Extracting prog: 34.722111444s Minimizing prog: 18m8.469698214s Simplifying prog options: 0s Extracting C: 1m26.603713206s Simplifying C: 8m28.966930311s extracting reproducer from 30 programs first checking the prog from the crash report single: executing 1 programs separately with timeout 30s testing program (duration=30s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program crashed: WARNING in mark_buffer_dirty single: successfully extracted reproducer found reproducer with 7 syscalls minimizing guilty program testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) pwrite64(0xffffffffffffffff, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, 0x0, 0x0, 0xe7c) program did not crash testing program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140), 0x0, 0xe7c) program did not crash extracting C reproducer testing compiled C program (duration=45.187317972s, {Threaded:true Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 program crashed: WARNING in mark_buffer_dirty simplifying C reproducer testing compiled C program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:5 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 program crashed: WARNING in mark_buffer_dirty testing compiled C program (duration=45.187317972s, {Threaded:false Repeat:false RepeatTimes:0 Procs:1 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:false Cgroups:false BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 program did not crash testing compiled C program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:true Wifi:true IEEE802154:true Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 program crashed: WARNING in mark_buffer_dirty testing compiled C program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:true Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 program crashed: WARNING in mark_buffer_dirty testing compiled C program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 program crashed: WARNING in mark_buffer_dirty testing compiled C program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 program did not crash testing compiled C program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 program crashed: WARNING in mark_buffer_dirty testing compiled C program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:true HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 program crashed: WARNING in mark_buffer_dirty testing program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:true HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program crashed: WARNING in mark_buffer_dirty validation run: crashed=true testing program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:true HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program crashed: WARNING in mark_buffer_dirty validation run: crashed=true testing program (duration=45.187317972s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:1 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:true HandleSegv:false Trace:false CallComments:true LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): syz_mount_image$bfs-openat$cgroup_ro-openat-write$uinput_user_dev-write$RDMA_USER_CM_CMD_NOTIFY-openat-pwrite64 detailed listing: executing program 0: syz_mount_image$bfs(&(0x7f0000000000), &(0x7f0000000240)='./bus\x00', 0x8008, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0xf, 0xab, &(0x7f0000010140)="$eJzs1zGKwkAYBeB/s7CbdptFsLBO4x08ilhqI1aK4A3Ei3gVj5DewiKtiCOYiIidRQT5vmLgzWPgtbM7brubIiKtIlLRme7T3Wy+GA8n9Rl8pCwifiMij4jeX50Pg7r7avqyWo7K6vv58c+69b0AAMDrsug/5nNqLk7NL/Aa/m993vI+AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgHe7BAAA//+dfyiL") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x101142, 0xeaff) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz0\x00', {0x7, 0x5, 0x6, 0x8}, 0x1d, [0x2, 0xc95a, 0x6, 0x9, 0x7f, 0x401, 0x4, 0x7f, 0x0, 0xfffffff9, 0xfffffff2, 0x5f, 0xa, 0x3, 0xffff2d3b, 0x1dd2, 0x5, 0x7, 0x0, 0x80000000, 0x4, 0x7, 0x80000001, 0x3c5b, 0x3, 0x24, 0xffffffff, 0xfffffffe, 0x1f461e2c, 0x2, 0xe661, 0x2, 0x9, 0x5, 0x7fff, 0x4c74, 0x23, 0x4, 0x7, 0xa, 0x7f, 0x71, 0x7, 0x8, 0x3, 0x0, 0x5, 0x40, 0x91, 0x6, 0xfffffff9, 0x3, 0xb, 0x4, 0x8, 0x0, 0x80, 0x0, 0xa, 0x6, 0x8, 0xfffffff9, 0x3, 0x40], [0x10000007, 0xc, 0x12f, 0x8000, 0x10, 0x8, 0x129432e2, 0xf, 0xf9, 0x3, 0x2bf, 0x6c9, 0x9, 0xfffffffe, 0x3, 0x7691, 0xe4, 0x5, 0x80, 0xe, 0x312, 0x8000, 0xea4, 0xa, 0x4, 0x4000, 0x8000, 0xb, 0x401, 0x39f, 0x6, 0xfffffffd, 0x100, 0x1005, 0x2, 0x5f31, 0x3, 0x0, 0x5, 0x8, 0x9, 0x4, 0x7fff, 0x8, 0x9, 0x3ff, 0x5, 0x0, 0x1, 0x8000, 0x6, 0x2, 0x7f, 0x9, 0x5, 0x8, 0x8, 0x1, 0x7, 0xb, 0x9, 0x48c92690, 0x6, 0xff], [0x7, 0x6, 0x4, 0x64e, 0xfffffdfe, 0x80010002, 0x8d2, 0x9, 0x2, 0x7eff, 0x0, 0x5, 0xb, 0x0, 0x4000005, 0x5, 0x0, 0x1ef, 0x5, 0x7f, 0x86, 0x8001, 0x10000009, 0x3e7, 0x80000b, 0x5, 0x2, 0x2, 0xf, 0x8, 0x4, 0x6d01, 0x5, 0x3b, 0x200, 0x200, 0x7, 0x3, 0xfffffffe, 0x15, 0x0, 0x60000000, 0x6, 0x53cf697b, 0x5, 0x6, 0x54fe12d0, 0x0, 0x200, 0xffffffff, 0x400002, 0xfffffff9, 0x0, 0x6, 0x5, 0x0, 0x6, 0x3e, 0x120000, 0x3, 0x6, 0x9, 0x4, 0x800], [0x2, 0xbb2f, 0x0, 0x7, 0x5, 0x938, 0x6, 0x6, 0x0, 0x5, 0xce7, 0x1ff, 0x6, 0x401, 0x7, 0x3, 0x800, 0x10000, 0x6, 0x7fff, 0x8ffff, 0x5, 0x2, 0x5, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x5, 0xffffffff, 0x7fff7ffe, 0x5, 0x8, 0xc8, 0x3, 0x3, 0x6, 0x0, 0x8, 0x100, 0x4, 0x7fff, 0x2, 0x9, 0x6, 0x100, 0x10000, 0x5, 0x184d99e8, 0x2b91, 0xa1f, 0x7d, 0x9, 0x1, 0x6c1b, 0x0, 0x4, 0x28, 0xb1c, 0x4c400000, 0x200, 0xff, 0xfff]}, 0x45c) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000bc0)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x11}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x15) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xe7c) program crashed: WARNING in mark_buffer_dirty validation run: crashed=true reproducing took 32m29.907669067s repro crashed as (corrupted=false): loop0: detected capacity change from 0 to 64 ------------[ cut here ]------------ WARNING: CPU: 1 PID: 4371 at fs/buffer.c:1084 mark_buffer_dirty+0x318/0x490 fs/buffer.c:1084 Modules linked in: CPU: 1 PID: 4371 Comm: syz.0.17 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:mark_buffer_dirty+0x318/0x490 fs/buffer.c:1084 Code: 89 f7 e8 4b 7b e6 ff 49 8b 3e be 04 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d e9 84 cf fc ff e8 0f 13 a2 ff eb 80 e8 08 13 a2 ff <0f> 0b e9 33 fd ff ff e8 fc 12 a2 ff 0f 0b e9 55 fd ff ff e8 f0 12 RSP: 0018:ffffc900030cf7c8 EFLAGS: 00010293 RAX: ffffffff81d5b908 RBX: ffff888020b46488 RCX: ffff88807beb3b80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff888074140018 R08: dffffc0000000000 R09: ffffed100d4265c0 R10: 0000000000000000 R11: 0000000000000040 R12: ffff88806a6f1200 R13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff11004168c91 FS: 000055555d307500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f797600c000 CR3: 0000000071d62000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bfs_move_block fs/bfs/file.c:43 [inline] bfs_move_blocks fs/bfs/file.c:56 [inline] bfs_get_block+0x814/0xa60 fs/bfs/file.c:125 __block_write_begin_int+0x54e/0x15a0 fs/buffer.c:2012 __block_write_begin fs/buffer.c:2062 [inline] block_write_begin+0x4d/0xc0 fs/buffer.c:2122 bfs_write_begin+0x37/0xd0 fs/bfs/file.c:177 generic_perform_write+0x2aa/0x530 mm/filemap.c:3785 __generic_file_write_iter+0x25f/0x4e0 mm/filemap.c:3912 generic_file_write_iter+0xa6/0x1b0 mm/filemap.c:3944 call_write_iter include/linux/fs.h:2173 [inline] new_sync_write fs/read_write.c:507 [inline] vfs_write+0x712/0xd00 fs/read_write.c:594 ksys_pwrite64 fs/read_write.c:701 [inline] __do_sys_pwrite64 fs/read_write.c:711 [inline] __se_sys_pwrite64 fs/read_write.c:708 [inline] __x64_sys_pwrite64+0x194/0x220 fs/read_write.c:708 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f3fc4002749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffda5977808 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 RAX: ffffffffffffffda RBX: 00007f3fc4258fa0 RCX: 00007f3fc4002749 RDX: 000000000000fdef RSI: 0000200000000140 RDI: 0000000000000006 RBP: 00007f3fc4086f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000e7c R11: 0000000000000246 R12: 0000000000000000 R13: 00007f3fc4258fa0 R14: 00007f3fc4258fa0 R15: 0000000000000004 final repro crashed as (corrupted=false): loop0: detected capacity change from 0 to 64 ------------[ cut here ]------------ WARNING: CPU: 1 PID: 4371 at fs/buffer.c:1084 mark_buffer_dirty+0x318/0x490 fs/buffer.c:1084 Modules linked in: CPU: 1 PID: 4371 Comm: syz.0.17 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:mark_buffer_dirty+0x318/0x490 fs/buffer.c:1084 Code: 89 f7 e8 4b 7b e6 ff 49 8b 3e be 04 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d e9 84 cf fc ff e8 0f 13 a2 ff eb 80 e8 08 13 a2 ff <0f> 0b e9 33 fd ff ff e8 fc 12 a2 ff 0f 0b e9 55 fd ff ff e8 f0 12 RSP: 0018:ffffc900030cf7c8 EFLAGS: 00010293 RAX: ffffffff81d5b908 RBX: ffff888020b46488 RCX: ffff88807beb3b80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff888074140018 R08: dffffc0000000000 R09: ffffed100d4265c0 R10: 0000000000000000 R11: 0000000000000040 R12: ffff88806a6f1200 R13: dffffc0000000000 R14: 0000000000000000 R15: 1ffff11004168c91 FS: 000055555d307500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f797600c000 CR3: 0000000071d62000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bfs_move_block fs/bfs/file.c:43 [inline] bfs_move_blocks fs/bfs/file.c:56 [inline] bfs_get_block+0x814/0xa60 fs/bfs/file.c:125 __block_write_begin_int+0x54e/0x15a0 fs/buffer.c:2012 __block_write_begin fs/buffer.c:2062 [inline] block_write_begin+0x4d/0xc0 fs/buffer.c:2122 bfs_write_begin+0x37/0xd0 fs/bfs/file.c:177 generic_perform_write+0x2aa/0x530 mm/filemap.c:3785 __generic_file_write_iter+0x25f/0x4e0 mm/filemap.c:3912 generic_file_write_iter+0xa6/0x1b0 mm/filemap.c:3944 call_write_iter include/linux/fs.h:2173 [inline] new_sync_write fs/read_write.c:507 [inline] vfs_write+0x712/0xd00 fs/read_write.c:594 ksys_pwrite64 fs/read_write.c:701 [inline] __do_sys_pwrite64 fs/read_write.c:711 [inline] __se_sys_pwrite64 fs/read_write.c:708 [inline] __x64_sys_pwrite64+0x194/0x220 fs/read_write.c:708 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f3fc4002749 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffda5977808 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 RAX: ffffffffffffffda RBX: 00007f3fc4258fa0 RCX: 00007f3fc4002749 RDX: 000000000000fdef RSI: 0000200000000140 RDI: 0000000000000006 RBP: 00007f3fc4086f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000e7c R11: 0000000000000246 R12: 0000000000000000 R13: 00007f3fc4258fa0 R14: 00007f3fc4258fa0 R15: 0000000000000004