, 0x80000000, 0x5}, {{0x77359400}, 0x1f, 0xffffffff, 0x6}, {{0x77359400}, 0x5, 0x8001, 0x1}, {{}, 0x16, 0x1}, {{r3, r4/1000+30000}, 0x14, 0xfff, 0x7}, {{r5, r6/1000+30000}, 0x2, 0xfffffffffffffffc, 0x2}, {{0x0, 0x2710}, 0x1f, 0x7, 0x9}], 0xf0) r7 = creat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) write$smack_current(r7, &(0x7f0000000280)='\'\x00', 0x86) getsockname$unix(r7, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) socket$inet6(0xa, 0x0, 0x401) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x8, 0x0) 05:23:12 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000480)={0x101, 0x8208, 0xd58, 0xf5b5, 0x0}, &(0x7f00000004c0)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000500)={r1, 0x4d}, 0x8) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000000)={0x4, 0x10001, 0x8001}) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @remote}}}, &(0x7f0000000080)=0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r2, 0x7}, 0x8) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) sendmsg$nl_generic(r0, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x110002}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x150, 0x19, 0x1, 0x70bd27, 0x25dfdbff, {0x4}, [@typed={0x8, 0x76, @fd=r0}, @typed={0x8, 0x2e, @fd=r0}, @generic="50441b8a14cdf31342718178461bee78f9fe0db1b27a8856fe1ec26ffb5b418b90a1f7bceaca50feb982b4ad386dce61f88dad8a590c437d596208e83592a7066546ec348fe0e42f", @generic="5c37e48e500859ac808978ca136a031fe6aee5d4d8664681b46193b2d334796dc4a0662eb9fab70be3694a0a1837ff0f0dffb9e0155de71bbc447086abb6c7b96618cc8709781f17c539d995e0b2743657", @generic="c0e7bdf3c8b25efec594041864438f0c33b8b495eb809c84c4d6760920292419ada54668ca4e43660f94f61e0ebad98a1f68f234c07c87c2483c24502ca6c9cda3f0da4af8667b4c1b0e545cadf4f20bae778e345eb7892c656dd477c3ac00b477f5e2048370ec02b238f1629536d6a40b77ed1d0d41790f1e4cea072c580ebeba51563156b7268e32e36c8818d55c2217faad"]}, 0x150}, 0x1, 0x0, 0x0, 0x24000040}, 0x4000) ptrace$peekuser(0x3, r3, 0x101) 05:23:12 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x80087601, &(0x7f0000000000)=0x4000) 05:23:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:12 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:12 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:13 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0xc00, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:13 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x4030582a, &(0x7f0000000000)=0x4000) 05:23:13 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x77359400}}, 0x100) 05:23:13 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140)=0x101, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) timer_create(0xf7a05fdea8a9c174, &(0x7f0000000080)={0x0, 0xf, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000100)=0x0) timer_getoverrun(r2) 05:23:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:13 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:13 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc0c0583b, &(0x7f0000000000)=0x4000) 05:23:13 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x400000, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:13 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:14 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6612, &(0x7f0000000000)=0x4000) 05:23:14 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:14 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0xf0ffffff0f0000, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:14 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x110) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:14 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0xffffffffffffffbb, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000100)) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffff8, 0x101000) 05:23:14 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086603, &(0x7f0000000000)=0x4000) 05:23:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:14 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:15 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x5) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4400000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="e0000000", @ANYRES16=r1, @ANYBLOB="140526bd7000fcdbdf25100000001c0002000800050008000000080008000100010008000b000a00000008000600ffff00000c0002000800040001000000080006000400000038000300080001000000000008000500ffffffff140002006c6f00000000000000000000000000000800080005000000080004006a0900001c0001000800040000040000080008001ee50000080004004e2300002800030008000400001000001400020065727370616e300000000000000000000800040001000100180002001400010000000000000000000000ffff0000000001c94240ce7c8455006cce6fbea9eed7a7f28be9b1c2d5a716d5579c9c634c8e77952cdd61658620a06ebd62c49674c9d75e7e677e9965aa5f7a5e74b7d366202ebaf63a463044d8e71cff114ed728a246987ee0b8b6fb4a23019c8f0878045293886d1d697028bbc1"], 0xe0}, 0x1, 0x0, 0x0, 0x40000}, 0x14) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000004c0)=0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0xb4, &(0x7f0000000140)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e23, @rand_addr=0x7b7}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e23, 0xffffffffffffffa5, @mcast2}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, @in6={0xa, 0x4e21, 0x4, @local, 0x101}, @in6={0xa, 0x4e22, 0xde, @mcast1}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000440)={r2, 0x8, 0x0, 0x1f}, &(0x7f0000000480)=0x18) 05:23:15 executing program 2: r0 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) connect$rds(r0, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0xc8be}, 0x10) 05:23:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:15 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000000)=0x4000) 05:23:15 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:15 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0xab) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:16 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x32eb0200, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:16 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r2}, &(0x7f0000000180)=0x8) 05:23:16 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x541b, &(0x7f0000000000)=0x4000) 05:23:16 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000005e0007081dfffd940101830020200a00090000005e000000600000000d00ff7e", 0x24}], 0x1}, 0x0) r2 = open(&(0x7f0000000000)='./file1\x00', 0x202, 0x44) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$smack_current(r3, &(0x7f0000000280)='\'\x00', 0x86) 05:23:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:16 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432f6", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:16 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x801c581f, &(0x7f0000000000)=0x4000) 05:23:16 executing program 3: getrusage(0xffffffffffffffff, &(0x7f0000000040)) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$input_event(r0, &(0x7f0000000140)={{}, 0x1, 0x6, 0x800}, 0x18) write$smack_current(r0, &(0x7f0000000000)='\'\x00', 0x57f) 05:23:16 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="ac000000", @ANYRES16=r2, @ANYBLOB="00022bbd4c66e813d2789ee30000040007003400070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="1c00070008000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="0c0008000c00ff0f0000000000002cd2d306040006000000000000000c0002007f000000000000000c000600020000000000000000000000000000000000000000000000"], 0xac}, 0x1, 0x0, 0x0, 0x4}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$P9_RREMOVE(r0, &(0x7f0000000340)={0x7, 0x7b, 0x1}, 0x7) getsockopt$inet_int(r0, 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x200}}, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) recvfrom$packet(r0, &(0x7f00000003c0)=""/140, 0x8c, 0x12143, &(0x7f00000005c0)={0x11, 0x3, r3, 0x1, 0x5}, 0x14) 05:23:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 742.842938] EXT4-fs: 25 callbacks suppressed [ 742.842949] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 742.867194] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:16 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x61b4, 0x2001) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0286404, &(0x7f0000000040)={0x0, 0x6, 0x0, 0xa4, &(0x7f0000ffd000/0x2000)=nil, 0x1000}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x3b1b136d2436e8f2, r0, 0x0) write$smack_current(r1, &(0x7f0000000280)='\'\x00', 0x86) 05:23:16 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 743.001567] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 743.067849] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 743.094044] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 743.142741] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:17 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x23000000, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:17 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6609, &(0x7f0000000000)=0x4000) 05:23:17 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000200)=""/97) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000140)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) creat(&(0x7f0000000000)='./file0\x00', 0x4) 05:23:17 executing program 3: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x40) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:17 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:17 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000040)='\'\x00', 0x2) 05:23:17 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x80086603, &(0x7f0000000000)=0x4000) 05:23:17 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001680)='/dev/vga_arbiter\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000016c0)={0x0, @in6={{0xa, 0x4e23, 0x5, @local, 0x4}}, 0x401, 0x6, 0x9e, 0xffffffff, 0x7}, &(0x7f0000001780)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000001880)=ANY=[@ANYRES32=r1, @ANYBLOB="0800aa00e2ef738c69485c12dadc2be76461bb127391a202000000d6e82b56421505a0c031e9b103d455af3c08a85906af3f9bdf1aae196a5a779da5d3341bd33daf0978fb8998a3e833e057875ef6a2a9695984d852c309494bc3aaa6f0a7aefb72017cc19bdecf7cba15b68e06a8153112efdd100000729ed4a616971a4871a485d1156441c7f1c1b066b16d7767511350e3c65158cd00000000000000000000002419179861a92c62d82a2c65d6e80702"], 0xb2) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MAP_BUFS(r2, 0xc0186419, &(0x7f0000000080)={0x4, &(0x7f0000000200)=""/208, &(0x7f0000000300)=[{0x0, 0x20, 0x1, &(0x7f0000000040)=""/32}, {0x2a, 0x1000, 0x7ff, &(0x7f00000003c0)=""/4096}, {0x0, 0x7e, 0x3, &(0x7f0000000140)=""/126}, {0x8, 0xd7, 0x0, &(0x7f00000013c0)=""/215}]}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000014c0)=@assoc_value={0x0, 0x9}, &(0x7f0000001500)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000001540)={r4, 0x8}, &(0x7f0000001580)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000001600)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000015c0)={0xffffffffffffffff}, 0x111, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000001640)={0x4, 0x8, 0xfa00, {r5, 0xc0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x2, 0x5}}, 0x20) [ 743.997507] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 744.032363] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 744.067315] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:17 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = gettid() ptrace$getsig(0x4202, r1, 0x2, &(0x7f0000000000)) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) [ 744.107606] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:23:17 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:18 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x30eb0200, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:18 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40087602, &(0x7f0000000000)=0x4000) 05:23:18 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000040)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000000)={0x4}) write$smack_current(r1, &(0x7f0000000280)='\'\x00', 0x86) 05:23:18 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:18 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:18 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:sudo_exec_t:s0\x00', 0x21, 0x3) 05:23:18 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5421, &(0x7f0000000000)=0x4000) 05:23:18 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0xffefffffffffffff) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:18 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fsync(r1) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000080)=[0x7ff, 0x1]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432a0", &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:18 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1', "8b243ba2"}, 0x8) 05:23:19 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0xfeffffff, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:19 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc0045878, &(0x7f0000000000)=0x4000) 05:23:19 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:19 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x0, 0x0, 0x10003, 0x3}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000040)={r1, 0x1}) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) 05:23:19 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:19 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x102) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) recvmmsg(r0, &(0x7f00000007c0)=[{{&(0x7f0000000000)=@ax25, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/53, 0x35}, {&(0x7f0000000140)=""/235, 0xeb}], 0x2, &(0x7f00000002c0)=""/153, 0x99, 0x8001}, 0x40}, {{&(0x7f0000000380)=@nfc, 0x80, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x6}, 0x38e8ddd3}, {{&(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000480)=""/64, 0x40}, {&(0x7f00000004c0)=""/176, 0xb0}, {&(0x7f0000000580)=""/117, 0x75}, {&(0x7f0000000600)=""/102, 0x66}], 0x4, &(0x7f00000006c0)=""/212, 0xd4, 0x5}, 0xffffffffffffff80}], 0x3, 0x40000001, &(0x7f0000000880)={0x77359400}) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000a00)={0x4, 0x4, 0x9}) setsockopt$packet_buf(r1, 0x107, 0x1f, &(0x7f0000000240)="dac80f2bcade3ab4da3d8c4bfa2155563728a5c605729d8559bdd643d506b194776daf837343329de0f3b7932ff4", 0x2e) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000a40)={0x6, r0, 0x1}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000008c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f00000009c0)={r2, &(0x7f0000000900)=""/158}) r3 = getuid() r4 = getpid() write$FUSE_LK(r0, &(0x7f0000000a80)={0x28, 0xffffffffffffffda, 0x8, {{0xfffffffffffffff8, 0x25, 0x1, r4}}}, 0x28) setfsuid(r3) getsockname$packet(r0, &(0x7f0000000ac0)={0x11, 0x0, 0x0}, &(0x7f0000000b00)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000b40)={r5, 0x1, 0x6, @remote}, 0x10) ioctl$RTC_UIE_ON(r0, 0x7003) 05:23:19 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086608, &(0x7f0000000000)=0x4000) 05:23:19 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) r3 = syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x800) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x0, 0x9}}, 0x20) fsetxattr(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB='secu2ityem1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000100)=']trusted)cpusetwlan0posix_acl_access,&&4\x00', 0x29, 0x3) r4 = fcntl$getown(r3, 0x9) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000240)={0x0, @aes256}) fcntl$getownex(r2, 0x10, &(0x7f0000000180)={0x0, 0x0}) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r1, &(0x7f0000000200)={r0, r2, 0x8001}) 05:23:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:19 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:19 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000000)='\'\x00', 0x2) 05:23:20 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x13, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:20 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc0189436, &(0x7f0000000000)=0x4000) 05:23:20 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) truncate(&(0x7f0000000040)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x2) 05:23:20 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0xfffffffffffffe2e, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$setfpexc(0xc, 0x20000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:20 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432eb", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:20 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0/file0\x00', 0x1, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="e6c0acb40b5658fb4625e77e28d163820d8cf628f7c7fcb8576ed829b55e4ca6507ed15f15d93c555102847e90b1dc7a4e0c3dbd8274884f1e98e9000a397bb57a20d68524bf65925245b40f1bbfd7ec7c4ad125bfd6832d68273014f13a491efc0177573e1544dcfff4a3c76011d7592a388c769b37fb4dc1aa541eab71cd0d35605a679442bd085451e9c94a1c9d349b93286995cc230494a902ddcbe7aa76170651f8e146c809b6ff28ce27109a3f97c3438b13a09ee17e9f9ec2c9584cdfed493fc88b73e7d468eb4661e26ca27b1545", 0xd2, 0x1000}, {&(0x7f00000002c0)="fd58da531ed3cd90f259d7db271d953f46fffc85a335c4f4ec15dfa7f79c8e9554173c33ea44c066f6bddf4005758c767ccf14bcf4350a49859aa92bf30fbdc2201de862cbbcf5eeeda7288b62cb76e4d2a4cc3d5f7ca69221feb41fed7de320dea9d9bf724899b01aeca5800cdb73ffe4e0b84b47c23285e9463fc220a65a1a7a79450ab4a0cf84c77778027ae61cb994b4690ba73de86681bfb615892ba281d159eb1987d2e9706079ebc02a32366e37c33ba9dad964acc610e3a7125b8923794c5bbc44a8cfd78fea6369767572609b3bb8019c546848c6855efd859ee330d530e17b106e7772ed872964d01ecb88d28f87ba45aca7ae", 0xf8, 0xedd7}], 0x0, &(0x7f0000000240)='-,nodev\x00') ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x6) write$smack_current(r0, &(0x7f00000003c0)='.\x00', 0x2) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x3, 0x4) 05:23:20 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40049409, &(0x7f0000000000)=0x4000) 05:23:20 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x10a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000080)) 05:23:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:20 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40305828, &(0x7f0000000000)=0x4000) 05:23:20 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:21 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x12a030000000000, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:21 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfffffffffffeffff, 0x7, 0x2, 0x9, 0x0, 0x7, 0x40000, 0x8, 0x0, 0x7fff, 0xf, 0xf586, 0x7, 0x1ff, 0x1, 0x7, 0xfffffffffffffbff, 0x7fff, 0x9, 0x9, 0x9, 0x9200, 0xf46, 0x8, 0x4, 0x6, 0x4f7, 0x3, 0x1, 0x7df, 0x9, 0xdf, 0x7fff, 0x0, 0x667, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5}, 0x810, 0x1acb, 0xfff, 0x1, 0x9, 0x1, 0xff}, r1, 0x0, 0xffffffffffffff9c, 0xb) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) ioctl$VT_ACTIVATE(r0, 0x5606, 0x2) 05:23:21 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000100)={0x80000000, 0x4, 0x4, {0x0, 0x1c9c380}, 0xac, 0x1ff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:21 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086604, &(0x7f0000000000)=0x4000) 05:23:21 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:21 executing program 3: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x1d2) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x2) pipe2(&(0x7f0000000040), 0x800) 05:23:21 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x4008660c, &(0x7f0000000000)=0x4000) [ 748.419955] EXT4-fs: 26 callbacks suppressed [ 748.419970] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 748.447051] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:21 executing program 2: io_setup(0xffff, &(0x7f0000000140)=0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x7, r1, &(0x7f0000000200)="484ee49c70a7c515f9ab4441ae5f802799f047b8771092f4fba50936a5a3d6566c1371213fbfd6c1587a8cdfc0bad185302d0e12e4ea2ddbdb9985fb688c088b2ce7d72a635ad49e8a3abbeaaa2300a18789c2129ba7bbd7bd743aec88598eac3ce1013ad0336548f36c1ff979885b50dd5d111cf1c1794d49d279b140c1a59d70b223270838163345e9674b5753c30686eb13fe222f", 0x96, 0x2, 0x0, 0x3, r2}, &(0x7f0000000300)) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) pread64(r4, &(0x7f0000000080)=""/56, 0x38, 0xa) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x8) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 748.495840] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 748.513072] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:23:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:21 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x5, 0x8]) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000000)={0xff, 0xd280, 0x3, 0x50}, 0xfffffffffffffec1) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000124}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r1, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x5, 0x8}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000001}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) 05:23:21 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 748.682143] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 748.724676] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 748.747539] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 748.791048] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:22 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x1700000000000000, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:22 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6609, &(0x7f0000000000)=0x4000) 05:23:22 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@generic={0x3, 0xffffffffffffffff, 0x8}) 05:23:22 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000180)=0x4000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000002c0)={{0x3, 0x2, 0x4, 0x3, 0x5}, 0x4, 0x9}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000140)={'sit0\x00', 0xa3a}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000080)={0x600, 0xfff}) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'sit0\x00'}, {0x20, 'sit0\x00'}, {0x20, 'sit0\x00'}, {0x20, 'nodev&#userbdev'}], 0xa, "caab6ee8b7a3c34c3cf3096cb89c9a6da1bf0f45f369556d4ce20140ab0b970072758c55bf0871737118286a00b536e495c062a5127824036c92e722c912048e1050943d1762fc74cb21b12d628dd2327b5a4d6b26f6fb3c59287a640f90f7"}, 0x8c) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000100)={0x5, 0x5}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:22 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:22 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{0x20, ')-'}, {0x20, '\'\x00'}, {0x20, '\'\x00'}, {0x20, '\'\x00'}, {0x20, 'eth1'}, {0x20, "70726f636e6f646576bc6367726f757085626465762773656c662d2f75736572656d302f"}], 0xa, "ff8ed1e140c2d13733c72e3bcb3d51232e80a87b4a5adf16c10d9639e367221d36ac326933c571c592621beb6012321e3d2354949b79acca8813195168c39bd4f1f3cada023a832fd109da3a43754827d467825e7d6ff150b95b7ae95505c5da4e2b23b28a480a16bdfced3d7f7b879e4ce5759898054d3c142a386270e16d"}, 0xc0) 05:23:22 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x4000) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)}}, 0x20) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/132, 0x84) sysfs$1(0x1, &(0x7f0000000000)=')\x00') 05:23:22 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x660c, &(0x7f0000000000)=0x4000) [ 749.550343] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 749.567273] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:23 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3b, 0x200) statx(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x24, &(0x7f0000000140)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r1, &(0x7f0000000280)='\'\x00', 0x86) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 05:23:23 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40106614, &(0x7f0000000000)=0x4000) 05:23:23 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x31eb0200, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:23 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x4000) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x400200, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0xfffffffffffffffb}}, 0x20) 05:23:23 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x10b, 0x6f0b, 0x9, 0xf1, 0x374, 0x2, 0x168, 0xf2}, "f9d9e292686647ca458877491834c5aa93d8711369b2b76d339c2ab8ce1f549a985c2850caae165e0332c27928dc6a0cc5bc66575c4c7453a575b2e40eed63bcd87b7863947e36b524096034a4f4c06a6bdb74edcfda6c6b0bf5ec53f5221c424bc36fcadec9cd0989acbbe1fff83f20be2bfdba05cbfda8a1a678b708ccd5288582a546f71985f6fa68d2e6", [[], [], [], [], []]}, 0x5ac) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0x100) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000880)={0x0, 0x0, 0x4, 0x0, [], [{0x0, 0x5, 0x7, 0x8000, 0x8, 0x1}, {0x3, 0xb56, 0x7fffffff, 0x5, 0x3f, 0x9}], [[], [], [], []]}) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f00000000c0)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x214203, 0x0) sendfile(r0, r2, &(0x7f0000000040), 0x401) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r3, &(0x7f0000000280)='\'\x00', 0x74) 05:23:23 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5460, &(0x7f0000000000)=0x4000) 05:23:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743210", &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:24 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) 05:23:24 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086607, &(0x7f0000000000)=0x4000) 05:23:24 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/40, &(0x7f0000000100)=0x28) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) [ 750.712158] EXT4-fs warning (device sda1): ext4_resize_begin:46: There are errors in the filesystem, so online resizing is not allowed 05:23:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743202", &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:24 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x8) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x2) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000140)=""/145) 05:23:24 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 750.780858] EXT4-fs warning (device sda1): ext4_resize_begin:46: There are errors in the filesystem, so online resizing is not allowed 05:23:25 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x80000, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:25 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140), 0x2}}, 0x20) 05:23:25 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000180)={@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, {&(0x7f0000000000)=""/208, 0xd0}, &(0x7f0000000140), 0x58}, 0xa0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000240)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@mcast1}}}, &(0x7f00000003c0)=0xe8) 05:23:25 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x800c6613, &(0x7f0000000000)=0x4000) 05:23:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:25 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:25 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086610, &(0x7f0000000000)=0x4000) 05:23:25 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0xfffffd45) 05:23:25 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000000)=""/12) 05:23:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:25 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000000)='\'\x00', 0x2) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) 05:23:25 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743215", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 751.885194] EXT4-fs warning (device sda1): ext4_resize_begin:46: There are errors in the filesystem, so online resizing is not allowed [ 751.916833] EXT4-fs warning (device sda1): ext4_resize_begin:46: There are errors in the filesystem, so online resizing is not allowed 05:23:26 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x5e2a0300, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:26 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x4020940d, &(0x7f0000000000)=0x4000) 05:23:26 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x800000010) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) 05:23:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:26 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:26 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000140)='\'\x00', 0x1) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x40, 0x0) fsetxattr(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="6f5ed0656d3000000000000000000000"], &(0x7f0000000040)='\x00', 0x1, 0x3) 05:23:26 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40286608, &(0x7f0000000000)=0x4000) 05:23:26 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x1, {0x2, 0x4, 0x2}}, 0x14) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2l', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:26 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) write$smack_current(r0, &(0x7f0000000300)="1a050951879d6ca8339c2500526a6ba8438d0e7059c80228814e1f39ded13cde3e0fc72d2971400d747a572a95b0d9381f6a4a4ad758b0f43ea108193b7a2f03e418b2a9de7e4f6ddc6a55b8b14b31c2398d9da3b34afdd41af79e6d04c039b66bbf132458d079d5895e74fcc9c44bfef5526674bcaf24bfe814c01ac081dab38d2899a0196882c1b0d9e02b51d1cfa9d4a47d5e95a386ef2b98725156299c611833c53794b1ea5619f2096bef47f9ffc9da81220886c0972120da02e8d1ca28195b9f1f68d1097ba4121cbeb956d2ae2f72aee197d8f199148b2eb2c7acb36517ad25569ac4a3000000", 0x2ee) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.origin\x00') [ 753.061421] EXT4-fs warning (device sda1): ext4_resize_begin:46: There are errors in the filesystem, so online resizing is not allowed 05:23:26 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 753.119258] EXT4-fs warning (device sda1): ext4_resize_begin:46: There are errors in the filesystem, so online resizing is not allowed 05:23:26 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5450, &(0x7f0000000000)=0x4000) 05:23:27 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x29eb0200, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:27 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5452, &(0x7f0000000000)=0x4000) 05:23:27 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc020660b, &(0x7f0000000000)=0x4000) [ 754.117960] EXT4-fs: 28 callbacks suppressed [ 754.117972] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 754.135935] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:27 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:27 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) rt_sigqueueinfo(r1, 0x24, &(0x7f00000000c0)={0x1c, 0x0, 0x7fff, 0x2}) 05:23:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x2, &(0x7f0000000000)=0x4000) [ 754.174691] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 754.207272] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:27 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x5451, &(0x7f0000000000)=0x4000) 05:23:27 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) [ 754.378922] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 754.396635] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 754.433835] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 754.456623] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue 05:23:28 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x32a55, 0x4, 0xfa00, {0x0, &(0x7f0000000200)}}, 0xfffffc85) 05:23:28 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x82) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) get_mempolicy(&(0x7f0000000100), &(0x7f0000000140), 0x5, &(0x7f0000ffc000/0x1000)=nil, 0x3434adf26d42ce58) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000000)='\'\x00'}, 0x30) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x2, 0x7, 0x400, 0x2, r1}) 05:23:28 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:28 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0xc0045878, &(0x7f0000000000)=0x4000) 05:23:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) 05:23:28 executing program 1: syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000300)={[{@min_batch_time={'min_batch_time'}}]}) 05:23:28 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp\x00') ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x37) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r1, &(0x7f0000000280)='\'\x00', 0x86) 05:23:28 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x4008660f, &(0x7f0000000000)=0x4000) [ 755.250441] EXT4-fs (sda1): re-mounted. Opts: min_batch_time=0x0000000000000000,,errors=continue [ 755.272086] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue 05:23:28 executing program 2: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x95}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x4, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) 05:23:28 executing program 5: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x6611, &(0x7f0000000000)=0x4000) 05:23:28 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$smack_current(r0, &(0x7f0000000280)='\'\x00', 0x86) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x0, 0x0, 0x5, 0x254, 0x238, 0x1, 0x3d5, 0x7}, "389815b1563aa8e0d0697f0514b621b794462acc7b8f0b438675fdd800c2af90a57c1b598db8e6cf2a7a317cb9d0582f0135fb3267923d5a85020625ae7618d717d2290669ae2be21e2d87971b92ffb1ec7da79cf1ae2be75e32d499bed104d369759d1b7f97889875a39dacceac5c28da2e5d8202f7f044de16e1fd69e56a1ef55c878b9c8e480164a8060e7bb2a556985d703469a3f8eea86356a7837c894ec82f0cbffadae3bc8988734713b9902659176e0f3844c65dfe3111a376ef19546c72c438db22cebbac0e6d0af0cb9064c0adc8e07f3a1fb0f47a8e05d45ad239ae8690b0541fc0cd3d81d93d2e83e2ce92b16ffa22", [[], []]}, 0x315) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) 05:23:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f00000003c0)}], 0x100020, &(0x7f0000000100)) [ 755.463899] WARNING: CPU: 1 PID: 17203 at fs/ext4/inode.c:3353 ext4_invalidatepage+0x1c7/0x5b0 [ 755.472678] Kernel panic - not syncing: panic_on_warn set ... [ 755.472678] [ 755.480060] CPU: 1 PID: 17203 Comm: syz-executor5 Not tainted 4.19.0-rc6+ #48 [ 755.483903] kobject: 'loop3' (000000002393f9b0): kobject_uevent_env [ 755.487340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.487346] Call Trace: [ 755.487372] dump_stack+0x1c4/0x2b4 [ 755.487400] ? dump_stack_print_info.cold.2+0x52/0x52 [ 755.493811] kobject: 'loop3' (000000002393f9b0): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 755.503155] panic+0x238/0x4e7 [ 755.503182] ? add_taint.cold.5+0x16/0x16 [ 755.503203] ? __warn.cold.8+0x148/0x1ba [ 755.535398] ? ext4_invalidatepage+0x1c7/0x5b0 [ 755.539990] __warn.cold.8+0x163/0x1ba [ 755.543891] ? __switch_to_asm+0x40/0x70 [ 755.547981] ? ext4_invalidatepage+0x1c7/0x5b0 [ 755.552578] report_bug+0x254/0x2d0 [ 755.556303] do_error_trap+0x1fc/0x4d0 [ 755.560222] ? math_error+0x3f0/0x3f0 [ 755.564047] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.568901] ? trace_hardirqs_on_caller+0x310/0x310 [ 755.573926] ? blk_mq_insert_requests+0x800/0x800 [ 755.578807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.583655] do_invalid_op+0x1b/0x20 [ 755.587378] invalid_op+0x14/0x20 [ 755.590838] RIP: 0010:ext4_invalidatepage+0x1c7/0x5b0 [ 755.596033] Code: 80 3c 02 00 0f 85 a7 03 00 00 4d 8b 6d 00 31 ff 49 c1 ed 11 41 83 e5 01 4c 89 ee e8 43 ea 67 ff 4d 85 ed 74 07 e8 09 e9 67 ff <0f> 0b e8 02 e9 67 ff 8b b5 34 ff ff ff 44 89 fa 4c 89 e7 e8 91 3a [ 755.614935] RSP: 0018:ffff88018590ec78 EFLAGS: 00010212 [ 755.620307] RAX: 0000000000040000 RBX: 1ffff10030b21d91 RCX: ffffc9000dae4000 [ 755.627579] RDX: 0000000000000ece RSI: ffffffff8216ec87 RDI: 0000000000000007 [ 755.634855] RBP: ffff88018590ed50 R08: ffff880183018300 R09: fffff94000ceffc6 [ 755.642124] R10: fffff94000ceffc6 R11: ffffea000677fe33 R12: ffffea000677fe00 [ 755.649397] R13: 0000000000000001 R14: ffffea000677fe08 R15: 0000000000001000 [ 755.656994] ? ext4_invalidatepage+0x1c7/0x5b0 [ 755.661585] ? ext4_invalidatepage+0x1c7/0x5b0 [ 755.666174] ? ext4_update_bh_state+0x1f0/0x1f0 [ 755.670855] ? remove_wait_queue+0x360/0x360 [ 755.675444] ? wait_on_page_bit+0x54f/0x7d0 [ 755.679773] ? kasan_check_write+0x14/0x20 [ 755.684013] ? ext4_update_bh_state+0x1f0/0x1f0 [ 755.688685] truncate_cleanup_page+0x5ac/0xa90 [ 755.693277] ? pagevec_remove_exceptionals+0x170/0x170 [ 755.698568] ? wait_on_page_bit_killable+0x870/0x870 [ 755.703681] ? page_cache_tree_insert+0x560/0x560 [ 755.708535] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 755.713559] ? unlock_page+0x2c2/0x4c0 [ 755.717462] ? wake_up_page_bit+0x6f0/0x6f0 [ 755.721806] ? ___might_sleep+0x1ed/0x300 [ 755.725968] truncate_inode_page+0x107/0x1a0 [ 755.730382] ? do_invalidatepage+0xf0/0xf0 [ 755.734630] ? __might_sleep+0x95/0x190 [ 755.738615] truncate_inode_pages_range+0x1382/0x2d50 [ 755.743824] ? generic_error_remove_page+0xc0/0xc0 [ 755.748770] ? do_writepages+0x9a/0x1a0 [ 755.752758] ? lock_downgrade+0x900/0x900 [ 755.756918] ? lock_release+0x970/0x970 [ 755.760897] ? arch_local_save_flags+0x40/0x40 [ 755.765490] ? write_cache_pages+0x1e50/0x1e50 [ 755.770080] ? __switch_to_asm+0x34/0x70 [ 755.774150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.779701] ? ext4_writepages+0x8b5/0x4110 [ 755.784034] ? mark_held_locks+0x130/0x130 [ 755.788279] ? mark_held_locks+0x130/0x130 [ 755.792521] ? plist_check_head+0xea/0x150 [ 755.796769] ? plist_check_list+0xa0/0xa0 [ 755.800931] ? ext4_mark_inode_dirty+0xb30/0xb30 [ 755.805703] ? lock_downgrade+0x840/0x900 [ 755.809865] ? mark_held_locks+0x130/0x130 [ 755.814108] ? lock_downgrade+0x900/0x900 [ 755.818268] ? do_raw_spin_unlock+0xa7/0x2f0 [ 755.822686] ? ___might_sleep+0x1ed/0x300 [ 755.826841] ? arch_local_save_flags+0x40/0x40 [ 755.831434] ? do_raw_spin_unlock+0xa7/0x2f0 [ 755.835847] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 755.840443] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 755.845984] ? iget_locked+0x1ac/0x5b0 [ 755.849879] ? inode_insert5+0x540/0x540 [ 755.853950] ? lock_downgrade+0x900/0x900 [ 755.858102] ? lock_downgrade+0x900/0x900 [ 755.862259] ? lock_release+0x970/0x970 [ 755.866237] ? kasan_check_read+0x11/0x20 [ 755.870393] ? do_raw_spin_unlock+0xa7/0x2f0 [ 755.874823] ? lock_acquire+0x1ed/0x520 [ 755.878809] ? lock_two_nondirectories+0xdd/0x120 [ 755.883660] ? lock_release+0x970/0x970 [ 755.887638] ? arch_local_save_flags+0x40/0x40 [ 755.892233] ? down_write_nested+0x8e/0x130 [ 755.896564] ? lock_two_nondirectories+0xdd/0x120 [ 755.901412] ? _down_write_nest_lock+0x130/0x130 [ 755.906174] ? security_capable+0x99/0xc0 [ 755.910336] truncate_inode_pages+0x24/0x30 [ 755.914661] ext4_ioctl+0x1e3b/0x4210 [ 755.918473] ? ext4_ioctl_group_add+0x560/0x560 [ 755.923146] ? mark_held_locks+0x130/0x130 [ 755.927391] ? do_futex+0x249/0x26d0 [ 755.931106] ? up_write+0x7b/0x220 [ 755.934652] ? up_read+0x110/0x110 [ 755.938203] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 755.943760] ? __generic_file_write_iter+0x1bd/0x630 [ 755.948873] ? exit_robust_list+0x280/0x280 [ 755.953198] ? ext4_file_write_iter+0x3b7/0x1420 [ 755.957968] ? __fget+0x4aa/0x740 [ 755.961426] ? lock_downgrade+0x900/0x900 [ 755.965587] ? rcu_read_unlock_special.part.39+0x11f0/0x11f0 [ 755.971394] ? ksys_dup3+0x680/0x680 [ 755.975115] ? __f_unlock_pos+0x19/0x20 [ 755.979097] ? __fget+0x4d1/0x740 [ 755.982566] ? ksys_dup3+0x680/0x680 [ 755.986294] ? __might_fault+0x12b/0x1e0 [ 755.990361] ? lock_downgrade+0x900/0x900 [ 755.994517] ? lock_release+0x970/0x970 [ 755.998496] ? arch_local_save_flags+0x40/0x40 [ 756.003088] ? ext4_ioctl_group_add+0x560/0x560 [ 756.007802] do_vfs_ioctl+0x1de/0x1720 [ 756.011700] ? ioctl_preallocate+0x300/0x300 [ 756.016120] ? memset+0x31/0x40 [ 756.019408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.024950] ? smack_file_ioctl+0x210/0x3c0 [ 756.029279] ? fget_raw+0x20/0x20 [ 756.032747] ? smack_file_lock+0x2e0/0x2e0 [ 756.036998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.042542] ? security_file_ioctl+0x94/0xc0 [ 756.046961] ksys_ioctl+0xa9/0xd0 [ 756.050424] __x64_sys_ioctl+0x73/0xb0 [ 756.054320] do_syscall_64+0x1b9/0x820 [ 756.058216] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 756.063588] ? syscall_return_slowpath+0x5e0/0x5e0 [ 756.068523] ? trace_hardirqs_on_caller+0x310/0x310 [ 756.073552] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 756.078574] ? recalc_sigpending_tsk+0x180/0x180 [ 756.083336] ? kasan_check_write+0x14/0x20 [ 756.087585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 756.092439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.097631] RIP: 0033:0x457579 [ 756.100831] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 756.119730] RSP: 002b:00007fa151655c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 756.127452] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457579 [ 756.134719] RDX: 0000000020000000 RSI: 0000000000006611 RDI: 0000000000000006 [ 756.141994] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 756.149267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1516566d4 [ 756.156538] R13: 00000000004bf60e R14: 00000000004cf4a8 R15: 00000000ffffffff [ 756.164689] Kernel Offset: disabled [ 756.168310] Rebooting in 86400 seconds..