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", 0x540}], 0x1) 08:12:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x25, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:55 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r0 = socket$inet6(0xa, 0x202000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@remote, 0x0, 0x2}, 0xfd74) [ 1789.400168][T20022] sel_write_load: 16 callbacks suppressed [ 1789.400174][T20022] SELinux: failed to load policy 08:12:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x40000000}, 0x0) 08:12:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000009800"/96], 0x60) [ 1789.460794][T20028] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 08:12:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:55 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x540}], 0x1) [ 1789.585711][T20033] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x7a, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1789.632081][T20041] SELinux: failed to load policy 08:12:55 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x540}], 0x1) 08:12:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x60000000}, 0x0) 08:12:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) syz_open_dev$sg(0x0, 0x0, 0x0) statfs(&(0x7f0000000000)='./bus\x00', &(0x7f0000000280)=""/231) 08:12:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000009900"/96], 0x60) 08:12:55 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x56d}], 0x1) 08:12:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1789.761353][T20052] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1789.843486][T20057] SELinux: failed to load policy [ 1789.854192][T20055] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:55 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x56d}], 0x1) 08:12:55 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)}], 0x1) 08:12:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x3, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000009a00"/96], 0x60) 08:12:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x65580000}, 0x0) 08:12:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1790.002459][T20070] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:55 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x56d}], 0x1) [ 1790.083438][T20074] SELinux: failed to load policy 08:12:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000080)) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000040)=0x1) 08:12:56 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x583}], 0x1) 08:12:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000009b00"/96], 0x60) 08:12:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x81000000}, 0x0) 08:12:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x5, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1790.230064][T20087] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1790.291357][T20091] SELinux: failed to load policy 08:12:56 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x583}], 0x1) 08:12:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:12:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x88a8ffff}, 0x0) 08:12:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000009c00"/96], 0x60) 08:12:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x6, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:56 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x583}], 0x1) [ 1790.452012][T20108] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:56 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x58e}], 0x1) [ 1790.499117][T20109] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1790.521394][T20115] SELinux: failed to load policy 08:12:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:12:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000009d00"/96], 0x60) 08:12:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x9d1b0000}, 0x0) 08:12:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x10, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1790.707354][T20127] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1790.746945][T20128] SELinux: failed to load policy 08:12:56 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x58e}], 0x1) 08:12:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1790.758868][T20130] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1790.791210][T20136] SELinux: failed to load policy 08:12:56 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x58e}], 0x1) 08:12:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x9effffff}, 0x0) 08:12:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000009e00"/96], 0x60) [ 1790.891536][T20143] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x14, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1790.972270][T20147] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:56 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x594}], 0x1) 08:12:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1791.013279][T20149] SELinux: failed to load policy 08:12:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf0ffffff}, 0x0) 08:12:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000009f00"/96], 0x60) [ 1791.111273][T20162] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x7a, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1791.158770][T20164] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:12:57 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="937bea33b6312053b346c270de2ba2f4d6d12406178d727a0573e4c2f81aff803f746ebe852e7e748c73ea33de12ba3dc712eaecc2157d2b6ee79293cc6511967bd14714f417f6ddbf37f751fcf559bad1205aa249650c3456dc28595ccdf265ef06cfd866da6fcc193208366d32355644cd1eb7cb5c8fae8744ff429748897b7b1cef4cf8e967d8e8f1fd8ed2902a071adad58a708611038c01edc0204699469e5cfddaf90dbcfe07a83cb3a4bca28d1218e1e8dd1a517eeb190dd4ea1186c8f73c9f5a93eb1fcc6a6148d2c62b22d5e694224a261f1bbf25b29e4e20115301784d4c952a9bcd912f93c1d3e4b3f0bbf62262dc27f5c3c729ba91a990c85b729bdfff44fc68d076c827f6f5760fc046ac14718e0d78639bf87777fa8a24fbe801410095f7919a710ef909c8838fbc8671a9a8bec349f08b5e9c2040fe90e2048c4d5a0dd72ec0a6fb6f34eb7e2800092f83682f94ed5acc13ac3edc94366f2ad0703c3d30628385cea3958f283a2ab7ef45cd4e5143df53153592cd0442a3ada91d3bb18154a6c7e3b562cb0662d5e6ac472f06d3ba15873dfb9c723c3a8477e4b531caae5f086e6691a3ff02abaa61c3b00ca8932e822cc68676374f65a5bd8e64690577fd8e38929e5290a5d8b8cd0489d875c62f261c1c0bd35b6558cb78ddd05a7b3828eda675270209b42ba7588c90feab2d738349e2be269c4656622a4b06fcd8d008a4e740d94495469f7aaf6ad88a850562a12eb50b4714cd0083286c832eaac84b3bd4b1899d96a19382b0fcabcb6ec8f9144c592e1f2d67c5b085581cd0cdefcc37bc924bbfae29bf48314e0f0a40d7144509567d7d701fcad4948419b61f61b5400e12d61d1c08362a46fcf57753caa3dd89f9b3658da928ba692b5d03527ccfb86cc6ff6971e0bf806bc09409fdc6ff7f15af75482e3017f850b8f35c231dca97d4bf354c996796f556983e577a30bb935f4a8febffccf5119a689389738302fb9c5ecfbce36985bcea8bad1b346106ab157d91e1ead92e5334eaf4d5d15f2e070f0e1999a5eb9060e553b35bcb024a2b7aa763e8224f4d7145b48a6bf8b9e9718bf21e72cb59e9e474432deed9f321868f004dae2fa7cd6772eb0a321e71242e0c8ffdde0e40f0d56abd8ece55c9e40b608650d7bea7f595fbfd4940f60a968a44e01a0103e05881a6a8bbf9f7c3b393617723f44f778431e3114e5307a8a88b0d314c72f47fe01080a8f6a8c397c45038868ad1a741031f2c87fc8a6ee46515eb83027be81d65ae2c12d41bc69c6d5a1608e7406702c2c30cb81aa1e02c87a57a84e361c656302027d42123f1107897ab81fd11e0d0d7c0c5c6d47b88ddb4416102e01e133af7ad00df35e1dab7635610d2f19dc1250d326507c65e9d8808ce8fcadf5ce84dae15007c19faa98b74b5450aab8cd6e07007449a847e0a2a0ab9920c4b62eacefaaf35f6c132fe263c1638116855c131ffa773d9ac3266d6815a182e53de5308609a6cfbc47ff94d97414b18635943660b69b33b1809077eb78a818789598cea4f4d218bfcf46d698edf6c0307b748594382ccada493c900679ad33abcb93beff2339cbb9bd359694ad74018796140f403097c04d7a0710fd29801c22420723bc4b41cd7536b5268f9b16e19a230e3aecdeb0748e3a20b93d329ed61c89669274af4121bc35a79f57190fbf8025481912ac5a5418b4185a65187aa829e1a1a17fb1dbdbb3d28462bba3d3b15686dc83bf560d85de3885eaa6fcf1c103b627d80a578f3f911c4259c071d7d05120d8dff45ffcef4d83d17732348747a5644f36cd5c6a082f2ffafc6be6a0321f74b2fe0e09417c88035b50122d87408ce4bbe46ede93220f5e0936c8296d7aa0f3eb7815c948560d095de2855a64f65b20944d3c6f1bc6796e30b52a93132e56faca9d95c9502abf6f4ae57db19d28b75d210323eb8c5f99b7d86eb87f69b21e9ec600856641fa6eeb9447d9857663ef687a130ca6dc60bd32c6a", 0x594}], 0x1) [ 1791.219575][T20166] SELinux: failed to load policy 08:12:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xffffa888}, 0x0) 08:12:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a000"/96], 0x60) [ 1791.290825][T20176] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x36d, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:57 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x594}], 0x1) 08:12:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1791.377580][T20181] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:12:57 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x597}], 0x1) 08:12:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xfffff000}, 0x0) 08:12:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a100"/96], 0x60) 08:12:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x3aa, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1791.546768][T20195] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:57 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x597}], 0x1) [ 1791.648484][T20202] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a200"/96], 0x60) 08:12:57 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x597}], 0x1) 08:12:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xffffff7f}, 0x0) [ 1791.760758][T20207] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a300"/96], 0x60) 08:12:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x2, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:57 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x598}], 0x1) 08:12:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1791.901037][T20223] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1791.963309][T20226] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:12:57 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="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", 0x598}], 0x1) [ 1792.039245][T20232] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a400"/96], 0x60) 08:12:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xffffff9e}, 0x0) 08:12:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x7f', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x3, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1792.185119][T20243] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a500"/96], 0x60) 08:12:58 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0xe518, 0x4) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0xfffffffffffffffe) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000002440)="937bea33b6312053b346c270de2ba2f4d6d12406178d727a0573e4c2f81aff803f746ebe852e7e748c73ea33de12ba3dc712eaecc2157d2b6ee79293cc6511967bd14714f417f6ddbf37f751fcf559bad1205aa249650c3456dc28595ccdf265ef06cfd866da6fcc193208366d32355644cd1eb7cb5c8fae8744ff429748897b7b1cef4cf8e967d8e8f1fd8ed2902a071adad58a708611038c01edc0204699469e5cfddaf90dbcfe07a83cb3a4bca28d1218e1e8dd1a517eeb190dd4ea1186c8f73c9f5a93eb1fcc6a6148d2c62b22d5e694224a261f1bbf25b29e4e20115301784d4c952a9bcd912f93c1d3e4b3f0bbf62262dc27f5c3c729ba91a990c85b729bdfff44fc68d076c827f6f5760fc046ac14718e0d78639bf87777fa8a24fbe801410095f7919a710ef909c8838fbc8671a9a8bec349f08b5e9c2040fe90e2048c4d5a0dd72ec0a6fb6f34eb7e2800092f83682f94ed5acc13ac3edc94366f2ad0703c3d30628385cea3958f283a2ab7ef45cd4e5143df53153592cd0442a3ada91d3bb18154a6c7e3b562cb0662d5e6ac472f06d3ba15873dfb9c723c3a8477e4b531caae5f086e6691a3ff02abaa61c3b00ca8932e822cc68676374f65a5bd8e64690577fd8e38929e5290a5d8b8cd0489d875c62f261c1c0bd35b6558cb78ddd05a7b3828eda675270209b42ba7588c90feab2d738349e2be269c4656622a4b06fcd8d008a4e740d94495469f7aaf6ad88a850562a12eb50b4714cd0083286c832eaac84b3bd4b1899d96a19382b0fcabcb6ec8f9144c592e1f2d67c5b085581cd0cdefcc37bc924bbfae29bf48314e0f0a40d7144509567d7d701fcad4948419b61f61b5400e12d61d1c08362a46fcf57753caa3dd89f9b3658da928ba692b5d03527ccfb86cc6ff6971e0bf806bc09409fdc6ff7f15af75482e3017f850b8f35c231dca97d4bf354c996796f556983e577a30bb935f4a8febffccf5119a689389738302fb9c5ecfbce36985bcea8bad1b346106ab157d91e1ead92e5334eaf4d5d15f2e070f0e1999a5eb9060e553b35bcb024a2b7aa763e8224f4d7145b48a6bf8b9e9718bf21e72cb59e9e474432deed9f321868f004dae2fa7cd6772eb0a321e71242e0c8ffdde0e40f0d56abd8ece55c9e40b608650d7bea7f595fbfd4940f60a968a44e01a0103e05881a6a8bbf9f7c3b393617723f44f778431e3114e5307a8a88b0d314c72f47fe01080a8f6a8c397c45038868ad1a741031f2c87fc8a6ee46515eb83027be81d65ae2c12d41bc69c6d5a1608e7406702c2c30cb81aa1e02c87a57a84e361c656302027d42123f1107897ab81fd11e0d0d7c0c5c6d47b88ddb4416102e01e133af7ad00df35e1dab7635610d2f19dc1250d326507c65e9d8808ce8fcadf5ce84dae15007c19faa98b74b5450aab8cd6e07007449a847e0a2a0ab9920c4b62eacefaaf35f6c132fe263c1638116855c131ffa773d9ac3266d6815a182e53de5308609a6cfbc47ff94d97414b18635943660b69b33b1809077eb78a818789598cea4f4d218bfcf46d698edf6c0307b748594382ccada493c900679ad33abcb93beff2339cbb9bd359694ad74018796140f403097c04d7a0710fd29801c22420723bc4b41cd7536b5268f9b16e19a230e3aecdeb0748e3a20b93d329ed61c89669274af4121bc35a79f57190fbf8025481912ac5a5418b4185a65187aa829e1a1a17fb1dbdbb3d28462bba3d3b15686dc83bf560d85de3885eaa6fcf1c103b627d80a578f3f911c4259c071d7d05120d8dff45ffcef4d83d17732348747a5644f36cd5c6a082f2ffafc6be6a0321f74b2fe0e09417c88035b50122d87408ce4bbe46ede93220f5e0936c8296d7aa0f3eb7815c948560d095de2855a64f65b20944d3c6f1bc6796e30b52a93132e56faca9d95c9502abf6f4ae57db19d28b75d210323eb8c5f99b7d86eb87f69b21e9ec600856641fa6eeb9447d9857663ef687a130ca6dc60bd32c6a551b331f", 0x598}], 0x1) [ 1792.234986][T20246] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:12:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xfffffff0}, 0x0) 08:12:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1792.351481][T20248] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a600"/96], 0x60) [ 1792.393163][T20262] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x4, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1792.466267][T20266] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:12:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xe0', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf0ffffffffffff}, 0x0) [ 1792.512755][T20266] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1792.554710][T20272] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 08:12:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:12:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a700"/96], 0x60) [ 1792.600963][T20275] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x5, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:12:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x100000000000000}, 0x0) [ 1792.717575][T20286] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1792.745655][T20286] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:12:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a800"/96], 0x60) 08:12:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1792.769193][T20290] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 08:12:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x6, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1792.844873][T20294] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:12:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x200000000000000}, 0x0) 08:12:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000a900"/96], 0x60) [ 1792.952856][T20307] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1792.988910][T20307] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:12:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1793.010720][T20308] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1793.046661][T20314] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x7, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1793.107082][T20311] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x300000000000000}, 0x0) 08:12:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1793.151869][T20319] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1793.182276][T20319] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:12:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000aa00"/96], 0x60) [ 1793.223187][T20328] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1793.270329][T20322] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 08:12:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1793.317692][T20333] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:12:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x9, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ab00"/96], 0x60) 08:12:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x400000000000000}, 0x0) [ 1793.386691][T20337] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1793.444995][T20338] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:12:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1793.487974][T20338] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1793.510353][T20347] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:12:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ac00"/96], 0x60) [ 1793.608248][T20351] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1793.634288][T20353] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0xa, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1793.672461][T20355] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1793.701935][T20355] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:12:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:12:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x500000000000000}, 0x0) 08:12:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ad00"/96], 0x60) 08:12:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1793.794796][T20364] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:12:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x5, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1793.880029][T20372] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1793.906241][T20372] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:12:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0xb, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1793.943881][T20373] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:12:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:12:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:12:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ae00"/96], 0x60) [ 1793.988120][T20374] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1794.019637][T20381] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:12:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x600000000000000}, 0x0) 08:13:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0xc, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1794.130529][T20392] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1794.152539][T20387] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1794.233742][T20387] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1794.275761][T20395] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1794.308458][T20397] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:13:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x700000000000000}, 0x0) [ 1794.392209][T20399] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1794.416894][T20406] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000af00"/96], 0x60) 08:13:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0xd, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1794.443065][T20406] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x8, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1794.486431][T20409] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xa00000000000000}, 0x0) [ 1794.538915][T20415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1794.557198][T20414] sel_write_load: 17 callbacks suppressed [ 1794.557206][T20414] SELinux: failed to load policy 08:13:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b000"/96], 0x60) 08:13:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x9, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1794.650425][T20417] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1794.679566][T20427] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0xe, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1794.766116][T20473] SELinux: failed to load policy 08:13:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xc00000000000000}, 0x0) 08:13:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1794.813060][T20535] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:13:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b100"/96], 0x60) 08:13:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xa, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x10, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1794.917997][T20539] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1794.950364][T20541] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1794.954704][T20544] SELinux: failed to load policy 08:13:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xe00000000000000}, 0x0) [ 1795.040268][T20552] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:13:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b200"/96], 0x60) 08:13:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xb, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1795.210494][T20647] SELinux: failed to load policy [ 1795.215744][T20560] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1795.236778][T20639] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x11, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b300"/96], 0x60) 08:13:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x1000000000000000}, 0x0) 08:13:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x10, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1795.348276][T20671] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1795.385986][T20671] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1795.428012][T20677] SELinux: failed to load policy [ 1795.433259][T20679] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:13:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b400"/96], 0x60) [ 1795.486602][T20680] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1795.504161][T20686] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x3f00000000000000}, 0x0) [ 1795.555077][T20689] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x12, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x23, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1795.624888][T20689] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1795.656051][T20695] SELinux: failed to load policy [ 1795.670501][T20693] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1795.705726][T20698] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:13:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b500"/96], 0x60) 08:13:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1795.728898][T20701] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:13:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x48, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1795.843920][T20706] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1795.882431][T20711] SELinux: failed to load policy 08:13:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4000000000000000}, 0x0) 08:13:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x13, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1795.892917][T20706] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1795.913904][T20712] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:13:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b600"/96], 0x60) 08:13:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1795.974372][T20715] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1796.019257][T20720] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:13:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4c, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x14, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1796.089624][T20724] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6000000000000000}, 0x0) [ 1796.136336][T20724] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1796.147572][T20729] SELinux: failed to load policy [ 1796.185316][T20728] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:13:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b700"/96], 0x60) 08:13:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x2f, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1796.262445][T20737] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6558000000000000}, 0x0) [ 1796.349242][T20742] SELinux: failed to load policy 08:13:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x68, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1796.374638][T20746] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1796.399278][T20746] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1796.422469][T20747] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:13:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b800"/96], 0x60) 08:13:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6c, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x7a, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1796.544153][T20753] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1796.583085][T20758] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x8100000000000000}, 0x0) [ 1796.658960][T20758] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1796.680356][T20763] SELinux: failed to load policy [ 1796.686184][T20765] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:13:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000b900"/96], 0x60) [ 1796.759480][T20772] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x600, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x88a8ffff00000000}, 0x0) 08:13:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x74, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1796.868756][T20776] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:13:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1796.957346][T20782] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1796.988699][T20782] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ba00"/96], 0x60) 08:13:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1797.034156][T20787] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1797.064904][T20792] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1797.101400][T20785] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1797.137536][T20794] (unnamed net_device) (uninitialized): option primary: mode dependency failed, not supported in mode balance-rr(0) 08:13:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x9d1b000000000000}, 0x0) [ 1797.164783][T20799] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x10, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7a, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1797.211210][T20799] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000bb00"/96], 0x60) [ 1797.275299][T20802] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1797.308319][T20806] netlink: 'syz-executor.1': attribute type 16 has an invalid length. 08:13:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1797.368101][T20804] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000bc00"/96], 0x60) [ 1797.444723][T20816] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:13:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x9effffff00000000}, 0x0) 08:13:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xe0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1797.484380][T20819] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1797.543100][T20819] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1797.572727][T20823] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1797.587506][T20823] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1797.625527][T20831] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) [ 1797.640171][T20833] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x1b, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:03 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x300, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1797.718076][T20835] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000bd00"/96], 0x60) [ 1797.766609][T20835] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1797.794117][T20837] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 08:13:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf0ffffff00000000}, 0x0) 08:13:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1797.812888][T20837] (unnamed net_device) (uninitialized): option tlb_dynamic_lb: mode dependency failed, not supported in mode balance-rr(0) 08:13:03 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x25, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000be00"/96], 0x60) [ 1797.915555][T20848] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1797.973661][T20850] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x500, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1798.019536][T20850] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xffffff7f00000000}, 0x0) 08:13:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x7a, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000bf00"/96], 0x60) 08:13:04 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1798.167467][T20868] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x600, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1798.221385][T20868] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1798.237123][T20875] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, 0x0, 0x0) 08:13:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xffffffff00000000}, 0x0) 08:13:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c000"/96], 0x60) 08:13:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x595, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, 0x0, 0x0) [ 1798.415253][T20885] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1798.447433][T20885] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1798.495246][T20892] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x700, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c100"/96], 0x60) 08:13:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xfffffffffffff000}, 0x0) 08:13:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x7b18, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, 0x0, 0x0) [ 1798.655791][T20903] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1798.677850][T20903] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1798.717042][T20907] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c200"/96], 0x60) 08:13:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x900, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x2}, 0x0) 08:13:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x98103, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 08:13:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c300"/96], 0x60) [ 1798.900054][T20920] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1798.955181][T20920] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3}, 0x0) 08:13:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xffffffffffffffff, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c400"/96], 0x60) 08:13:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1799.103093][T20938] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xa00, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1799.152196][T20938] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4}, 0x0) 08:13:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c500"/96], 0x60) 08:13:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 08:13:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x5}, 0x0) 08:13:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c600"/96], 0x60) [ 1799.357114][T20962] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 08:13:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xb00, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1799.419075][T20962] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:13:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c700"/96], 0x60) [ 1799.482509][T20969] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (2) 08:13:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000004}]}}}]}, 0x3c}}, 0x0) 08:13:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6}, 0x0) 08:13:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:13:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf24, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1799.593476][T20981] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1799.609214][T20981] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1799.664210][T20988] sel_write_load: 14 callbacks suppressed [ 1799.664217][T20988] SELinux: failed to load policy 08:13:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 1799.704957][T20987] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (4) 08:13:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7}, 0x0) 08:13:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c800"/96], 0x60) 08:13:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff0000000a}]}}}]}, 0x3c}}, 0x0) 08:13:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) [ 1799.833343][T20999] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1799.858370][T20999] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1799.878079][T21003] SELinux: failed to load policy 08:13:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1020, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xa}, 0x0) 08:13:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1799.904446][T21005] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (10) 08:13:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000c900"/96], 0x60) 08:13:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff0000000f}]}}}]}, 0x3c}}, 0x0) [ 1800.035201][T21013] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1800.073708][T21013] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 1800.096039][T21020] SELinux: failed to load policy 08:13:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1800.117673][T21024] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (15) 08:13:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000002}]}}}]}, 0x3c}}, 0x0) 08:13:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xc}, 0x0) 08:13:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000010}]}}}]}, 0x3c}}, 0x0) 08:13:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ca00"/96], 0x60) 08:13:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) [ 1800.281670][T21034] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 1800.300371][T21034] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 08:13:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xe}, 0x0) 08:13:06 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1800.334055][T21039] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (16) [ 1800.350971][T21043] SELinux: failed to load policy 08:13:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff00000014}]}}}]}, 0x3c}}, 0x0) 08:13:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000cb00"/96], 0x60) 08:13:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x10}, 0x0) 08:13:06 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1800.516948][T21055] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (20) [ 1800.556471][T21057] SELinux: failed to load policy 08:13:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff02000000}]}}}]}, 0x3c}}, 0x0) 08:13:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000cc00"/96], 0x60) 08:13:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x60}, 0x0) 08:13:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2010, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:06 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1800.687935][T21066] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (33554432) [ 1800.757023][T21073] SELinux: failed to load policy 08:13:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0}, 0x0) 08:13:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, 0x0, 0x0) 08:13:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff04000000}]}}}]}, 0x3c}}, 0x0) 08:13:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000cd00"/96], 0x60) 08:13:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2300, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x300}, 0x0) [ 1800.917931][T21085] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (67108864) [ 1800.949073][T21090] SELinux: failed to load policy 08:13:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, 0x0, 0x0) 08:13:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff05f5e0ff}]}}}]}, 0x3c}}, 0x0) 08:13:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ce00"/96], 0x60) 08:13:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x500}, 0x0) [ 1801.098655][T21103] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (99999999) 08:13:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x240f, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff0f000000}]}}}]}, 0x3c}}, 0x0) [ 1801.151794][T21106] SELinux: failed to load policy 08:13:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, 0x0, 0x0) 08:13:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000cf00"/96], 0x60) 08:13:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x600}, 0x0) [ 1801.268054][T21117] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (251658240) 08:13:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff10000000}]}}}]}, 0x3c}}, 0x0) [ 1801.362738][T21123] SELinux: failed to load policy 08:13:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 08:13:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d000"/96], 0x60) [ 1801.491186][T21136] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (268435456) 08:13:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x700}, 0x0) 08:13:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0) 08:13:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1801.580506][T21140] SELinux: failed to load policy 08:13:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffff14000000}]}}}]}, 0x3c}}, 0x0) 08:13:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d100"/96], 0x60) 08:13:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xa00}, 0x0) 08:13:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1801.724003][T21155] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (335544320) 08:13:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0) 08:13:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0fffffeffffff}]}}}]}, 0x3c}}, 0x0) 08:13:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d200"/96], 0x60) 08:13:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4800, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xc00}, 0x0) 08:13:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 1801.940341][T21167] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073692774399) 08:13:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa}]}}}]}, 0x3c}}, 0x0) 08:13:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffff000a}]}}}]}, 0x3c}}, 0x0) 08:13:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xe00}, 0x0) 08:13:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d300"/96], 0x60) 08:13:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:13:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1802.148637][T21184] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709486090) 08:13:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffff0a}]}}}]}, 0x3c}}, 0x0) 08:13:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x1b9d}, 0x0) 08:13:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d400"/96], 0x60) 08:13:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 1802.305281][T21197] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551370) [ 1802.359510][T21201] (unnamed net_device) (uninitialized): option primary: mode dependency failed, not supported in mode balance-rr(0) 08:13:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6800, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0fffffffffffe}]}}}]}, 0x3c}}, 0x0) 08:13:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3f00}, 0x0) 08:13:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d500"/96], 0x60) 08:13:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1802.500219][T21212] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551614) 08:13:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x9}}, 0x0) 08:13:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1802.607823][T21222] (unnamed net_device) (uninitialized): option primary: mode dependency failed, not supported in mode balance-rr(0) 08:13:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4000}, 0x0) 08:13:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d600"/96], 0x60) 08:13:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0xf}}, 0x0) 08:13:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x5865}, 0x0) 08:13:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d700"/96], 0x60) 08:13:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x10}}, 0x0) [ 1802.859389][T21239] (unnamed net_device) (uninitialized): option primary: mode dependency failed, not supported in mode balance-rr(0) 08:13:08 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6000}, 0x0) 08:13:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7400, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d800"/96], 0x60) 08:13:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x7a}}, 0x0) 08:13:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:08 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6558}, 0x0) 08:13:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000d900"/96], 0x60) [ 1803.154099][T21265] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:09 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0xc0}}, 0x0) 08:13:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x8100}, 0x0) 08:13:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000da00"/96], 0x60) [ 1803.359753][T21281] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:09 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0xec0}}, 0x0) 08:13:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x9d1b}, 0x0) 08:13:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000db00"/96], 0x60) 08:13:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xe0ff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1803.527351][T21294] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:09 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 08:13:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x33fe0}}, 0x0) 08:13:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000dc00"/96], 0x60) 08:13:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf000}, 0x0) 08:13:09 executing program 0: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1803.705518][T21312] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x200005fc}}, 0x0) 08:13:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffff}, 0x0) 08:13:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:13:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x7ffff000}}, 0x0) 08:13:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000dd00"/96], 0x60) 08:13:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0xfffffdef}}, 0x0) 08:13:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x1000000}, 0x0) 08:13:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000de00"/96], 0x60) 08:13:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 08:13:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x2}, 0x0) 08:13:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x2000000}, 0x0) 08:13:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000df00"/96], 0x60) 08:13:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 1804.301704][T21358] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x3}, 0x0) 08:13:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3000000}, 0x0) 08:13:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xffe0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e000"/96], 0x60) 08:13:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1804.583268][T21378] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x40000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 08:13:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4000000}, 0x0) 08:13:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x5}, 0x0) 08:13:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e100"/96], 0x60) 08:13:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x5000000}, 0x0) [ 1804.860179][T21401] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1804.908601][T21403] sel_write_load: 19 callbacks suppressed [ 1804.908609][T21403] SELinux: failed to load policy 08:13:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x100000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x6}, 0x0) [ 1804.955112][T21399] SELinux: failed to load policy 08:13:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:13:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e200"/96], 0x60) 08:13:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6000000}, 0x0) [ 1805.098177][T21416] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x8}, 0x0) [ 1805.197791][T21420] SELinux: failed to load policy 08:13:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e300"/96], 0x60) 08:13:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:13:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x400000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7000000}, 0x0) [ 1805.390515][T21433] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1805.445196][T21434] SELinux: failed to load policy 08:13:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:13:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0xb}, 0x0) 08:13:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e400"/96], 0x60) 08:13:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xa000000}, 0x0) [ 1805.589486][T21446] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1805.681221][T21454] SELinux: failed to load policy 08:13:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x10}, 0x0) 08:13:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e500"/96], 0x60) 08:13:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xc000000}, 0x0) 08:13:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1805.830700][T21465] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xe000000}, 0x0) [ 1805.904910][T21467] SELinux: failed to load policy 08:13:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x14}, 0x0) 08:13:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e600"/96], 0x60) 08:13:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 1806.011770][T21478] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x39}, 0x0) [ 1806.106756][T21485] SELinux: failed to load policy 08:13:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x10000000}, 0x0) 08:13:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e700"/96], 0x60) [ 1806.178955][T21491] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x7a}, 0x0) [ 1806.310416][T21500] SELinux: failed to load policy 08:13:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3f000000}, 0x0) 08:13:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e800"/96], 0x60) 08:13:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x300}, 0x0) [ 1806.512833][T21515] SELinux: failed to load policy 08:13:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x40000000}, 0x0) 08:13:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x7900}, 0x0) 08:13:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000e900"/96], 0x60) 08:13:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x60000000}, 0x0) [ 1806.755333][T21534] SELinux: failed to load policy 08:13:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x7ffffff2}, 0x0) 08:13:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ea00"/96], 0x60) 08:13:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x65580000}, 0x0) 08:13:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x7ffffff8}, 0x0) 08:13:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000eb00"/96], 0x60) 08:13:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x81000000}, 0x0) 08:13:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x7ffffff9}, 0x0) 08:13:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0xffffff1f}, 0x0) 08:13:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ec00"/96], 0x60) 08:13:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x88a8ffff}, 0x0) 08:13:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x2}, 0x0) 08:13:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ed00"/96], 0x60) 08:13:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x9d1b0000}, 0x0) 08:13:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1807.587108][T21598] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:13 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xb}]}}}]}, 0x3c}}, 0x0) 08:13:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x3}, 0x0) 08:13:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ee00"/96], 0x60) 08:13:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x9effffff}, 0x0) 08:13:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1807.765723][T21613] (unnamed net_device) (uninitialized): option primary: mode dependency failed, not supported in mode balance-rr(0) [ 1807.824738][T21616] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ef00"/96], 0x60) 08:13:13 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffffff}, 0x0) 08:13:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4}, 0x0) 08:13:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:13 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f000"/96], 0x60) 08:13:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xffffa888}, 0x0) [ 1808.086248][T21632] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x5}, 0x0) 08:13:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffff000}, 0x0) 08:13:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f100"/96], 0x60) [ 1808.317254][T21651] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6}, 0x0) 08:13:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xffffff7f}, 0x0) 08:13:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f200"/96], 0x60) 08:13:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xb000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) [ 1808.553314][T21670] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xffffff9e}, 0x0) 08:13:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f300"/96], 0x60) 08:13:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x7}, 0x0) 08:13:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 1808.807666][T21692] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f400"/96], 0x60) 08:13:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf}, 0x0) 08:13:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000040)=0x1) 08:13:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000040)=0x1) [ 1809.025853][T21711] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 08:13:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f500"/96], 0x60) 08:13:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x48}, 0x0) 08:13:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000040)=0x1) 08:13:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x100000000000000}, 0x0) 08:13:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) [ 1809.212726][T21727] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4c}, 0x0) 08:13:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f600"/96], 0x60) 08:13:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 1809.424701][T21739] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x60}, 0x0) 08:13:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f700"/96], 0x60) 08:13:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x300000000000000}, 0x0) 08:13:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x20100000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1809.675196][T21759] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x68}, 0x0) 08:13:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f800"/96], 0x60) 08:13:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x400000000000000}, 0x0) 08:13:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1809.895539][T21778] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:15 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000f900"/96], 0x60) 08:13:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x500000000000000}, 0x0) 08:13:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6c}, 0x0) 08:13:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1810.124505][T21792] sel_write_load: 16 callbacks suppressed [ 1810.124513][T21792] SELinux: failed to load policy 08:13:16 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x600000000000000}, 0x0) [ 1810.200360][T21796] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000fa00"/96], 0x60) 08:13:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x240f0000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x74}, 0x0) 08:13:16 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x700000000000000}, 0x0) [ 1810.410180][T21813] SELinux: failed to load policy 08:13:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1810.431861][T21814] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x7a}, 0x0) 08:13:16 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000fb00"/96], 0x60) 08:13:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xa00000000000000}, 0x0) [ 1810.635491][T21826] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf0}, 0x0) 08:13:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:16 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) [ 1810.887253][T21835] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1810.921724][T21833] SELinux: failed to load policy 08:13:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x300}, 0x0) 08:13:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xc00000000000000}, 0x0) 08:13:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000fc00"/96], 0x60) 08:13:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1811.072987][T21846] SELinux: failed to load policy 08:13:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000fd00"/96], 0x60) [ 1811.141004][T21853] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x500}, 0x0) 08:13:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xe00000000000000}, 0x0) 08:13:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1811.341463][T21864] SELinux: failed to load policy 08:13:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000fe00"/96], 0x60) [ 1811.399882][T21870] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x600}, 0x0) 08:13:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x1000000000000000}, 0x0) [ 1811.528318][T21881] SELinux: failed to load policy 08:13:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 08:13:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000040)=0x1) 08:13:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000000ff00"/96], 0x60) [ 1811.657426][T21890] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x700}, 0x0) [ 1811.783159][T21900] SELinux: failed to load policy 08:13:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000040)=0x1) 08:13:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000cdd11800"/96], 0x60) 08:13:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4000000000000000}, 0x0) 08:13:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1811.846475][T21906] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf00}, 0x0) 08:13:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6000000000000000}, 0x0) [ 1811.974003][T21915] SELinux: failed to load policy 08:13:17 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, &(0x7f0000000040)=0x1) 08:13:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000f2ffff7f00"/96], 0x60) [ 1812.035451][T21921] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x2000}, 0x0) [ 1812.157653][T21929] SELinux: failed to load policy 08:13:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:18 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, 0x0) 08:13:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6558000000000000}, 0x0) 08:13:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000f8ffff7f00"/96], 0x60) [ 1812.256080][T21933] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:18 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, 0x0) 08:13:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x2839}, 0x0) [ 1812.388487][T21945] SELinux: failed to load policy 08:13:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x8100000000000000}, 0x0) 08:13:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000f9ffff7f00"/96], 0x60) [ 1812.465954][T21950] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x3928}, 0x0) 08:13:18 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, 0x0) 08:13:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) 08:13:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1812.750689][T21967] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000001fffffff00"/96], 0x60) 08:13:18 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)) 08:13:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x3f00}, 0x0) 08:13:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x9d1b000000000000}, 0x0) 08:13:18 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)) 08:13:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010200"/96], 0x60) 08:13:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1813.017342][T21985] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4000}, 0x0) 08:13:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 08:13:19 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)) [ 1813.297195][T21998] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 08:13:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010300"/96], 0x60) 08:13:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4800}, 0x0) 08:13:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010400"/96], 0x60) [ 1813.607285][T22019] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 08:13:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) 08:13:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xe0ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4c00}, 0x0) 08:13:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010500"/96], 0x60) 08:13:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000040)=0x1) [ 1813.895852][T22040] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:19 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 08:13:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010600"/96], 0x60) 08:13:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6000}, 0x0) 08:13:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) 08:13:19 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1814.116734][T22056] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) 08:13:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010700"/96], 0x60) 08:13:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 08:13:20 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6800}, 0x0) 08:13:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) 08:13:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, 0x0, 0x0) 08:13:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010a00"/96], 0x60) 08:13:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 1814.435535][T22081] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6c00}, 0x0) 08:13:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) 08:13:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, 0x0, 0x0) [ 1814.569933][T22088] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1814.628137][T22093] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000014800"/96], 0x60) 08:13:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3}, 0x0) 08:13:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x7400}, 0x0) 08:13:20 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) 08:13:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, 0x0, 0x0) 08:13:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000014c00"/96], 0x60) [ 1814.827542][T22111] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1814.864821][T22109] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:20 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) 08:13:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x7a00}, 0x0) 08:13:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 08:13:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 08:13:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000016000"/96], 0x60) [ 1815.006895][T22222] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:20 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) 08:13:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x8100}, 0x0) [ 1815.123011][T22228] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:21 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) [ 1815.189291][T22229] sel_write_load: 12 callbacks suppressed [ 1815.189298][T22229] SELinux: failed to load policy [ 1815.220452][T22232] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 08:13:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 08:13:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000016800"/96], 0x60) 08:13:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf000}, 0x0) 08:13:21 executing program 0: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) 08:13:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1815.375743][T22246] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1815.455702][T22250] SELinux: failed to load policy 08:13:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6}, 0x0) 08:13:21 executing program 0: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) [ 1815.500838][T22255] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000016c00"/96], 0x60) 08:13:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:13:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x34000}, 0x0) [ 1815.651066][T22261] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:21 executing program 0: openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0xffffffffffffffff) [ 1815.692242][T22266] SELinux: failed to load policy 08:13:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7}, 0x0) 08:13:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000017400"/96], 0x60) [ 1815.735068][T22271] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 08:13:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x40000}, 0x0) 08:13:21 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, 0x0) [ 1815.847059][T22278] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1815.904120][T22283] SELinux: failed to load policy 08:13:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xa}, 0x0) 08:13:21 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, 0x0) 08:13:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000017a00"/96], 0x60) [ 1815.985977][T22289] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x400300}, 0x0) 08:13:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 1816.125774][T22297] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:22 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, 0x0) [ 1816.169453][T22301] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1816.169458][T22302] SELinux: failed to load policy 08:13:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc}, 0x0) 08:13:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000300"/96], 0x60) 08:13:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf0ffff}, 0x0) 08:13:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1816.297867][T22309] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xe}, 0x0) 08:13:22 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)) 08:13:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1816.386050][T22318] SELinux: failed to load policy [ 1816.393438][T22320] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000500"/96], 0x60) 08:13:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x1000000}, 0x0) [ 1816.502721][T22325] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:22 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)) [ 1816.568270][T22332] SELinux: failed to load policy 08:13:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 08:13:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1816.622570][T22335] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000600"/96], 0x60) 08:13:22 executing program 0: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)) [ 1816.690975][T22338] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x2000000}, 0x0) 08:13:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) [ 1816.770046][T22345] SELinux: failed to load policy 08:13:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000700"/96], 0x60) 08:13:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x60}, 0x0) 08:13:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1816.879117][T22352] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xfe7ff7ffbfff3fbe, 0x0) socket$xdp(0x2c, 0x3, 0x0) [ 1816.968720][T22361] SELinux: failed to load policy [ 1816.979557][T22360] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x3000000}, 0x0) 08:13:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 08:13:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000a00"/96], 0x60) 08:13:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 1817.116620][T22368] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r1, 0xfe7ff7ffbfff3fbe, 0x0) socket$xdp(0x2c, 0x3, 0x0) 08:13:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4000000}, 0x0) 08:13:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1817.190334][T22375] SELinux: failed to load policy [ 1817.207989][T22376] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x300}, 0x0) 08:13:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001002000"/96], 0x60) 08:13:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1817.404872][T22385] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1817.428694][T22392] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 08:13:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x5000000}, 0x0) 08:13:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001003f00"/96], 0x60) 08:13:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x500}, 0x0) 08:13:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffe0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 1817.625061][T22407] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1817.668990][T22411] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6000000}, 0x0) 08:13:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001004800"/96], 0x60) 08:13:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 08:13:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff4, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1817.863323][T22422] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1817.908354][T22425] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x7000000}, 0x0) 08:13:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001004c00"/96], 0x60) 08:13:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x700}, 0x0) 08:13:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000001100"/96], 0x60) 08:13:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1818.090006][T22437] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:24 executing program 5 (fault-call:3 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1818.161458][T22442] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf000000}, 0x0) 08:13:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 08:13:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001006000"/96], 0x60) [ 1818.261422][T22451] FAULT_INJECTION: forcing a failure. [ 1818.261422][T22451] name failslab, interval 1, probability 0, space 0, times 0 [ 1818.286778][T22451] CPU: 0 PID: 22451 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1818.294837][T22451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1818.304916][T22451] Call Trace: [ 1818.304952][T22451] dump_stack+0x172/0x1f0 [ 1818.304977][T22451] should_fail.cold+0xa/0x15 [ 1818.304997][T22451] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1818.305024][T22451] ? ___might_sleep+0x163/0x280 [ 1818.305050][T22451] __should_failslab+0x121/0x190 [ 1818.312690][T22451] should_failslab+0x9/0x14 [ 1818.312711][T22451] kmem_cache_alloc_node+0x264/0x710 [ 1818.312738][T22451] __alloc_skb+0xd5/0x5e0 [ 1818.312764][T22451] ? skb_trim+0x190/0x190 [ 1818.324646][T22455] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1818.328147][T22451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.328167][T22451] ? netlink_autobind.isra.0+0x228/0x310 [ 1818.328186][T22451] netlink_sendmsg+0x97b/0xd70 [ 1818.328207][T22451] ? netlink_unicast+0x720/0x720 [ 1818.328243][T22451] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1818.389487][T22451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.395765][T22451] ? security_socket_sendmsg+0x93/0xc0 [ 1818.401276][T22451] ? netlink_unicast+0x720/0x720 [ 1818.406271][T22451] sock_sendmsg+0xdd/0x130 [ 1818.410982][T22451] ___sys_sendmsg+0x806/0x930 [ 1818.415696][T22451] ? copy_msghdr_from_user+0x430/0x430 [ 1818.421393][T22451] ? kasan_check_read+0x11/0x20 [ 1818.426303][T22451] ? __fget+0x381/0x550 [ 1818.430513][T22451] ? ksys_dup3+0x3e0/0x3e0 [ 1818.434980][T22451] ? __fget_light+0x1a9/0x230 [ 1818.439778][T22451] ? __fdget+0x1b/0x20 [ 1818.443875][T22451] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1818.450155][T22451] __sys_sendmsg+0x105/0x1d0 [ 1818.454791][T22451] ? __ia32_sys_shutdown+0x80/0x80 [ 1818.460102][T22451] ? fput_many+0x12c/0x1a0 [ 1818.464563][T22451] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1818.470059][T22451] ? do_syscall_64+0x26/0x610 [ 1818.474767][T22451] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1818.481049][T22451] ? do_syscall_64+0x26/0x610 [ 1818.485761][T22451] __x64_sys_sendmsg+0x78/0xb0 [ 1818.490553][T22451] do_syscall_64+0x103/0x610 [ 1818.495173][T22451] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1818.501106][T22451] RIP: 0033:0x458da9 [ 1818.505021][T22451] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1818.524912][T22451] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1818.533363][T22451] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1818.541363][T22451] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1818.549375][T22451] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 08:13:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc00}, 0x0) [ 1818.557380][T22451] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 [ 1818.565373][T22451] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 08:13:24 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1818.624422][T22459] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x20000000}, 0x0) [ 1818.675083][T22460] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:24 executing program 5 (fault-call:3 fault-nth:1): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 08:13:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001006800"/96], 0x60) [ 1818.771963][T22467] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x39280000}, 0x0) [ 1818.853320][T22475] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1818.882530][T22478] FAULT_INJECTION: forcing a failure. [ 1818.882530][T22478] name failslab, interval 1, probability 0, space 0, times 0 [ 1818.917207][T22478] CPU: 1 PID: 22478 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1818.925269][T22478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1818.925278][T22478] Call Trace: [ 1818.925311][T22478] dump_stack+0x172/0x1f0 [ 1818.925340][T22478] should_fail.cold+0xa/0x15 [ 1818.947626][T22478] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1818.953467][T22478] ? ___might_sleep+0x163/0x280 [ 1818.953490][T22478] __should_failslab+0x121/0x190 [ 1818.953506][T22478] should_failslab+0x9/0x14 [ 1818.953530][T22478] kmem_cache_alloc_node_trace+0x270/0x720 [ 1818.967864][T22478] __kmalloc_node_track_caller+0x3d/0x70 [ 1818.967887][T22478] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1818.967907][T22478] __alloc_skb+0x10b/0x5e0 [ 1818.989268][T22478] ? skb_trim+0x190/0x190 [ 1818.993627][T22478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1818.999882][T22478] ? netlink_autobind.isra.0+0x228/0x310 [ 1819.005527][T22478] netlink_sendmsg+0x97b/0xd70 [ 1819.005551][T22478] ? netlink_unicast+0x720/0x720 [ 1819.005570][T22478] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1819.005587][T22478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.005602][T22478] ? security_socket_sendmsg+0x93/0xc0 [ 1819.005615][T22478] ? netlink_unicast+0x720/0x720 [ 1819.005632][T22478] sock_sendmsg+0xdd/0x130 [ 1819.005651][T22478] ___sys_sendmsg+0x806/0x930 [ 1819.005672][T22478] ? copy_msghdr_from_user+0x430/0x430 [ 1819.026891][T22478] ? kasan_check_read+0x11/0x20 [ 1819.026913][T22478] ? __fget+0x381/0x550 [ 1819.026934][T22478] ? ksys_dup3+0x3e0/0x3e0 [ 1819.026957][T22478] ? __fget_light+0x1a9/0x230 [ 1819.026972][T22478] ? __fdget+0x1b/0x20 [ 1819.026988][T22478] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1819.027013][T22478] __sys_sendmsg+0x105/0x1d0 [ 1819.046610][T22478] ? __ia32_sys_shutdown+0x80/0x80 [ 1819.046624][T22478] ? fput_many+0x12c/0x1a0 [ 1819.046651][T22478] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1819.046667][T22478] ? do_syscall_64+0x26/0x610 [ 1819.046684][T22478] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1819.046697][T22478] ? do_syscall_64+0x26/0x610 [ 1819.046722][T22478] __x64_sys_sendmsg+0x78/0xb0 [ 1819.066832][T22478] do_syscall_64+0x103/0x610 [ 1819.081817][T22478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1819.081832][T22478] RIP: 0033:0x458da9 [ 1819.081848][T22478] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1819.081865][T22478] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 08:13:25 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001006c00"/96], 0x60) 08:13:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1b9d}, 0x0) [ 1819.163905][T22478] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1819.173410][T22478] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1819.181404][T22478] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1819.189403][T22478] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 [ 1819.197404][T22478] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 08:13:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001007400"/96], 0x60) 08:13:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x3f000000}, 0x0) [ 1819.256896][T22485] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:25 executing program 5 (fault-call:3 fault-nth:2): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1819.337678][T22492] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1819.380873][T22495] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 08:13:25 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001007a00"/96], 0x60) [ 1819.478020][T22503] FAULT_INJECTION: forcing a failure. [ 1819.478020][T22503] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.525163][T22503] CPU: 0 PID: 22503 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1819.533232][T22503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1819.543314][T22503] Call Trace: [ 1819.546632][T22503] dump_stack+0x172/0x1f0 [ 1819.550983][T22503] should_fail.cold+0xa/0x15 [ 1819.555594][T22503] ? __netlink_lookup+0x3c8/0x7a0 [ 1819.560646][T22503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1819.566486][T22503] __should_failslab+0x121/0x190 [ 1819.571439][T22503] should_failslab+0x9/0x14 [ 1819.575956][T22503] kmem_cache_alloc+0x47/0x6f0 [ 1819.580728][T22503] ? lock_acquire+0x16f/0x3f0 [ 1819.585412][T22503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.591689][T22503] skb_clone+0x150/0x3b0 [ 1819.595952][T22503] netlink_deliver_tap+0x95c/0xc00 [ 1819.601091][T22503] netlink_unicast+0x5a7/0x720 [ 1819.605871][T22503] ? netlink_attachskb+0x770/0x770 [ 1819.610988][T22503] ? _copy_from_iter_full+0x25d/0x900 [ 1819.616378][T22503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.622645][T22503] netlink_sendmsg+0x8ae/0xd70 [ 1819.627427][T22503] ? netlink_unicast+0x720/0x720 [ 1819.632373][T22503] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1819.637672][T22503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1819.643923][T22503] ? security_socket_sendmsg+0x93/0xc0 [ 1819.649404][T22503] ? netlink_unicast+0x720/0x720 [ 1819.654365][T22503] sock_sendmsg+0xdd/0x130 [ 1819.658794][T22503] ___sys_sendmsg+0x806/0x930 [ 1819.663588][T22503] ? copy_msghdr_from_user+0x430/0x430 [ 1819.669086][T22503] ? kasan_check_read+0x11/0x20 [ 1819.673958][T22503] ? __fget+0x381/0x550 [ 1819.678131][T22503] ? ksys_dup3+0x3e0/0x3e0 [ 1819.682573][T22503] ? __fget_light+0x1a9/0x230 [ 1819.687270][T22503] ? __fdget+0x1b/0x20 [ 1819.691357][T22503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1819.697634][T22503] __sys_sendmsg+0x105/0x1d0 [ 1819.702253][T22503] ? __ia32_sys_shutdown+0x80/0x80 [ 1819.707371][T22503] ? fput_many+0x12c/0x1a0 [ 1819.711808][T22503] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1819.717277][T22503] ? do_syscall_64+0x26/0x610 [ 1819.721971][T22503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1819.728265][T22503] ? do_syscall_64+0x26/0x610 [ 1819.732980][T22503] __x64_sys_sendmsg+0x78/0xb0 [ 1819.737781][T22503] do_syscall_64+0x103/0x610 [ 1819.742393][T22503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1819.748292][T22503] RIP: 0033:0x458da9 [ 1819.752201][T22503] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:13:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x40000000}, 0x0) [ 1819.771831][T22503] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1819.780267][T22503] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1819.788259][T22503] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1819.796243][T22503] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1819.804221][T22503] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 [ 1819.812213][T22503] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 [ 1819.857386][T22510] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1819.879835][T22514] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:25 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 08:13:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x48000000}, 0x0) 08:13:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000100"/96], 0x60) 08:13:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:25 executing program 5 (fault-call:3 fault-nth:3): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1820.046252][T22521] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1820.105163][T22525] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000200"/96], 0x60) 08:13:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x5865}, 0x0) [ 1820.154715][T22533] FAULT_INJECTION: forcing a failure. [ 1820.154715][T22533] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.203031][T22533] CPU: 1 PID: 22533 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1820.211089][T22533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1820.221160][T22533] Call Trace: [ 1820.221196][T22533] dump_stack+0x172/0x1f0 [ 1820.221231][T22533] should_fail.cold+0xa/0x15 [ 1820.221257][T22533] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1820.239282][T22533] ? ___might_sleep+0x163/0x280 [ 1820.244160][T22533] __should_failslab+0x121/0x190 08:13:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4c000000}, 0x0) [ 1820.249115][T22533] should_failslab+0x9/0x14 [ 1820.249133][T22533] kmem_cache_alloc_trace+0x2d1/0x760 [ 1820.249166][T22533] rtnl_newlink+0x4b/0xa0 [ 1820.263412][T22533] ? __rtnl_newlink+0x16c0/0x16c0 [ 1820.268456][T22533] rtnetlink_rcv_msg+0x465/0xb00 [ 1820.273420][T22533] ? rtnetlink_put_metrics+0x560/0x560 [ 1820.278898][T22533] ? netdev_pick_tx+0x300/0x300 [ 1820.283767][T22533] ? netlink_deliver_tap+0x22d/0xc00 [ 1820.289080][T22533] ? find_held_lock+0x35/0x130 [ 1820.293888][T22533] netlink_rcv_skb+0x17a/0x460 [ 1820.298695][T22533] ? rtnetlink_put_metrics+0x560/0x560 [ 1820.304191][T22533] ? netlink_ack+0xb50/0xb50 [ 1820.308820][T22533] ? kasan_check_read+0x11/0x20 [ 1820.313705][T22533] ? netlink_deliver_tap+0x254/0xc00 [ 1820.319020][T22533] rtnetlink_rcv+0x1d/0x30 [ 1820.323474][T22533] netlink_unicast+0x536/0x720 [ 1820.328290][T22533] ? netlink_attachskb+0x770/0x770 [ 1820.333437][T22533] ? _copy_from_iter_full+0x25d/0x900 [ 1820.338864][T22533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.345144][T22533] netlink_sendmsg+0x8ae/0xd70 [ 1820.349952][T22533] ? netlink_unicast+0x720/0x720 [ 1820.354933][T22533] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1820.360283][T22533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.362741][T22542] sel_write_load: 12 callbacks suppressed [ 1820.362748][T22542] SELinux: failed to load policy [ 1820.366565][T22533] ? security_socket_sendmsg+0x93/0xc0 [ 1820.366581][T22533] ? netlink_unicast+0x720/0x720 [ 1820.366598][T22533] sock_sendmsg+0xdd/0x130 [ 1820.366615][T22533] ___sys_sendmsg+0x806/0x930 [ 1820.366634][T22533] ? copy_msghdr_from_user+0x430/0x430 [ 1820.366658][T22533] ? kasan_check_read+0x11/0x20 [ 1820.366677][T22533] ? __fget+0x381/0x550 [ 1820.366697][T22533] ? ksys_dup3+0x3e0/0x3e0 [ 1820.366720][T22533] ? __fget_light+0x1a9/0x230 [ 1820.420571][T22533] ? __fdget+0x1b/0x20 [ 1820.424667][T22533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1820.430953][T22533] __sys_sendmsg+0x105/0x1d0 [ 1820.435586][T22533] ? __ia32_sys_shutdown+0x80/0x80 [ 1820.440721][T22533] ? fput_many+0x12c/0x1a0 [ 1820.445181][T22533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1820.450671][T22533] ? do_syscall_64+0x26/0x610 [ 1820.455375][T22533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1820.461471][T22533] ? do_syscall_64+0x26/0x610 [ 1820.466208][T22533] __x64_sys_sendmsg+0x78/0xb0 [ 1820.471017][T22533] do_syscall_64+0x103/0x610 [ 1820.475643][T22533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1820.481560][T22533] RIP: 0033:0x458da9 [ 1820.485476][T22533] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1820.505107][T22533] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1820.513548][T22533] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1820.521553][T22533] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1820.529595][T22533] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1820.537592][T22533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 [ 1820.545584][T22533] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 08:13:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x60000000}, 0x0) [ 1820.555452][T22538] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1820.571132][T22540] SELinux: failed to load policy [ 1820.576443][T22541] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000300"/96], 0x60) 08:13:26 executing program 5 (fault-call:3 fault-nth:4): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1820.671866][T22539] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1820.709173][T22548] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 08:13:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x68000000}, 0x0) 08:13:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1820.806836][T22550] FAULT_INJECTION: forcing a failure. [ 1820.806836][T22550] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.821892][T22555] SELinux: failed to load policy [ 1820.852773][T22550] CPU: 0 PID: 22550 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1820.860838][T22550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1820.870921][T22550] Call Trace: [ 1820.874260][T22550] dump_stack+0x172/0x1f0 [ 1820.878624][T22550] should_fail.cold+0xa/0x15 [ 1820.883258][T22550] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1820.889131][T22550] ? ___might_sleep+0x163/0x280 [ 1820.894010][T22550] __should_failslab+0x121/0x190 [ 1820.898975][T22550] should_failslab+0x9/0x14 [ 1820.903503][T22550] kmem_cache_alloc_node_trace+0x270/0x720 [ 1820.909351][T22550] __kmalloc_node+0x3d/0x70 [ 1820.913879][T22550] kvmalloc_node+0xbd/0x100 [ 1820.918408][T22550] alloc_netdev_mqs+0x98/0xd30 [ 1820.923187][T22550] ? ns_capable+0x20/0x30 [ 1820.927609][T22550] ? __bond_opt_init+0xb0/0xb0 [ 1820.932400][T22550] rtnl_create_link+0x22d/0xac0 [ 1820.937289][T22550] __rtnl_newlink+0xf7b/0x16c0 [ 1820.942086][T22550] ? rtnl_link_unregister+0x250/0x250 [ 1820.947473][T22550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1820.953747][T22550] ? is_bpf_text_address+0xd3/0x170 [ 1820.958965][T22550] ? kernel_text_address+0x73/0xf0 [ 1820.964098][T22550] ? __kernel_text_address+0xd/0x40 [ 1820.969390][T22550] ? unwind_get_return_address+0x61/0xa0 [ 1820.975053][T22550] ? __save_stack_trace+0x99/0x100 [ 1820.980213][T22550] ? save_stack+0xa9/0xd0 [ 1820.984572][T22550] ? save_stack+0x45/0xd0 [ 1820.988916][T22550] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1820.994744][T22550] ? kasan_kmalloc+0x9/0x10 [ 1820.999267][T22550] ? kmem_cache_alloc_trace+0x151/0x760 [ 1821.004837][T22550] ? rtnl_newlink+0x4b/0xa0 [ 1821.009356][T22550] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1821.014551][T22550] rtnl_newlink+0x69/0xa0 [ 1821.018904][T22550] ? __rtnl_newlink+0x16c0/0x16c0 [ 1821.023943][T22550] rtnetlink_rcv_msg+0x465/0xb00 [ 1821.028923][T22550] ? rtnetlink_put_metrics+0x560/0x560 [ 1821.034412][T22550] ? netdev_pick_tx+0x300/0x300 [ 1821.039281][T22550] ? netlink_deliver_tap+0x22d/0xc00 [ 1821.044586][T22550] ? find_held_lock+0x35/0x130 [ 1821.049365][T22550] netlink_rcv_skb+0x17a/0x460 [ 1821.054155][T22550] ? rtnetlink_put_metrics+0x560/0x560 [ 1821.061164][T22550] ? netlink_ack+0xb50/0xb50 [ 1821.065783][T22550] ? kasan_check_read+0x11/0x20 [ 1821.070669][T22550] ? netlink_deliver_tap+0x254/0xc00 [ 1821.075991][T22550] rtnetlink_rcv+0x1d/0x30 [ 1821.080428][T22550] netlink_unicast+0x536/0x720 [ 1821.085215][T22550] ? netlink_attachskb+0x770/0x770 [ 1821.090356][T22550] ? _copy_from_iter_full+0x25d/0x900 [ 1821.095745][T22550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.102012][T22550] netlink_sendmsg+0x8ae/0xd70 [ 1821.106833][T22550] ? netlink_unicast+0x720/0x720 [ 1821.111798][T22550] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1821.117107][T22550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.123367][T22550] ? security_socket_sendmsg+0x93/0xc0 [ 1821.128847][T22550] ? netlink_unicast+0x720/0x720 [ 1821.133815][T22550] sock_sendmsg+0xdd/0x130 [ 1821.138264][T22550] ___sys_sendmsg+0x806/0x930 [ 1821.142983][T22550] ? copy_msghdr_from_user+0x430/0x430 [ 1821.148475][T22550] ? kasan_check_read+0x11/0x20 [ 1821.153354][T22550] ? __fget+0x381/0x550 [ 1821.157533][T22550] ? ksys_dup3+0x3e0/0x3e0 [ 1821.161972][T22550] ? __fget_light+0x1a9/0x230 [ 1821.167888][T22550] ? __fdget+0x1b/0x20 [ 1821.171970][T22550] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1821.178241][T22550] __sys_sendmsg+0x105/0x1d0 [ 1821.182860][T22550] ? __ia32_sys_shutdown+0x80/0x80 [ 1821.187986][T22550] ? fput_many+0x12c/0x1a0 [ 1821.192435][T22550] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1821.197917][T22550] ? do_syscall_64+0x26/0x610 [ 1821.202617][T22550] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1821.208704][T22550] ? do_syscall_64+0x26/0x610 [ 1821.213411][T22550] __x64_sys_sendmsg+0x78/0xb0 [ 1821.218206][T22550] do_syscall_64+0x103/0x610 [ 1821.222830][T22550] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1821.228742][T22550] RIP: 0033:0x458da9 [ 1821.232648][T22550] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1821.252275][T22550] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1821.260722][T22550] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1821.268728][T22550] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1821.276723][T22550] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1821.284717][T22550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 [ 1821.292711][T22550] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 08:13:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6c000000}, 0x0) 08:13:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000400"/96], 0x60) 08:13:27 executing program 5 (fault-call:3 fault-nth:5): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1821.349516][T22563] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6558}, 0x0) [ 1821.430400][T22569] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1821.480086][T22571] SELinux: failed to load policy [ 1821.502605][T22574] FAULT_INJECTION: forcing a failure. [ 1821.502605][T22574] name failslab, interval 1, probability 0, space 0, times 0 08:13:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x74000000}, 0x0) [ 1821.546942][T22574] CPU: 0 PID: 22574 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1821.554991][T22574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1821.565153][T22574] Call Trace: [ 1821.568472][T22574] dump_stack+0x172/0x1f0 [ 1821.573219][T22574] should_fail.cold+0xa/0x15 [ 1821.577851][T22574] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1821.583695][T22574] __should_failslab+0x121/0x190 [ 1821.588671][T22574] should_failslab+0x9/0x14 [ 1821.593195][T22574] kmem_cache_alloc_trace+0x4b/0x760 [ 1821.598526][T22574] __hw_addr_create_ex+0x5e/0x310 [ 1821.603588][T22574] __hw_addr_add_ex+0x1ef/0x2b0 [ 1821.608465][T22574] dev_addr_init+0x118/0x200 [ 1821.613080][T22574] ? dev_mc_flush+0x40/0x40 [ 1821.617601][T22574] ? __kmalloc_node+0x4e/0x70 [ 1821.622293][T22574] alloc_netdev_mqs+0x142/0xd30 [ 1821.627179][T22574] ? ns_capable+0x20/0x30 [ 1821.631535][T22574] ? __bond_opt_init+0xb0/0xb0 [ 1821.636324][T22574] rtnl_create_link+0x22d/0xac0 [ 1821.641206][T22574] __rtnl_newlink+0xf7b/0x16c0 [ 1821.646011][T22574] ? rtnl_link_unregister+0x250/0x250 [ 1821.651399][T22574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.657684][T22574] ? is_bpf_text_address+0xd3/0x170 [ 1821.662909][T22574] ? kernel_text_address+0x73/0xf0 [ 1821.668052][T22574] ? __kernel_text_address+0xd/0x40 [ 1821.673286][T22574] ? unwind_get_return_address+0x61/0xa0 [ 1821.678950][T22574] ? __save_stack_trace+0x99/0x100 [ 1821.684102][T22574] ? save_stack+0xa9/0xd0 [ 1821.688458][T22574] ? save_stack+0x45/0xd0 [ 1821.692811][T22574] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1821.698638][T22574] ? kasan_kmalloc+0x9/0x10 [ 1821.703158][T22574] ? kmem_cache_alloc_trace+0x151/0x760 [ 1821.708723][T22574] ? rtnl_newlink+0x4b/0xa0 [ 1821.713250][T22574] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1821.718504][T22574] ? __irqentry_text_end+0xdb1e2/0x1fac62 [ 1821.724280][T22574] rtnl_newlink+0x69/0xa0 [ 1821.728639][T22574] ? __rtnl_newlink+0x16c0/0x16c0 [ 1821.733690][T22574] rtnetlink_rcv_msg+0x465/0xb00 [ 1821.738654][T22574] ? rtnetlink_put_metrics+0x560/0x560 [ 1821.744144][T22574] ? netdev_pick_tx+0x300/0x300 [ 1821.749022][T22574] ? netlink_deliver_tap+0x22d/0xc00 [ 1821.754336][T22574] ? find_held_lock+0x35/0x130 [ 1821.759136][T22574] netlink_rcv_skb+0x17a/0x460 [ 1821.763923][T22574] ? rtnetlink_put_metrics+0x560/0x560 [ 1821.769409][T22574] ? netlink_ack+0xb50/0xb50 [ 1821.774019][T22574] ? kasan_check_read+0x11/0x20 [ 1821.778889][T22574] ? netlink_deliver_tap+0x254/0xc00 [ 1821.784198][T22574] rtnetlink_rcv+0x1d/0x30 [ 1821.788732][T22574] netlink_unicast+0x536/0x720 [ 1821.793523][T22574] ? netlink_attachskb+0x770/0x770 [ 1821.798666][T22574] ? _copy_from_iter_full+0x25d/0x900 [ 1821.804068][T22574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.810353][T22574] netlink_sendmsg+0x8ae/0xd70 [ 1821.815143][T22574] ? netlink_unicast+0x720/0x720 [ 1821.820102][T22574] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1821.825409][T22574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.831689][T22574] ? security_socket_sendmsg+0x93/0xc0 [ 1821.837170][T22574] ? netlink_unicast+0x720/0x720 [ 1821.842129][T22574] sock_sendmsg+0xdd/0x130 [ 1821.846571][T22574] ___sys_sendmsg+0x806/0x930 [ 1821.851280][T22574] ? copy_msghdr_from_user+0x430/0x430 [ 1821.856773][T22574] ? kasan_check_read+0x11/0x20 [ 1821.861651][T22574] ? __fget+0x381/0x550 [ 1821.865827][T22574] ? ksys_dup3+0x3e0/0x3e0 [ 1821.870281][T22574] ? __fget_light+0x1a9/0x230 [ 1821.874983][T22574] ? __fdget+0x1b/0x20 [ 1821.879062][T22574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1821.885500][T22574] __sys_sendmsg+0x105/0x1d0 [ 1821.890111][T22574] ? __ia32_sys_shutdown+0x80/0x80 [ 1821.895242][T22574] ? fput_many+0x12c/0x1a0 [ 1821.899688][T22574] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1821.905157][T22574] ? do_syscall_64+0x26/0x610 [ 1821.909853][T22574] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1821.915943][T22574] ? do_syscall_64+0x26/0x610 [ 1821.920659][T22574] __x64_sys_sendmsg+0x78/0xb0 [ 1821.925456][T22574] do_syscall_64+0x103/0x610 [ 1821.930081][T22574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1821.935999][T22574] RIP: 0033:0x458da9 [ 1821.939918][T22574] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1821.959543][T22574] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1821.967988][T22574] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1821.975988][T22574] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1821.983990][T22574] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 08:13:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000500"/96], 0x60) [ 1821.991985][T22574] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 [ 1821.999988][T22574] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 [ 1822.014599][T22581] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1822.031843][T22578] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:27 executing program 5 (fault-call:3 fault-nth:6): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 08:13:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8100}, 0x0) [ 1822.079334][T22587] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1822.092121][T22585] SELinux: failed to load policy 08:13:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000600"/96], 0x60) 08:13:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x7a000000}, 0x0) 08:13:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1822.166126][T22593] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1822.202387][T22592] FAULT_INJECTION: forcing a failure. [ 1822.202387][T22592] name failslab, interval 1, probability 0, space 0, times 0 [ 1822.241220][T22592] CPU: 1 PID: 22592 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1822.249293][T22592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1822.249302][T22592] Call Trace: [ 1822.249336][T22592] dump_stack+0x172/0x1f0 [ 1822.249362][T22592] should_fail.cold+0xa/0x15 [ 1822.249383][T22592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1822.249407][T22592] ? ___might_sleep+0x163/0x280 [ 1822.249434][T22592] __should_failslab+0x121/0x190 [ 1822.282397][T22592] should_failslab+0x9/0x14 [ 1822.282419][T22592] kmem_cache_alloc_node_trace+0x270/0x720 [ 1822.282438][T22592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.282461][T22592] ? dev_addr_init+0x17f/0x200 [ 1822.308733][T22592] __kmalloc_node+0x3d/0x70 [ 1822.308753][T22592] kvmalloc_node+0xbd/0x100 [ 1822.308771][T22592] alloc_netdev_mqs+0x67f/0xd30 [ 1822.308796][T22592] ? __bond_opt_init+0xb0/0xb0 [ 1822.317825][T22592] rtnl_create_link+0x22d/0xac0 [ 1822.332295][T22592] __rtnl_newlink+0xf7b/0x16c0 [ 1822.332326][T22592] ? rtnl_link_unregister+0x250/0x250 [ 1822.332343][T22592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.332369][T22592] ? is_bpf_text_address+0xd3/0x170 [ 1822.348754][T22592] ? kernel_text_address+0x73/0xf0 [ 1822.348772][T22592] ? __kernel_text_address+0xd/0x40 [ 1822.348789][T22592] ? unwind_get_return_address+0x61/0xa0 [ 1822.348820][T22592] ? __save_stack_trace+0x99/0x100 [ 1822.375072][T22592] ? save_stack+0xa9/0xd0 [ 1822.379423][T22592] ? save_stack+0x45/0xd0 [ 1822.383773][T22592] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1822.389608][T22592] ? kasan_kmalloc+0x9/0x10 [ 1822.394132][T22592] ? kmem_cache_alloc_trace+0x151/0x760 [ 1822.399690][T22592] ? rtnl_newlink+0x4b/0xa0 [ 1822.404202][T22592] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1822.409414][T22592] rtnl_newlink+0x69/0xa0 [ 1822.413770][T22592] ? __rtnl_newlink+0x16c0/0x16c0 [ 1822.418826][T22592] rtnetlink_rcv_msg+0x465/0xb00 [ 1822.418850][T22592] ? rtnetlink_put_metrics+0x560/0x560 [ 1822.418867][T22592] ? netdev_pick_tx+0x300/0x300 [ 1822.418889][T22592] ? netlink_deliver_tap+0x22d/0xc00 [ 1822.429291][T22592] ? find_held_lock+0x35/0x130 [ 1822.429315][T22592] netlink_rcv_skb+0x17a/0x460 [ 1822.429335][T22592] ? rtnetlink_put_metrics+0x560/0x560 [ 1822.429352][T22592] ? netlink_ack+0xb50/0xb50 [ 1822.429379][T22592] ? kasan_check_read+0x11/0x20 [ 1822.459080][T22601] SELinux: failed to load policy [ 1822.463887][T22592] ? netlink_deliver_tap+0x254/0xc00 [ 1822.463914][T22592] rtnetlink_rcv+0x1d/0x30 [ 1822.463929][T22592] netlink_unicast+0x536/0x720 [ 1822.463946][T22592] ? netlink_attachskb+0x770/0x770 [ 1822.463961][T22592] ? _copy_from_iter_full+0x25d/0x900 [ 1822.463981][T22592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.464000][T22592] netlink_sendmsg+0x8ae/0xd70 [ 1822.504861][T22592] ? netlink_unicast+0x720/0x720 [ 1822.509836][T22592] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1822.515137][T22592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.521387][T22592] ? security_socket_sendmsg+0x93/0xc0 [ 1822.526862][T22592] ? netlink_unicast+0x720/0x720 [ 1822.531821][T22592] sock_sendmsg+0xdd/0x130 [ 1822.536259][T22592] ___sys_sendmsg+0x806/0x930 08:13:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000700"/96], 0x60) [ 1822.540955][T22592] ? copy_msghdr_from_user+0x430/0x430 [ 1822.546440][T22592] ? kasan_check_read+0x11/0x20 [ 1822.551311][T22592] ? __fget+0x381/0x550 [ 1822.555488][T22592] ? ksys_dup3+0x3e0/0x3e0 [ 1822.559934][T22592] ? __fget_light+0x1a9/0x230 [ 1822.564626][T22592] ? __fdget+0x1b/0x20 [ 1822.568705][T22592] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1822.574964][T22592] __sys_sendmsg+0x105/0x1d0 [ 1822.579570][T22592] ? __ia32_sys_shutdown+0x80/0x80 [ 1822.584688][T22592] ? fput_many+0x12c/0x1a0 [ 1822.589127][T22592] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1822.594594][T22592] ? do_syscall_64+0x26/0x610 [ 1822.599283][T22592] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1822.605365][T22592] ? do_syscall_64+0x26/0x610 [ 1822.610059][T22592] __x64_sys_sendmsg+0x78/0xb0 [ 1822.614840][T22592] do_syscall_64+0x103/0x610 [ 1822.619447][T22592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1822.625344][T22592] RIP: 0033:0x458da9 08:13:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x81000000}, 0x0) [ 1822.629255][T22592] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1822.649176][T22592] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1822.657625][T22592] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1822.665621][T22592] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1822.673621][T22592] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1822.681624][T22592] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 08:13:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1822.689626][T22592] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 08:13:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x9d1b}, 0x0) [ 1822.758553][T22610] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1822.799146][T22614] SELinux: failed to load policy 08:13:28 executing program 5 (fault-call:3 fault-nth:7): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x9effffff}, 0x0) 08:13:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000a00"/96], 0x60) [ 1822.848412][T22617] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 08:13:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf000}, 0x0) [ 1822.915252][T22622] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1822.960887][T22623] FAULT_INJECTION: forcing a failure. [ 1822.960887][T22623] name failslab, interval 1, probability 0, space 0, times 0 [ 1822.979627][T22625] SELinux: failed to load policy [ 1823.011002][T22623] CPU: 1 PID: 22623 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1823.019058][T22623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1823.029428][T22623] Call Trace: [ 1823.032747][T22623] dump_stack+0x172/0x1f0 [ 1823.037103][T22623] should_fail.cold+0xa/0x15 [ 1823.041720][T22623] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1823.047544][T22623] ? ___might_sleep+0x163/0x280 [ 1823.052409][T22623] __should_failslab+0x121/0x190 [ 1823.057369][T22623] should_failslab+0x9/0x14 [ 1823.062603][T22623] kmem_cache_alloc_node_trace+0x270/0x720 [ 1823.068513][T22623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.074772][T22623] ? dev_addr_init+0x17f/0x200 [ 1823.079560][T22623] __kmalloc_node+0x3d/0x70 [ 1823.084077][T22623] kvmalloc_node+0xbd/0x100 [ 1823.088596][T22623] alloc_netdev_mqs+0x67f/0xd30 [ 1823.093459][T22623] ? __bond_opt_init+0xb0/0xb0 [ 1823.098246][T22623] rtnl_create_link+0x22d/0xac0 [ 1823.103125][T22623] __rtnl_newlink+0xf7b/0x16c0 [ 1823.107913][T22623] ? rtnl_link_unregister+0x250/0x250 [ 1823.113300][T22623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.119565][T22623] ? is_bpf_text_address+0xd3/0x170 [ 1823.124773][T22623] ? kernel_text_address+0x73/0xf0 [ 1823.129904][T22623] ? __kernel_text_address+0xd/0x40 [ 1823.135349][T22623] ? unwind_get_return_address+0x61/0xa0 [ 1823.141000][T22623] ? __save_stack_trace+0x99/0x100 [ 1823.146129][T22623] ? save_stack+0xa9/0xd0 [ 1823.150467][T22623] ? save_stack+0x45/0xd0 [ 1823.154823][T22623] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1823.160647][T22623] ? kasan_kmalloc+0x9/0x10 [ 1823.165168][T22623] ? kmem_cache_alloc_trace+0x151/0x760 [ 1823.171684][T22623] ? rtnl_newlink+0x4b/0xa0 [ 1823.176206][T22623] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1823.181417][T22623] rtnl_newlink+0x69/0xa0 [ 1823.185770][T22623] ? __rtnl_newlink+0x16c0/0x16c0 [ 1823.190831][T22623] rtnetlink_rcv_msg+0x465/0xb00 [ 1823.195798][T22623] ? rtnetlink_put_metrics+0x560/0x560 [ 1823.201296][T22623] ? netdev_pick_tx+0x300/0x300 [ 1823.206186][T22623] ? netlink_deliver_tap+0x22d/0xc00 [ 1823.211499][T22623] ? find_held_lock+0x35/0x130 [ 1823.216290][T22623] netlink_rcv_skb+0x17a/0x460 [ 1823.221081][T22623] ? rtnetlink_put_metrics+0x560/0x560 [ 1823.226572][T22623] ? netlink_ack+0xb50/0xb50 [ 1823.231183][T22623] ? kasan_check_read+0x11/0x20 [ 1823.236060][T22623] ? netlink_deliver_tap+0x254/0xc00 [ 1823.241368][T22623] rtnetlink_rcv+0x1d/0x30 [ 1823.245800][T22623] netlink_unicast+0x536/0x720 [ 1823.250596][T22623] ? netlink_attachskb+0x770/0x770 [ 1823.255723][T22623] ? _copy_from_iter_full+0x25d/0x900 [ 1823.261110][T22623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.267380][T22623] netlink_sendmsg+0x8ae/0xd70 [ 1823.272168][T22623] ? netlink_unicast+0x720/0x720 [ 1823.277124][T22623] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1823.282425][T22623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1823.288686][T22623] ? security_socket_sendmsg+0x93/0xc0 [ 1823.294177][T22623] ? netlink_unicast+0x720/0x720 [ 1823.299149][T22623] sock_sendmsg+0xdd/0x130 [ 1823.303625][T22623] ___sys_sendmsg+0x806/0x930 [ 1823.308332][T22623] ? copy_msghdr_from_user+0x430/0x430 [ 1823.313826][T22623] ? kasan_check_read+0x11/0x20 [ 1823.318694][T22623] ? __fget+0x381/0x550 [ 1823.323044][T22623] ? ksys_dup3+0x3e0/0x3e0 [ 1823.327493][T22623] ? __fget_light+0x1a9/0x230 [ 1823.332189][T22623] ? __fdget+0x1b/0x20 [ 1823.336293][T22623] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1823.342575][T22623] __sys_sendmsg+0x105/0x1d0 [ 1823.347416][T22623] ? __ia32_sys_shutdown+0x80/0x80 [ 1823.352536][T22623] ? fput_many+0x12c/0x1a0 [ 1823.356986][T22623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1823.362465][T22623] ? do_syscall_64+0x26/0x610 [ 1823.367166][T22623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1823.373264][T22623] ? do_syscall_64+0x26/0x610 [ 1823.377975][T22623] __x64_sys_sendmsg+0x78/0xb0 [ 1823.382763][T22623] do_syscall_64+0x103/0x610 [ 1823.387385][T22623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1823.393292][T22623] RIP: 0033:0x458da9 [ 1823.397234][T22623] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1823.416864][T22623] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1823.425306][T22623] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1823.433305][T22623] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1823.441303][T22623] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1823.449304][T22623] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 08:13:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf0ffffff}, 0x0) [ 1823.457311][T22623] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 08:13:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000002000"/96], 0x60) [ 1823.534901][T22632] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1823.568205][T22635] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) 08:13:29 executing program 5 (fault-call:3 fault-nth:8): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 08:13:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xfffff000}, 0x0) [ 1823.643392][T22640] SELinux: failed to load policy 08:13:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000003f00"/96], 0x60) 08:13:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x10000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1823.715781][T22647] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1823.747829][T22649] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xffffff7f}, 0x0) 08:13:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) [ 1823.792997][T22653] SELinux: failed to load policy [ 1823.801887][T22651] FAULT_INJECTION: forcing a failure. [ 1823.801887][T22651] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1823.837358][T22651] CPU: 1 PID: 22651 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1823.845407][T22651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1823.855478][T22651] Call Trace: [ 1823.858812][T22651] dump_stack+0x172/0x1f0 [ 1823.863177][T22651] should_fail.cold+0xa/0x15 [ 1823.867801][T22651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1823.873657][T22651] should_fail_alloc_page+0x50/0x60 [ 1823.878917][T22651] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1823.884316][T22651] ? kvmalloc_node+0x68/0x100 [ 1823.889020][T22651] ? alloc_netdev_mqs+0x821/0xd30 [ 1823.894062][T22651] ? rtnl_create_link+0x22d/0xac0 [ 1823.899115][T22651] ? __rtnl_newlink+0xf7b/0x16c0 [ 1823.904093][T22651] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1823.909850][T22651] ? netlink_sendmsg+0x8ae/0xd70 [ 1823.914823][T22651] ? sock_sendmsg+0xdd/0x130 [ 1823.919447][T22651] ? ___sys_sendmsg+0x806/0x930 [ 1823.924338][T22651] ? find_held_lock+0x35/0x130 [ 1823.929129][T22651] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1823.934784][T22651] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1823.941065][T22651] alloc_pages_current+0x107/0x210 [ 1823.946203][T22651] get_zeroed_page+0x14/0x50 [ 1823.950823][T22651] dev_alloc_name_ns+0x14b/0x470 [ 1823.955791][T22651] ? __dev_get_by_name+0x160/0x160 [ 1823.960936][T22651] dev_get_valid_name+0x6c/0xd0 [ 1823.965814][T22651] register_netdevice+0x284/0xff0 [ 1823.970859][T22651] ? bond_slave_changelink+0x1e0/0x1e0 [ 1823.976351][T22651] ? netdev_change_features+0xb0/0xb0 [ 1823.981755][T22651] bond_newlink+0x4b/0x90 [ 1823.986104][T22651] ? bond_changelink+0x1ac0/0x1ac0 [ 1823.991281][T22651] __rtnl_newlink+0x107b/0x16c0 [ 1823.996167][T22651] ? rtnl_link_unregister+0x250/0x250 [ 1824.001557][T22651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.007841][T22651] ? is_bpf_text_address+0xd3/0x170 [ 1824.013074][T22651] ? kernel_text_address+0x73/0xf0 [ 1824.018199][T22651] ? __kernel_text_address+0xd/0x40 [ 1824.023425][T22651] ? unwind_get_return_address+0x61/0xa0 [ 1824.029081][T22651] ? __save_stack_trace+0x99/0x100 [ 1824.034246][T22651] ? save_stack+0xa9/0xd0 [ 1824.038596][T22651] ? save_stack+0x45/0xd0 [ 1824.042942][T22651] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1824.048766][T22651] ? kasan_kmalloc+0x9/0x10 [ 1824.053292][T22651] ? kmem_cache_alloc_trace+0x151/0x760 [ 1824.058859][T22651] ? rtnl_newlink+0x4b/0xa0 [ 1824.063374][T22651] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1824.068569][T22651] rtnl_newlink+0x69/0xa0 [ 1824.072920][T22651] ? __rtnl_newlink+0x16c0/0x16c0 [ 1824.077961][T22651] rtnetlink_rcv_msg+0x465/0xb00 [ 1824.082917][T22651] ? rtnetlink_put_metrics+0x560/0x560 [ 1824.088393][T22651] ? netdev_pick_tx+0x300/0x300 [ 1824.093265][T22651] ? netlink_deliver_tap+0x22d/0xc00 [ 1824.098570][T22651] ? find_held_lock+0x35/0x130 [ 1824.103355][T22651] netlink_rcv_skb+0x17a/0x460 [ 1824.108149][T22651] ? rtnetlink_put_metrics+0x560/0x560 [ 1824.113632][T22651] ? netlink_ack+0xb50/0xb50 [ 1824.118249][T22651] ? kasan_check_read+0x11/0x20 [ 1824.123138][T22651] ? netlink_deliver_tap+0x254/0xc00 [ 1824.128466][T22651] rtnetlink_rcv+0x1d/0x30 [ 1824.132906][T22651] netlink_unicast+0x536/0x720 [ 1824.137694][T22651] ? netlink_attachskb+0x770/0x770 [ 1824.142842][T22651] ? _copy_from_iter_full+0x25d/0x900 [ 1824.148257][T22651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.154540][T22651] netlink_sendmsg+0x8ae/0xd70 [ 1824.159341][T22651] ? netlink_unicast+0x720/0x720 [ 1824.164307][T22651] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1824.170165][T22651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.176439][T22651] ? security_socket_sendmsg+0x93/0xc0 [ 1824.181918][T22651] ? netlink_unicast+0x720/0x720 [ 1824.186886][T22651] sock_sendmsg+0xdd/0x130 [ 1824.191335][T22651] ___sys_sendmsg+0x806/0x930 [ 1824.196041][T22651] ? copy_msghdr_from_user+0x430/0x430 [ 1824.201761][T22651] ? kasan_check_read+0x11/0x20 [ 1824.206633][T22651] ? __fget+0x381/0x550 [ 1824.210804][T22651] ? ksys_dup3+0x3e0/0x3e0 [ 1824.215269][T22651] ? __fget_light+0x1a9/0x230 [ 1824.219968][T22651] ? __fdget+0x1b/0x20 [ 1824.224062][T22651] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1824.230326][T22651] __sys_sendmsg+0x105/0x1d0 [ 1824.234960][T22651] ? __ia32_sys_shutdown+0x80/0x80 [ 1824.240086][T22651] ? fput_many+0x12c/0x1a0 [ 1824.244559][T22651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1824.250032][T22651] ? do_syscall_64+0x26/0x610 [ 1824.254724][T22651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1824.260813][T22651] ? do_syscall_64+0x26/0x610 [ 1824.265510][T22651] __x64_sys_sendmsg+0x78/0xb0 [ 1824.270295][T22651] do_syscall_64+0x103/0x610 [ 1824.274907][T22651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1824.280827][T22651] RIP: 0033:0x458da9 [ 1824.284741][T22651] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1824.304582][T22651] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1824.313033][T22651] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1824.321029][T22651] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1824.329022][T22651] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1824.337108][T22651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 [ 1824.345105][T22651] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 08:13:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000004800"/96], 0x60) 08:13:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 1824.406549][T22662] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:30 executing program 5 (fault-call:3 fault-nth:9): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 1824.476871][T22666] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xffffff9e}, 0x0) 08:13:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000004c00"/96], 0x60) [ 1824.560862][T22672] FAULT_INJECTION: forcing a failure. [ 1824.560862][T22672] name failslab, interval 1, probability 0, space 0, times 0 [ 1824.599924][T22672] CPU: 1 PID: 22672 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #95 [ 1824.607979][T22672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1824.618056][T22672] Call Trace: [ 1824.621380][T22672] dump_stack+0x172/0x1f0 [ 1824.625747][T22672] should_fail.cold+0xa/0x15 [ 1824.630372][T22672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1824.636206][T22672] ? ___might_sleep+0x163/0x280 [ 1824.641176][T22672] __should_failslab+0x121/0x190 [ 1824.646135][T22672] should_failslab+0x9/0x14 [ 1824.650666][T22672] __kmalloc+0x2dc/0x740 [ 1824.654926][T22672] ? snprintf+0xbb/0xf0 [ 1824.659094][T22672] ? vsprintf+0x40/0x40 [ 1824.663276][T22672] ? trace_hardirqs_on+0x67/0x230 [ 1824.668317][T22672] ? alloc_workqueue+0x166/0xf00 [ 1824.673290][T22672] alloc_workqueue+0x166/0xf00 [ 1824.678073][T22672] ? bond_init+0x17a/0x800 [ 1824.682507][T22672] ? find_held_lock+0x35/0x130 [ 1824.687287][T22672] ? bond_init+0x17a/0x800 [ 1824.691727][T22672] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 1824.697466][T22672] ? dev_alloc_name_ns+0x3ad/0x470 [ 1824.702605][T22672] ? lock_downgrade+0x880/0x880 [ 1824.707475][T22672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.713747][T22672] bond_init+0x1b3/0x800 [ 1824.718023][T22672] ? bond_set_rx_mode+0x4c0/0x4c0 [ 1824.723347][T22672] register_netdevice+0x300/0xff0 [ 1824.728406][T22672] ? netdev_change_features+0xb0/0xb0 [ 1824.733822][T22672] bond_newlink+0x4b/0x90 [ 1824.738172][T22672] ? bond_changelink+0x1ac0/0x1ac0 [ 1824.738192][T22672] __rtnl_newlink+0x107b/0x16c0 [ 1824.738221][T22672] ? rtnl_link_unregister+0x250/0x250 [ 1824.738249][T22672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.738275][T22672] ? is_bpf_text_address+0xd3/0x170 [ 1824.748283][T22672] ? kernel_text_address+0x73/0xf0 [ 1824.748297][T22672] ? __kernel_text_address+0xd/0x40 [ 1824.748314][T22672] ? unwind_get_return_address+0x61/0xa0 [ 1824.748331][T22672] ? __save_stack_trace+0x99/0x100 [ 1824.748362][T22672] ? save_stack+0xa9/0xd0 [ 1824.748384][T22672] ? save_stack+0x45/0xd0 [ 1824.781117][T22672] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1824.781135][T22672] ? kasan_kmalloc+0x9/0x10 [ 1824.781151][T22672] ? kmem_cache_alloc_trace+0x151/0x760 [ 1824.781166][T22672] ? rtnl_newlink+0x4b/0xa0 [ 1824.781187][T22672] ? rtnetlink_rcv_msg+0x465/0xb00 [ 1824.795025][T22672] rtnl_newlink+0x69/0xa0 [ 1824.795040][T22672] ? __rtnl_newlink+0x16c0/0x16c0 [ 1824.795056][T22672] rtnetlink_rcv_msg+0x465/0xb00 [ 1824.795075][T22672] ? rtnetlink_put_metrics+0x560/0x560 [ 1824.795091][T22672] ? netdev_pick_tx+0x300/0x300 [ 1824.795113][T22672] ? netlink_deliver_tap+0x22d/0xc00 [ 1824.850536][T22672] ? find_held_lock+0x35/0x130 [ 1824.855336][T22672] netlink_rcv_skb+0x17a/0x460 [ 1824.860140][T22672] ? rtnetlink_put_metrics+0x560/0x560 [ 1824.865636][T22672] ? netlink_ack+0xb50/0xb50 [ 1824.870278][T22672] ? kasan_check_read+0x11/0x20 [ 1824.875166][T22672] ? netlink_deliver_tap+0x254/0xc00 [ 1824.880491][T22672] rtnetlink_rcv+0x1d/0x30 [ 1824.884931][T22672] netlink_unicast+0x536/0x720 [ 1824.889906][T22672] ? netlink_attachskb+0x770/0x770 [ 1824.895046][T22672] ? _copy_from_iter_full+0x25d/0x900 [ 1824.900447][T22672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.906792][T22672] netlink_sendmsg+0x8ae/0xd70 [ 1824.911600][T22672] ? netlink_unicast+0x720/0x720 [ 1824.916584][T22672] ? tomoyo_socket_sendmsg+0x26/0x30 [ 1824.921902][T22672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.928374][T22672] ? security_socket_sendmsg+0x93/0xc0 [ 1824.933873][T22672] ? netlink_unicast+0x720/0x720 [ 1824.938849][T22672] sock_sendmsg+0xdd/0x130 [ 1824.943300][T22672] ___sys_sendmsg+0x806/0x930 [ 1824.948001][T22672] ? copy_msghdr_from_user+0x430/0x430 [ 1824.953485][T22672] ? kasan_check_read+0x11/0x20 [ 1824.958358][T22672] ? __fget+0x381/0x550 [ 1824.962531][T22672] ? ksys_dup3+0x3e0/0x3e0 [ 1824.966969][T22672] ? __fget_light+0x1a9/0x230 [ 1824.971660][T22672] ? __fdget+0x1b/0x20 [ 1824.975740][T22672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1824.982018][T22672] __sys_sendmsg+0x105/0x1d0 [ 1824.986638][T22672] ? __ia32_sys_shutdown+0x80/0x80 [ 1824.991769][T22672] ? fput_many+0x12c/0x1a0 [ 1824.996217][T22672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1825.001703][T22672] ? do_syscall_64+0x26/0x610 [ 1825.006396][T22672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1825.012476][T22672] ? do_syscall_64+0x26/0x610 [ 1825.017176][T22672] __x64_sys_sendmsg+0x78/0xb0 [ 1825.021960][T22672] do_syscall_64+0x103/0x610 [ 1825.026593][T22672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1825.032504][T22672] RIP: 0033:0x458da9 [ 1825.036443][T22672] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1825.056071][T22672] RSP: 002b:00007faee384ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1825.065265][T22672] RAX: ffffffffffffffda RBX: 00007faee384ec90 RCX: 0000000000458da9 [ 1825.082293][T22672] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 1825.090292][T22672] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1825.098289][T22672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faee384f6d4 [ 1825.106303][T22672] R13: 00000000004c66a9 R14: 00000000004db000 R15: 0000000000000005 [ 1825.118716][T22680] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 08:13:31 executing program 5 (fault-call:3 fault-nth:10): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000006000"/96], 0x60) [ 1825.208367][T22686] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 08:13:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xfffffff0}, 0x0) 08:13:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 08:13:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000006800"/96], 0x60) [ 1825.380665][T22742] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 1825.446423][T22788] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4000000000000}, 0x0) 08:13:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 1825.505291][T22805] sel_write_load: 3 callbacks suppressed [ 1825.505299][T22805] SELinux: failed to load policy 08:13:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1825.577064][T22815] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000006c00"/96], 0x60) 08:13:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x40030000000000}, 0x0) [ 1825.625451][T22818] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 08:13:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1825.717208][T22823] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) [ 1825.760010][T22825] SELinux: failed to load policy 08:13:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf0ffffffffffff}, 0x0) 08:13:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) [ 1825.858627][T22834] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000007400"/96], 0x60) 08:13:31 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) [ 1825.922577][T22838] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x100000000000000}, 0x0) 08:13:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1826.004249][T22843] SELinux: failed to load policy [ 1826.019313][T22845] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000007a00"/96], 0x60) 08:13:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 1826.141195][T22852] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x200000000000000}, 0x0) [ 1826.225014][T22855] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 1826.303209][T22861] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x300000000000000}, 0x0) [ 1826.384391][T22864] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1826.444844][T22869] SELinux: failed to load policy [ 1826.451708][T22870] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 08:13:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) [ 1826.589593][T22876] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000000100"/96], 0x60) 08:13:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x400000000000000}, 0x0) 08:13:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 08:13:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 1826.701480][T22985] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1826.750115][T22989] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1826.762967][T22986] SELinux: failed to load policy 08:13:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x500000000000000}, 0x0) 08:13:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000000200"/96], 0x60) 08:13:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 08:13:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 1826.916707][T23035] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1826.973126][T23075] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1826.973345][T23038] SELinux: failed to load policy 08:13:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x600000000000000}, 0x0) 08:13:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000000300"/96], 0x60) 08:13:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 08:13:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1827.105632][T23115] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 08:13:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x700000000000000}, 0x0) [ 1827.215973][T23127] SELinux: failed to load policy [ 1827.227221][T23123] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000000400"/96], 0x60) 08:13:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) [ 1827.340544][T23220] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 1827.407163][T23220] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1827.431902][T23236] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1827.464951][T23237] SELinux: failed to load policy 08:13:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf00000000000000}, 0x0) 08:13:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 08:13:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000000500"/96], 0x60) 08:13:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 1827.599654][T23254] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1827.611891][T23252] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x65580000}, 0x0) 08:13:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1827.680254][T23327] SELinux: failed to load policy 08:13:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x2000000000000000}, 0x0) 08:13:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000000600"/96], 0x60) [ 1827.755377][T23361] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 1827.809246][T23365] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) [ 1827.885662][T23372] SELinux: failed to load policy 08:13:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x3928000000000000}, 0x0) 08:13:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1827.956528][T23380] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffff", 0x3f, 0x10000}], 0x0, 0x0) 08:13:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000000700"/96], 0x60) 08:13:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) [ 1828.040945][T23413] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x3f00000000000000}, 0x0) 08:13:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000000a00"/96], 0x60) [ 1828.166205][T23493] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffff", 0x3f, 0x10000}], 0x0, 0x0) [ 1828.231912][T23499] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x9d1b0000}, 0x0) 08:13:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4000000000000000}, 0x0) 08:13:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1828.354302][T23503] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1828.391215][T23518] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000002000"/96], 0x60) 08:13:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 08:13:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4800000000000000}, 0x0) 08:13:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffff", 0x3f, 0x10000}], 0x0, 0x0) 08:13:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000003f00"/96], 0x60) [ 1828.571053][T23620] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 1828.720976][T23626] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x4c00000000000000}, 0x0) 08:13:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f424852", 0x44, 0x10000}], 0x0, 0x0) 08:13:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000004800"/96], 0x60) [ 1828.784724][T23662] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xffffa888}, 0x0) 08:13:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1828.874078][T23741] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x9, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6000000000000000}, 0x0) 08:13:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000004c00"/96], 0x60) [ 1828.973027][T23750] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f424852", 0x44, 0x10000}], 0x0, 0x0) 08:13:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) [ 1829.090835][T23762] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 1829.142483][T23764] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000006000"/96], 0x60) 08:13:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6800000000000000}, 0x0) [ 1829.239606][T23853] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f424852", 0x44, 0x10000}], 0x0, 0x0) 08:13:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xa, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 1829.330619][T23879] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000006800"/96], 0x60) 08:13:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x6c00000000000000}, 0x0) 08:13:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x240f000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1829.479259][T23918] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000006c00"/96], 0x60) 08:13:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 1829.568652][T23995] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 08:13:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x7400000000000000}, 0x0) 08:13:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000007400"/96], 0x60) [ 1829.710654][T24010] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 1829.797892][T24026] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) 08:13:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x7a00000000000000}, 0x0) 08:13:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xe, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000007a00"/96], 0x60) 08:13:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1829.916934][T24124] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1829.969556][T24127] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 08:13:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f4248526653", 0x46, 0x10000}], 0x0, 0x0) 08:13:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000ffffffff00"/96], 0x60) 08:13:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x8100000000000000}, 0x0) [ 1830.143382][T24179] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x10, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000200"/96], 0x60) 08:13:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x9effffff00000000}, 0x0) [ 1830.218425][T24248] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 08:13:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 1830.367509][T24257] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000300"/96], 0x60) [ 1830.412140][T24279] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xf0ffffff00000000}, 0x0) 08:13:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x48, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 08:13:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 08:13:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1830.561552][T24370] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1830.609202][T24372] sel_write_load: 14 callbacks suppressed [ 1830.609209][T24372] SELinux: failed to load policy 08:13:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xffffff7f00000000}, 0x0) 08:13:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000400"/96], 0x60) [ 1830.694516][T24381] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 08:13:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) [ 1830.767176][T24426] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4c, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1830.836157][T24489] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1830.890017][T24492] SELinux: failed to load policy 08:13:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x500000000000000}, 0x0) 08:13:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0xfffffffffffff000}, 0x0) 08:13:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000500"/96], 0x60) 08:13:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48}], 0x0, 0x0) [ 1831.043184][T24504] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1831.085928][T24506] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1831.102448][T24545] SELinux: failed to load policy 08:13:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x600000000000000}, 0x0) 08:13:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x2}, 0x0) 08:13:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000600"/96], 0x60) 08:13:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x60, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1831.232372][T24619] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48}], 0x0, 0x0) [ 1831.272672][T24625] SELinux: failed to load policy 08:13:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3}, 0x0) 08:13:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000700"/96], 0x60) 08:13:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x700000000000000}, 0x0) 08:13:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48}], 0x0, 0x0) [ 1831.459674][T24636] SELinux: failed to load policy 08:13:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4}, 0x0) [ 1831.485810][T24668] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x68, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000a00"/96], 0x60) 08:13:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) 08:13:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x5}, 0x0) 08:13:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1831.741518][T24759] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1831.757638][T24764] SELinux: failed to load policy 08:13:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc00000000000000}, 0x0) 08:13:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6}, 0x0) 08:13:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001004800"/96], 0x60) 08:13:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000200"/96], 0x60) [ 1831.915631][T24874] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7}, 0x0) [ 1831.974013][T24879] SELinux: failed to load policy 08:13:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001004c00"/96], 0x60) [ 1832.060676][T24892] SELinux: failed to load policy 08:13:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xe00000000000000}, 0x0) 08:13:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1832.112060][T24895] SELinux: failed to load policy 08:13:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf}, 0x0) 08:13:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000200"/96], 0x60) 08:13:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001006000"/96], 0x60) 08:13:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x74, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1832.234080][T25002] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1832.272020][T25005] SELinux: failed to load policy 08:13:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 08:13:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x48}, 0x0) 08:13:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:38 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001006800"/96], 0x60) 08:13:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4c}, 0x0) [ 1832.428015][T25017] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1832.461663][T25035] FAULT_INJECTION: forcing a failure. [ 1832.461663][T25035] name failslab, interval 1, probability 0, space 0, times 0 [ 1832.510472][T25035] CPU: 0 PID: 25035 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1832.518527][T25035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1832.518536][T25035] Call Trace: [ 1832.518568][T25035] dump_stack+0x172/0x1f0 [ 1832.518593][T25035] should_fail.cold+0xa/0x15 [ 1832.518619][T25035] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1832.546741][T25035] ? ___might_sleep+0x163/0x280 [ 1832.551628][T25035] __should_failslab+0x121/0x190 [ 1832.556594][T25035] should_failslab+0x9/0x14 [ 1832.556612][T25035] __kmalloc+0x2dc/0x740 [ 1832.556624][T25035] ? fput_many+0x12c/0x1a0 [ 1832.556641][T25035] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1832.556658][T25035] ? strnlen_user+0x1f0/0x280 [ 1832.556673][T25035] ? __x64_sys_memfd_create+0x13c/0x470 [ 1832.556691][T25035] __x64_sys_memfd_create+0x13c/0x470 [ 1832.556705][T25035] ? memfd_fcntl+0x1550/0x1550 [ 1832.556730][T25035] ? do_syscall_64+0x26/0x610 [ 1832.601179][T25035] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1832.606504][T25035] ? trace_hardirqs_on+0x67/0x230 [ 1832.611572][T25035] do_syscall_64+0x103/0x610 [ 1832.616205][T25035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1832.622142][T25035] RIP: 0033:0x458da9 [ 1832.626060][T25035] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1832.645716][T25035] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 08:13:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7a, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1832.654159][T25035] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 1832.662162][T25035] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 1832.670166][T25035] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1832.678165][T25035] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5eb3af36d4 [ 1832.686175][T25035] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 08:13:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x60}, 0x0) 08:13:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xe0ffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001006c00"/96], 0x60) [ 1832.829672][T25134] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) 08:13:38 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x68}, 0x0) 08:13:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xf0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001007400"/96], 0x60) 08:13:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf4ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1833.008548][T25246] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1833.044020][T25250] FAULT_INJECTION: forcing a failure. [ 1833.044020][T25250] name failslab, interval 1, probability 0, space 0, times 0 08:13:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6000000000000000}, 0x0) [ 1833.091704][T25250] CPU: 0 PID: 25250 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1833.099792][T25250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1833.109858][T25250] Call Trace: [ 1833.113200][T25250] dump_stack+0x172/0x1f0 [ 1833.117567][T25250] should_fail.cold+0xa/0x15 [ 1833.122180][T25250] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1833.128038][T25250] ? ___might_sleep+0x163/0x280 [ 1833.132904][T25250] __should_failslab+0x121/0x190 [ 1833.137871][T25250] ? shmem_destroy_callback+0xc0/0xc0 [ 1833.143275][T25250] should_failslab+0x9/0x14 [ 1833.147806][T25250] kmem_cache_alloc+0x2b2/0x6f0 [ 1833.152682][T25250] ? __alloc_fd+0x44d/0x560 [ 1833.157212][T25250] ? shmem_destroy_callback+0xc0/0xc0 [ 1833.162623][T25250] shmem_alloc_inode+0x1c/0x50 [ 1833.167411][T25250] alloc_inode+0x66/0x190 [ 1833.171772][T25250] new_inode_pseudo+0x19/0xf0 [ 1833.177843][T25250] new_inode+0x1f/0x40 [ 1833.181928][T25250] shmem_get_inode+0x84/0x7e0 [ 1833.186636][T25250] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1833.192236][T25250] shmem_file_setup+0x66/0x90 [ 1833.196947][T25250] __x64_sys_memfd_create+0x2a2/0x470 [ 1833.202348][T25250] ? memfd_fcntl+0x1550/0x1550 [ 1833.207135][T25250] ? do_syscall_64+0x26/0x610 [ 1833.211841][T25250] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1833.217250][T25250] ? trace_hardirqs_on+0x67/0x230 [ 1833.222303][T25250] do_syscall_64+0x103/0x610 [ 1833.226917][T25250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1833.232823][T25250] RIP: 0033:0x458da9 [ 1833.236730][T25250] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1833.256357][T25250] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1833.264784][T25250] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 1833.272820][T25250] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 1833.280805][T25250] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 08:13:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6c}, 0x0) [ 1833.288785][T25250] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5eb3af36d4 [ 1833.296764][T25250] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x74}, 0x0) 08:13:39 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1833.377549][T25260] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6558000000000000}, 0x0) 08:13:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001007a00"/96], 0x60) 08:13:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1833.475506][T25333] FAULT_INJECTION: forcing a failure. [ 1833.475506][T25333] name failslab, interval 1, probability 0, space 0, times 0 [ 1833.513876][T25333] CPU: 1 PID: 25333 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1833.521930][T25333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1833.532000][T25333] Call Trace: [ 1833.535327][T25333] dump_stack+0x172/0x1f0 [ 1833.539688][T25333] should_fail.cold+0xa/0x15 [ 1833.544292][T25333] ? find_held_lock+0x35/0x130 [ 1833.549073][T25333] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1833.554896][T25333] ? ___might_sleep+0x163/0x280 [ 1833.559762][T25333] __should_failslab+0x121/0x190 [ 1833.564713][T25333] should_failslab+0x9/0x14 [ 1833.569234][T25333] kmem_cache_alloc+0x2b2/0x6f0 [ 1833.574098][T25333] ? __put_user_ns+0x70/0x70 [ 1833.578693][T25333] ? shmem_alloc_inode+0x1c/0x50 [ 1833.583652][T25333] ? rcu_read_lock_sched_held+0x110/0x130 [ 1833.589390][T25333] security_inode_alloc+0x39/0x160 [ 1833.594519][T25333] inode_init_always+0x56e/0xb50 [ 1833.599471][T25333] alloc_inode+0x83/0x190 [ 1833.603829][T25333] new_inode_pseudo+0x19/0xf0 [ 1833.608523][T25333] new_inode+0x1f/0x40 [ 1833.612606][T25333] shmem_get_inode+0x84/0x7e0 [ 1833.617307][T25333] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1833.622878][T25333] shmem_file_setup+0x66/0x90 [ 1833.627619][T25333] __x64_sys_memfd_create+0x2a2/0x470 [ 1833.633002][T25333] ? memfd_fcntl+0x1550/0x1550 [ 1833.637779][T25333] ? do_syscall_64+0x26/0x610 [ 1833.642477][T25333] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1833.647784][T25333] ? trace_hardirqs_on+0x67/0x230 [ 1833.652844][T25333] do_syscall_64+0x103/0x610 [ 1833.657459][T25333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1833.663377][T25333] RIP: 0033:0x458da9 08:13:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x300, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1833.667304][T25333] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1833.686931][T25333] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1833.686947][T25333] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 1833.686955][T25333] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 1833.686962][T25333] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 08:13:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7a}, 0x0) [ 1833.686969][T25333] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5eb3af36d4 [ 1833.686975][T25333] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1833.694489][T25355] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0}, 0x0) 08:13:39 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000300"/96], 0x60) 08:13:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8100000000000000}, 0x0) 08:13:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x300}, 0x0) 08:13:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x500, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1833.929865][T25491] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000500"/96], 0x60) [ 1834.011123][T25503] FAULT_INJECTION: forcing a failure. [ 1834.011123][T25503] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.024115][T25503] CPU: 1 PID: 25503 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1834.037276][T25503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1834.047439][T25503] Call Trace: [ 1834.050772][T25503] dump_stack+0x172/0x1f0 [ 1834.055146][T25503] should_fail.cold+0xa/0x15 [ 1834.059768][T25503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1834.065618][T25503] ? ___might_sleep+0x163/0x280 [ 1834.070483][T25503] __should_failslab+0x121/0x190 [ 1834.070501][T25503] should_failslab+0x9/0x14 [ 1834.070519][T25503] kmem_cache_alloc+0x2b2/0x6f0 [ 1834.070533][T25503] ? current_time+0x6b/0x140 [ 1834.070555][T25503] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1834.095213][T25503] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1834.095243][T25503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.095259][T25503] ? timespec64_trunc+0xf0/0x180 [ 1834.095273][T25503] __d_alloc+0x2e/0x8c0 [ 1834.095290][T25503] d_alloc_pseudo+0x1e/0x30 [ 1834.095305][T25503] alloc_file_pseudo+0xe2/0x280 [ 1834.095319][T25503] ? alloc_file+0x4d0/0x4d0 [ 1834.095334][T25503] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1834.095361][T25503] __shmem_file_setup.part.0+0x108/0x2b0 [ 1834.095381][T25503] shmem_file_setup+0x66/0x90 [ 1834.136066][T25503] __x64_sys_memfd_create+0x2a2/0x470 [ 1834.136082][T25503] ? memfd_fcntl+0x1550/0x1550 [ 1834.136099][T25503] ? do_syscall_64+0x26/0x610 08:13:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x500}, 0x0) [ 1834.136114][T25503] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1834.136130][T25503] ? trace_hardirqs_on+0x67/0x230 [ 1834.136148][T25503] do_syscall_64+0x103/0x610 [ 1834.136168][T25503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1834.136180][T25503] RIP: 0033:0x458da9 [ 1834.136204][T25503] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:13:40 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) [ 1834.151872][T25503] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1834.151890][T25503] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 1834.151899][T25503] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 1834.151909][T25503] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1834.151918][T25503] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5eb3af36d4 [ 1834.151926][T25503] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1834.328260][T25553] FAULT_INJECTION: forcing a failure. [ 1834.328260][T25553] name failslab, interval 1, probability 0, space 0, times 0 [ 1834.377097][T25569] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1834.380254][T25553] CPU: 1 PID: 25553 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1834.396009][T25553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1834.406071][T25553] Call Trace: [ 1834.409389][T25553] dump_stack+0x172/0x1f0 [ 1834.413740][T25553] should_fail.cold+0xa/0x15 [ 1834.418348][T25553] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1834.424173][T25553] ? ___might_sleep+0x163/0x280 [ 1834.429039][T25553] __should_failslab+0x121/0x190 [ 1834.433995][T25553] should_failslab+0x9/0x14 [ 1834.438519][T25553] kmem_cache_alloc+0x2b2/0x6f0 [ 1834.443393][T25553] __alloc_file+0x27/0x300 [ 1834.447833][T25553] alloc_empty_file+0x72/0x170 [ 1834.452609][T25553] alloc_file+0x5e/0x4d0 [ 1834.456866][T25553] alloc_file_pseudo+0x189/0x280 [ 1834.461826][T25553] ? alloc_file+0x4d0/0x4d0 [ 1834.466349][T25553] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1834.472619][T25553] __shmem_file_setup.part.0+0x108/0x2b0 [ 1834.478292][T25553] shmem_file_setup+0x66/0x90 [ 1834.482991][T25553] __x64_sys_memfd_create+0x2a2/0x470 [ 1834.488385][T25553] ? memfd_fcntl+0x1550/0x1550 [ 1834.493163][T25553] ? do_syscall_64+0x26/0x610 [ 1834.497861][T25553] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1834.503161][T25553] ? trace_hardirqs_on+0x67/0x230 [ 1834.508305][T25553] do_syscall_64+0x103/0x610 [ 1834.512921][T25553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1834.518827][T25553] RIP: 0033:0x458da9 [ 1834.522824][T25553] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1834.542454][T25553] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1834.550900][T25553] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 1834.558897][T25553] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 1834.566894][T25553] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 08:13:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x600}, 0x0) 08:13:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x9d1b000000000000}, 0x0) 08:13:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000600"/96], 0x60) 08:13:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1834.574891][T25553] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5eb3af36d4 [ 1834.582886][T25553] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x600, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1834.681547][T25622] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) 08:13:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000700"/96], 0x60) 08:13:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x700}, 0x0) 08:13:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1834.805603][T25633] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:40 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x700, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:40 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf00}, 0x0) 08:13:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) 08:13:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000a00"/96], 0x60) [ 1835.056209][T25776] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x2000}, 0x0) 08:13:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x900, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 1835.107490][T25854] FAULT_INJECTION: forcing a failure. [ 1835.107490][T25854] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.186674][T25854] CPU: 0 PID: 25854 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1835.194734][T25854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1835.204816][T25854] Call Trace: [ 1835.208137][T25854] dump_stack+0x172/0x1f0 [ 1835.212502][T25854] should_fail.cold+0xa/0x15 [ 1835.217129][T25854] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1835.222965][T25854] ? ___might_sleep+0x163/0x280 [ 1835.227837][T25854] __should_failslab+0x121/0x190 08:13:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x2839}, 0x0) [ 1835.232797][T25854] should_failslab+0x9/0x14 [ 1835.237321][T25854] kmem_cache_alloc+0x2b2/0x6f0 [ 1835.242183][T25854] ? rcu_read_lock_sched_held+0x110/0x130 [ 1835.247917][T25854] ? kmem_cache_alloc+0x32e/0x6f0 [ 1835.252964][T25854] security_file_alloc+0x39/0x170 [ 1835.258011][T25854] __alloc_file+0xac/0x300 [ 1835.262445][T25854] alloc_empty_file+0x72/0x170 [ 1835.267238][T25854] alloc_file+0x5e/0x4d0 [ 1835.271501][T25854] alloc_file_pseudo+0x189/0x280 [ 1835.276461][T25854] ? alloc_file+0x4d0/0x4d0 [ 1835.280990][T25854] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 08:13:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3928}, 0x0) [ 1835.287271][T25854] __shmem_file_setup.part.0+0x108/0x2b0 [ 1835.292938][T25854] shmem_file_setup+0x66/0x90 [ 1835.297641][T25854] __x64_sys_memfd_create+0x2a2/0x470 [ 1835.303035][T25854] ? memfd_fcntl+0x1550/0x1550 [ 1835.307817][T25854] ? do_syscall_64+0x26/0x610 [ 1835.312517][T25854] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1835.317815][T25854] ? trace_hardirqs_on+0x67/0x230 [ 1835.322862][T25854] do_syscall_64+0x103/0x610 [ 1835.327475][T25854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1835.333395][T25854] RIP: 0033:0x458da9 08:13:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3f00}, 0x0) [ 1835.337336][T25854] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1835.356969][T25854] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1835.365504][T25854] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 1835.373502][T25854] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 08:13:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4000}, 0x0) [ 1835.381499][T25854] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1835.390278][T25854] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5eb3af36d4 [ 1835.398279][T25854] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:41 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100002000"/96], 0x60) 08:13:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4800}, 0x0) [ 1835.486283][T25874] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 08:13:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100003f00"/96], 0x60) [ 1835.606519][T25979] FAULT_INJECTION: forcing a failure. [ 1835.606519][T25979] name failslab, interval 1, probability 0, space 0, times 0 08:13:41 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xa00, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4c00}, 0x0) [ 1835.684708][T25985] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1835.698552][T25979] CPU: 0 PID: 25979 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1835.706574][T25979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1835.716669][T25979] Call Trace: [ 1835.716706][T25979] dump_stack+0x172/0x1f0 [ 1835.716730][T25979] should_fail.cold+0xa/0x15 [ 1835.716751][T25979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1835.716772][T25979] ? ___might_sleep+0x163/0x280 [ 1835.716791][T25979] __should_failslab+0x121/0x190 [ 1835.716809][T25979] should_failslab+0x9/0x14 [ 1835.716827][T25979] kmem_cache_alloc+0x2b2/0x6f0 [ 1835.716857][T25979] ? rcu_read_lock_sched_held+0x110/0x130 [ 1835.734861][T25979] ? kmem_cache_alloc+0x32e/0x6f0 [ 1835.734887][T25979] security_file_alloc+0x39/0x170 [ 1835.734907][T25979] __alloc_file+0xac/0x300 [ 1835.734922][T25979] alloc_empty_file+0x72/0x170 [ 1835.734937][T25979] alloc_file+0x5e/0x4d0 [ 1835.734952][T25979] alloc_file_pseudo+0x189/0x280 [ 1835.734966][T25979] ? alloc_file+0x4d0/0x4d0 [ 1835.734983][T25979] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1835.735016][T25979] __shmem_file_setup.part.0+0x108/0x2b0 [ 1835.741605][T25991] sel_write_load: 12 callbacks suppressed [ 1835.741613][T25991] SELinux: failed to load policy [ 1835.744824][T25979] shmem_file_setup+0x66/0x90 [ 1835.744844][T25979] __x64_sys_memfd_create+0x2a2/0x470 [ 1835.744858][T25979] ? memfd_fcntl+0x1550/0x1550 [ 1835.744875][T25979] ? do_syscall_64+0x26/0x610 [ 1835.744899][T25979] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1835.839985][T25979] ? trace_hardirqs_on+0x67/0x230 [ 1835.845024][T25979] do_syscall_64+0x103/0x610 [ 1835.849631][T25979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1835.855550][T25979] RIP: 0033:0x458da9 [ 1835.859456][T25979] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1835.879082][T25979] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1835.887510][T25979] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458da9 [ 1835.895500][T25979] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdd07 [ 1835.903485][T25979] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1835.911464][T25979] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5eb3af36d4 [ 1835.919442][T25979] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) 08:13:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100004800"/96], 0x60) 08:13:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6000}, 0x0) 08:13:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1836.094347][T26099] SELinux: failed to load policy [ 1836.131697][T26100] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:42 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100004c00"/96], 0x60) 08:13:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6800}, 0x0) 08:13:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6c00}, 0x0) [ 1836.352832][T26115] SELinux: failed to load policy [ 1836.360173][T26118] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100006000"/96], 0x60) [ 1836.438568][T26121] FAULT_INJECTION: forcing a failure. [ 1836.438568][T26121] name failslab, interval 1, probability 0, space 0, times 0 [ 1836.451247][T26121] CPU: 0 PID: 26121 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1836.459260][T26121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1836.469355][T26121] Call Trace: [ 1836.472678][T26121] dump_stack+0x172/0x1f0 [ 1836.477041][T26121] should_fail.cold+0xa/0x15 [ 1836.481680][T26121] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1836.487497][T26121] ? is_dynamic_key+0x1c0/0x1c0 [ 1836.492361][T26121] __should_failslab+0x121/0x190 [ 1836.497326][T26121] should_failslab+0x9/0x14 [ 1836.501842][T26121] kmem_cache_alloc+0x47/0x6f0 [ 1836.506623][T26121] ? lock_downgrade+0x880/0x880 [ 1836.511494][T26121] xas_alloc+0x2df/0x3d0 [ 1836.515747][T26121] xas_create+0x2cd/0x1040 [ 1836.520182][T26121] xas_create_range+0x198/0x5d0 [ 1836.525059][T26121] shmem_add_to_page_cache+0x6f3/0x1200 [ 1836.530626][T26121] ? shmem_writepage+0xe90/0xe90 [ 1836.535586][T26121] shmem_getpage_gfp+0x6db/0x2500 [ 1836.540637][T26121] ? shmem_unuse_inode+0x1010/0x1010 [ 1836.545937][T26121] ? current_time+0x6b/0x140 [ 1836.550537][T26121] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1836.556365][T26121] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1836.562635][T26121] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1836.568570][T26121] shmem_write_begin+0x105/0x1e0 [ 1836.573553][T26121] generic_perform_write+0x231/0x530 [ 1836.578905][T26121] ? page_endio+0x780/0x780 [ 1836.583451][T26121] ? current_time+0x140/0x140 [ 1836.588158][T26121] ? lock_acquire+0x16f/0x3f0 [ 1836.592858][T26121] __generic_file_write_iter+0x25e/0x630 [ 1836.598516][T26121] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1836.604294][T26121] generic_file_write_iter+0x360/0x610 [ 1836.609787][T26121] ? __generic_file_write_iter+0x630/0x630 [ 1836.615704][T26121] ? inode_has_perm+0x1b0/0x230 [ 1836.620574][T26121] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1836.626834][T26121] ? iov_iter_init+0xee/0x220 [ 1836.631535][T26121] new_sync_write+0x4c7/0x760 [ 1836.636244][T26121] ? default_llseek+0x2e0/0x2e0 [ 1836.641132][T26121] __vfs_write+0xe4/0x110 [ 1836.645478][T26121] vfs_write+0x20c/0x580 [ 1836.649745][T26121] ksys_pwrite64+0x183/0x1c0 [ 1836.654368][T26121] ? __ia32_sys_pread64+0xf0/0xf0 [ 1836.659414][T26121] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1836.664894][T26121] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1836.670377][T26121] ? do_syscall_64+0x26/0x610 [ 1836.675071][T26121] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1836.681152][T26121] ? do_syscall_64+0x26/0x610 [ 1836.685849][T26121] __x64_sys_pwrite64+0x97/0xf0 [ 1836.690738][T26121] do_syscall_64+0x103/0x610 [ 1836.695351][T26121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1836.701252][T26121] RIP: 0033:0x412da7 [ 1836.705150][T26121] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1836.724768][T26121] RSP: 002b:00007f5eb3af2a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 08:13:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1836.733212][T26121] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412da7 [ 1836.741204][T26121] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 1836.749192][T26121] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1836.757187][T26121] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1836.765178][T26121] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xe00, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1836.843772][T26227] SELinux: failed to load policy 08:13:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7400}, 0x0) [ 1836.866745][T26231] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100006800"/96], 0x60) [ 1836.999573][T26241] SELinux: failed to load policy 08:13:43 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7a00}, 0x0) 08:13:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100006c00"/96], 0x60) 08:13:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xf24, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1837.248736][T26354] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1837.266086][T26353] SELinux: failed to load policy [ 1837.271020][T26358] FAULT_INJECTION: forcing a failure. [ 1837.271020][T26358] name failslab, interval 1, probability 0, space 0, times 0 [ 1837.283685][T26358] CPU: 1 PID: 26358 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1837.291672][T26358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1837.301746][T26358] Call Trace: [ 1837.305073][T26358] dump_stack+0x172/0x1f0 [ 1837.309440][T26358] should_fail.cold+0xa/0x15 [ 1837.314061][T26358] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1837.319893][T26358] ? is_dynamic_key+0x1c0/0x1c0 [ 1837.324770][T26358] __should_failslab+0x121/0x190 [ 1837.329774][T26358] should_failslab+0x9/0x14 [ 1837.334317][T26358] kmem_cache_alloc+0x47/0x6f0 [ 1837.339105][T26358] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1837.344866][T26358] xas_alloc+0x2df/0x3d0 08:13:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x8100}, 0x0) [ 1837.344887][T26358] xas_create+0x2cd/0x1040 [ 1837.344914][T26358] xas_create_range+0x198/0x5d0 [ 1837.344940][T26358] shmem_add_to_page_cache+0x6f3/0x1200 [ 1837.344963][T26358] ? shmem_writepage+0xe90/0xe90 [ 1837.344991][T26358] shmem_getpage_gfp+0x6db/0x2500 [ 1837.345019][T26358] ? shmem_unuse_inode+0x1010/0x1010 [ 1837.345042][T26358] ? current_time+0x6b/0x140 [ 1837.353719][T26358] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 1837.353738][T26358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1837.353757][T26358] ? iov_iter_fault_in_readable+0x22c/0x450 [ 1837.353780][T26358] shmem_write_begin+0x105/0x1e0 [ 1837.353802][T26358] generic_perform_write+0x231/0x530 [ 1837.353833][T26358] ? page_endio+0x780/0x780 [ 1837.353848][T26358] ? current_time+0x140/0x140 [ 1837.353865][T26358] ? lock_acquire+0x16f/0x3f0 [ 1837.353886][T26358] __generic_file_write_iter+0x25e/0x630 [ 1837.353908][T26358] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1837.364337][T26358] generic_file_write_iter+0x360/0x610 [ 1837.364361][T26358] ? __generic_file_write_iter+0x630/0x630 [ 1837.364375][T26358] ? inode_has_perm+0x1b0/0x230 [ 1837.364391][T26358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1837.364406][T26358] ? iov_iter_init+0xee/0x220 [ 1837.364426][T26358] new_sync_write+0x4c7/0x760 [ 1837.364453][T26358] ? default_llseek+0x2e0/0x2e0 [ 1837.390128][T26358] __vfs_write+0xe4/0x110 [ 1837.390151][T26358] vfs_write+0x20c/0x580 [ 1837.402300][T26358] ksys_pwrite64+0x183/0x1c0 [ 1837.402319][T26358] ? __ia32_sys_pread64+0xf0/0xf0 [ 1837.402336][T26358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1837.402359][T26358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1837.426433][T26358] ? do_syscall_64+0x26/0x610 [ 1837.426451][T26358] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1837.426464][T26358] ? do_syscall_64+0x26/0x610 [ 1837.426486][T26358] __x64_sys_pwrite64+0x97/0xf0 [ 1837.426506][T26358] do_syscall_64+0x103/0x610 [ 1837.426523][T26358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1837.426535][T26358] RIP: 0033:0x412da7 [ 1837.426550][T26358] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1837.426558][T26358] RSP: 002b:00007f5eb3af2a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1837.426572][T26358] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412da7 [ 1837.426580][T26358] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 1837.426597][T26358] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1837.454117][T26358] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 08:13:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf000}, 0x0) [ 1837.454126][T26358] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100007400"/96], 0x60) 08:13:43 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x34000}, 0x0) [ 1837.789710][T26409] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1837.790499][T26437] SELinux: failed to load policy 08:13:43 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x1f00, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:43 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x40000}, 0x0) [ 1837.934140][T26479] FAULT_INJECTION: forcing a failure. [ 1837.934140][T26479] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1837.947428][T26479] CPU: 0 PID: 26479 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1837.955419][T26479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1837.965485][T26479] Call Trace: [ 1837.968797][T26479] dump_stack+0x172/0x1f0 [ 1837.973148][T26479] should_fail.cold+0xa/0x15 [ 1837.977767][T26479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1837.983609][T26479] ? __lock_acquire+0x548/0x3fb0 [ 1837.988569][T26479] should_fail_alloc_page+0x50/0x60 [ 1837.993783][T26479] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1837.999179][T26479] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1838.004913][T26479] ? find_held_lock+0x35/0x130 [ 1838.009702][T26479] ? new_sync_write+0x527/0x760 [ 1838.014575][T26479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1838.020404][T26479] cache_grow_begin+0x9c/0x860 [ 1838.025177][T26479] ? getname_flags+0xd6/0x5b0 [ 1838.029867][T26479] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1838.036129][T26479] kmem_cache_alloc+0x62d/0x6f0 [ 1838.040994][T26479] ? lock_downgrade+0x880/0x880 [ 1838.045863][T26479] getname_flags+0xd6/0x5b0 [ 1838.050390][T26479] getname+0x1a/0x20 [ 1838.054296][T26479] do_sys_open+0x2c9/0x5d0 [ 1838.058742][T26479] ? filp_open+0x80/0x80 [ 1838.063004][T26479] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1838.068473][T26479] ? do_syscall_64+0x26/0x610 [ 1838.073170][T26479] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1838.079257][T26479] ? do_syscall_64+0x26/0x610 [ 1838.083954][T26479] __x64_sys_open+0x7e/0xc0 [ 1838.088470][T26479] do_syscall_64+0x103/0x610 [ 1838.093081][T26479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1838.098977][T26479] RIP: 0033:0x412d41 [ 1838.102888][T26479] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1838.122535][T26479] RSP: 002b:00007f5eb3af2a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 08:13:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100007a00"/96], 0x60) 08:13:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1838.131060][T26479] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412d41 [ 1838.139045][T26479] RDX: 00007f5eb3af2b0a RSI: 0000000000000002 RDI: 00007f5eb3af2b00 [ 1838.147907][T26479] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1838.155897][T26479] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1838.163888][T26479] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x400300}, 0x0) [ 1838.248696][T26588] SELinux: failed to load policy 08:13:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000100"/96], 0x60) [ 1838.349507][T26609] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffff}, 0x0) 08:13:44 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffffffffffe0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1838.489581][T26702] SELinux: failed to load policy 08:13:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x240f, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000200"/96], 0x60) 08:13:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x1000000}, 0x0) [ 1838.560336][T26708] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1838.641126][T26718] FAULT_INJECTION: forcing a failure. [ 1838.641126][T26718] name failslab, interval 1, probability 0, space 0, times 0 [ 1838.690648][T26718] CPU: 1 PID: 26718 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1838.698693][T26718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1838.708758][T26718] Call Trace: [ 1838.712074][T26718] dump_stack+0x172/0x1f0 [ 1838.716425][T26718] should_fail.cold+0xa/0x15 [ 1838.721033][T26718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1838.726871][T26718] ? ___might_sleep+0x163/0x280 [ 1838.731741][T26718] __should_failslab+0x121/0x190 [ 1838.736692][T26718] should_failslab+0x9/0x14 [ 1838.741206][T26718] kmem_cache_alloc+0x2b2/0x6f0 [ 1838.746079][T26718] ? __save_stack_trace+0x99/0x100 [ 1838.751202][T26718] __alloc_file+0x27/0x300 [ 1838.755639][T26718] alloc_empty_file+0x72/0x170 [ 1838.760434][T26718] path_openat+0xef/0x46e0 [ 1838.764870][T26718] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1838.770684][T26718] ? kasan_slab_alloc+0xf/0x20 [ 1838.775458][T26718] ? kmem_cache_alloc+0x11a/0x6f0 [ 1838.780491][T26718] ? getname_flags+0xd6/0x5b0 [ 1838.785168][T26718] ? getname+0x1a/0x20 [ 1838.789245][T26718] ? do_sys_open+0x2c9/0x5d0 [ 1838.793862][T26718] ? __x64_sys_open+0x7e/0xc0 [ 1838.798541][T26718] ? do_syscall_64+0x103/0x610 [ 1838.803307][T26718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1838.809387][T26718] ? __lock_acquire+0x548/0x3fb0 [ 1838.814441][T26718] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1838.819860][T26718] ? __alloc_fd+0x44d/0x560 [ 1838.824392][T26718] do_filp_open+0x1a1/0x280 [ 1838.828907][T26718] ? may_open_dev+0x100/0x100 [ 1838.833599][T26718] ? lock_downgrade+0x880/0x880 [ 1838.838475][T26718] ? kasan_check_read+0x11/0x20 [ 1838.843343][T26718] ? do_raw_spin_unlock+0x57/0x270 [ 1838.848477][T26718] ? _raw_spin_unlock+0x2d/0x50 [ 1838.853344][T26718] ? __alloc_fd+0x44d/0x560 [ 1838.857882][T26718] do_sys_open+0x3fe/0x5d0 [ 1838.862317][T26718] ? filp_open+0x80/0x80 [ 1838.866576][T26718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1838.872046][T26718] ? do_syscall_64+0x26/0x610 [ 1838.876741][T26718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1838.882825][T26718] ? do_syscall_64+0x26/0x610 [ 1838.887524][T26718] __x64_sys_open+0x7e/0xc0 [ 1838.892138][T26718] do_syscall_64+0x103/0x610 [ 1838.896771][T26718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1838.902672][T26718] RIP: 0033:0x412d41 [ 1838.906573][T26718] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1838.926194][T26718] RSP: 002b:00007f5eb3af2a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1838.934634][T26718] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412d41 [ 1838.942629][T26718] RDX: 00007f5eb3af2b0a RSI: 0000000000000002 RDI: 00007f5eb3af2b00 [ 1838.950618][T26718] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1838.958627][T26718] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1838.966616][T26718] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1838.977929][T26722] SELinux: failed to load policy 08:13:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x2000000}, 0x0) 08:13:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000300"/96], 0x60) [ 1839.034358][T26751] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x31c1, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:45 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000400"/96], 0x60) [ 1839.179964][T26837] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3000000}, 0x0) 08:13:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4000000}, 0x0) 08:13:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000500"/96], 0x60) 08:13:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1839.434686][T26926] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x3f00, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x5000000}, 0x0) 08:13:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000600"/96], 0x60) [ 1839.564942][T26846] FAULT_INJECTION: forcing a failure. [ 1839.564942][T26846] name failslab, interval 1, probability 0, space 0, times 0 [ 1839.589105][T26966] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1839.604070][T26846] CPU: 0 PID: 26846 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1839.612102][T26846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1839.622175][T26846] Call Trace: [ 1839.622210][T26846] dump_stack+0x172/0x1f0 [ 1839.622245][T26846] should_fail.cold+0xa/0x15 [ 1839.622273][T26846] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1839.629893][T26846] ? ___might_sleep+0x163/0x280 [ 1839.629914][T26846] __should_failslab+0x121/0x190 [ 1839.629934][T26846] should_failslab+0x9/0x14 [ 1839.645184][T26846] kmem_cache_alloc+0x2b2/0x6f0 [ 1839.645204][T26846] ? lock_downgrade+0x880/0x880 [ 1839.645236][T26846] getname_flags+0xd6/0x5b0 [ 1839.654687][T26846] getname+0x1a/0x20 [ 1839.664422][T26846] do_sys_open+0x2c9/0x5d0 [ 1839.664440][T26846] ? filp_open+0x80/0x80 [ 1839.664457][T26846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1839.664471][T26846] ? do_syscall_64+0x26/0x610 [ 1839.664496][T26846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1839.681539][T26846] ? do_syscall_64+0x26/0x610 [ 1839.681564][T26846] __x64_sys_open+0x7e/0xc0 [ 1839.681582][T26846] do_syscall_64+0x103/0x610 [ 1839.681605][T26846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1839.697893][T26846] RIP: 0033:0x412d41 [ 1839.697910][T26846] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1839.697917][T26846] RSP: 002b:00007f5eb3af2a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1839.697930][T26846] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412d41 [ 1839.697939][T26846] RDX: 00007f5eb3af2b0a RSI: 0000000000000002 RDI: 00007f5eb3af2b00 [ 1839.697947][T26846] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1839.697963][T26846] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1839.707135][T26846] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:45 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000700"/96], 0x60) 08:13:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6000000}, 0x0) 08:13:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7000000}, 0x0) [ 1839.927329][T27085] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000a00"/96], 0x60) [ 1839.981351][T27086] FAULT_INJECTION: forcing a failure. [ 1839.981351][T27086] name failslab, interval 1, probability 0, space 0, times 0 [ 1840.008410][T27086] CPU: 1 PID: 27086 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1840.016471][T27086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1840.026549][T27086] Call Trace: [ 1840.029884][T27086] dump_stack+0x172/0x1f0 [ 1840.034268][T27086] should_fail.cold+0xa/0x15 [ 1840.038896][T27086] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1840.044741][T27086] ? ___might_sleep+0x163/0x280 [ 1840.049624][T27086] __should_failslab+0x121/0x190 [ 1840.054592][T27086] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1840.060160][T27086] should_failslab+0x9/0x14 [ 1840.064695][T27086] kmem_cache_alloc_trace+0x2d1/0x760 [ 1840.070096][T27086] ? lockdep_init_map+0x1be/0x6d0 [ 1840.075148][T27086] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1840.080638][T27086] __kthread_create_on_node+0xf2/0x460 [ 1840.086127][T27086] ? lock_acquire+0x16f/0x3f0 [ 1840.090841][T27086] ? kthread_parkme+0xb0/0xb0 [ 1840.095553][T27086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.101839][T27086] ? kasan_check_read+0x11/0x20 [ 1840.106723][T27086] ? mutex_trylock+0x1e0/0x1e0 [ 1840.111509][T27086] ? loop_info64_to_compat+0x6d0/0x6d0 [ 1840.116997][T27086] kthread_create_on_node+0xbb/0xf0 [ 1840.122218][T27086] ? __kthread_create_on_node+0x460/0x460 [ 1840.127972][T27086] ? lockdep_init_map+0x1be/0x6d0 [ 1840.133013][T27086] ? lockdep_init_map+0x1be/0x6d0 [ 1840.138068][T27086] lo_ioctl+0xc1b/0x2150 [ 1840.142344][T27086] ? lo_rw_aio+0x1120/0x1120 [ 1840.146962][T27086] blkdev_ioctl+0x6f2/0x1d10 [ 1840.151582][T27086] ? blkpg_ioctl+0xa90/0xa90 [ 1840.156203][T27086] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1840.162060][T27086] ? ___might_sleep+0x163/0x280 [ 1840.167456][T27086] block_ioctl+0xee/0x130 [ 1840.171825][T27086] ? blkdev_fallocate+0x410/0x410 [ 1840.176891][T27086] do_vfs_ioctl+0xd6e/0x1390 [ 1840.181520][T27086] ? ioctl_preallocate+0x210/0x210 [ 1840.186649][T27086] ? selinux_file_mprotect+0x620/0x620 [ 1840.192131][T27086] ? __fget+0x381/0x550 [ 1840.196325][T27086] ? ksys_dup3+0x3e0/0x3e0 [ 1840.200768][T27086] ? do_sys_open+0x31d/0x5d0 [ 1840.205388][T27086] ? tomoyo_file_ioctl+0x23/0x30 [ 1840.210350][T27086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.216622][T27086] ? security_file_ioctl+0x93/0xc0 [ 1840.221765][T27086] ksys_ioctl+0xab/0xd0 [ 1840.225936][T27086] __x64_sys_ioctl+0x73/0xb0 [ 1840.230542][T27086] do_syscall_64+0x103/0x610 [ 1840.235158][T27086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1840.241063][T27086] RIP: 0033:0x458c17 [ 1840.244986][T27086] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1840.264608][T27086] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1840.273051][T27086] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 08:13:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4800, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1840.281055][T27086] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1840.289062][T27086] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1840.297069][T27086] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1840.305065][T27086] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf000000}, 0x0) [ 1840.386544][T27197] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:46 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000002000"/96], 0x60) 08:13:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x20000000}, 0x0) 08:13:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x4, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1840.533323][T27213] FAULT_INJECTION: forcing a failure. [ 1840.533323][T27213] name failslab, interval 1, probability 0, space 0, times 0 [ 1840.579519][T27213] CPU: 0 PID: 27213 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1840.587575][T27213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1840.597733][T27213] Call Trace: [ 1840.601056][T27213] dump_stack+0x172/0x1f0 [ 1840.605407][T27213] should_fail.cold+0xa/0x15 [ 1840.610019][T27213] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1840.615843][T27213] ? ___might_sleep+0x163/0x280 [ 1840.620711][T27213] __should_failslab+0x121/0x190 08:13:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x39280000}, 0x0) 08:13:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x4c00, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1840.625660][T27213] should_failslab+0x9/0x14 [ 1840.630177][T27213] kmem_cache_alloc+0x2b2/0x6f0 [ 1840.635049][T27213] ? __schedule+0x1383/0x1cc0 [ 1840.639755][T27213] __kernfs_new_node+0xef/0x690 [ 1840.644618][T27213] ? _raw_spin_unlock_irq+0x28/0x90 [ 1840.649828][T27213] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1840.655316][T27213] ? kasan_check_read+0x11/0x20 [ 1840.660208][T27213] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1840.665414][T27213] ? __schedule+0x1383/0x1cc0 [ 1840.670125][T27213] ? __lock_acquire+0x548/0x3fb0 [ 1840.675075][T27213] kernfs_new_node+0x99/0x130 [ 1840.679775][T27213] kernfs_create_dir_ns+0x52/0x160 [ 1840.684888][T27213] internal_create_group+0x7f8/0xc40 [ 1840.690269][T27213] ? bd_set_size+0x89/0xb0 [ 1840.694683][T27213] ? remove_files.isra.0+0x190/0x190 [ 1840.699970][T27213] sysfs_create_group+0x20/0x30 [ 1840.704818][T27213] lo_ioctl+0x10af/0x2150 [ 1840.709142][T27213] ? lo_rw_aio+0x1120/0x1120 [ 1840.713726][T27213] blkdev_ioctl+0x6f2/0x1d10 [ 1840.718305][T27213] ? blkpg_ioctl+0xa90/0xa90 [ 1840.722891][T27213] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1840.728720][T27213] ? ___might_sleep+0x163/0x280 [ 1840.733652][T27213] block_ioctl+0xee/0x130 [ 1840.737970][T27213] ? blkdev_fallocate+0x410/0x410 [ 1840.742990][T27213] do_vfs_ioctl+0xd6e/0x1390 [ 1840.747584][T27213] ? ioctl_preallocate+0x210/0x210 [ 1840.752687][T27213] ? selinux_file_mprotect+0x620/0x620 [ 1840.758136][T27213] ? __fget+0x381/0x550 [ 1840.762298][T27213] ? ksys_dup3+0x3e0/0x3e0 [ 1840.766730][T27213] ? do_sys_open+0x31d/0x5d0 [ 1840.771347][T27213] ? tomoyo_file_ioctl+0x23/0x30 [ 1840.776300][T27213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.782675][T27213] ? security_file_ioctl+0x93/0xc0 [ 1840.787796][T27213] ksys_ioctl+0xab/0xd0 [ 1840.791942][T27213] __x64_sys_ioctl+0x73/0xb0 [ 1840.796526][T27213] do_syscall_64+0x103/0x610 [ 1840.801107][T27213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1840.806993][T27213] RIP: 0033:0x458c17 [ 1840.811059][T27213] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:13:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000003f00"/96], 0x60) [ 1840.830701][T27213] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1840.839134][T27213] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1840.847106][T27213] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1840.855095][T27213] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1840.863062][T27213] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1840.871060][T27213] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3f000000}, 0x0) [ 1840.941071][T27314] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1840.966208][T27320] sel_write_load: 7 callbacks suppressed [ 1840.966216][T27320] SELinux: failed to load policy 08:13:46 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000004800"/96], 0x60) 08:13:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x5, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1841.122993][T27352] FAULT_INJECTION: forcing a failure. [ 1841.122993][T27352] name failslab, interval 1, probability 0, space 0, times 0 08:13:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x40000000}, 0x0) [ 1841.192963][T27434] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1841.207120][T27352] CPU: 1 PID: 27352 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1841.215153][T27352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1841.220856][T27435] SELinux: failed to load policy [ 1841.225236][T27352] Call Trace: [ 1841.225276][T27352] dump_stack+0x172/0x1f0 [ 1841.225298][T27352] should_fail.cold+0xa/0x15 08:13:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x5865, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000004c00"/96], 0x60) [ 1841.225322][T27352] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1841.225345][T27352] ? ___might_sleep+0x163/0x280 [ 1841.225368][T27352] __should_failslab+0x121/0x190 [ 1841.225387][T27352] should_failslab+0x9/0x14 [ 1841.225416][T27352] kmem_cache_alloc+0x2b2/0x6f0 [ 1841.267577][T27352] __kernfs_new_node+0xef/0x690 [ 1841.272461][T27352] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1841.277967][T27352] ? __lock_acquire+0x548/0x3fb0 [ 1841.282946][T27352] kernfs_new_node+0x99/0x130 [ 1841.287667][T27352] kernfs_create_dir_ns+0x52/0x160 [ 1841.292820][T27352] internal_create_group+0x7f8/0xc40 [ 1841.298127][T27352] ? bd_set_size+0x89/0xb0 [ 1841.303014][T27352] ? remove_files.isra.0+0x190/0x190 [ 1841.308350][T27352] sysfs_create_group+0x20/0x30 [ 1841.313234][T27352] lo_ioctl+0x10af/0x2150 [ 1841.317591][T27352] ? lo_rw_aio+0x1120/0x1120 [ 1841.322198][T27352] blkdev_ioctl+0x6f2/0x1d10 [ 1841.326903][T27352] ? blkpg_ioctl+0xa90/0xa90 [ 1841.331512][T27352] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1841.337359][T27352] ? ___might_sleep+0x163/0x280 08:13:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1841.342254][T27352] block_ioctl+0xee/0x130 [ 1841.346601][T27352] ? blkdev_fallocate+0x410/0x410 [ 1841.351674][T27352] do_vfs_ioctl+0xd6e/0x1390 [ 1841.356289][T27352] ? ioctl_preallocate+0x210/0x210 [ 1841.361425][T27352] ? selinux_file_mprotect+0x620/0x620 [ 1841.366937][T27352] ? __fget+0x381/0x550 [ 1841.371123][T27352] ? ksys_dup3+0x3e0/0x3e0 [ 1841.375565][T27352] ? do_sys_open+0x31d/0x5d0 [ 1841.380182][T27352] ? tomoyo_file_ioctl+0x23/0x30 [ 1841.385156][T27352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1841.391420][T27352] ? security_file_ioctl+0x93/0xc0 [ 1841.396555][T27352] ksys_ioctl+0xab/0xd0 [ 1841.400735][T27352] __x64_sys_ioctl+0x73/0xb0 [ 1841.405352][T27352] do_syscall_64+0x103/0x610 [ 1841.409964][T27352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1841.415870][T27352] RIP: 0033:0x458c17 [ 1841.419773][T27352] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:13:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1841.439404][T27352] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1841.447855][T27352] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1841.455862][T27352] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1841.463857][T27352] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1841.471853][T27352] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1841.479845][T27352] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1841.545736][T27446] SELinux: failed to load policy 08:13:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x48000000}, 0x0) 08:13:47 executing program 0 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000006000"/96], 0x60) [ 1841.664292][T27454] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4c000000}, 0x0) [ 1841.733926][T27505] FAULT_INJECTION: forcing a failure. [ 1841.733926][T27505] name failslab, interval 1, probability 0, space 0, times 0 08:13:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1841.781737][T27505] CPU: 1 PID: 27505 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1841.789793][T27505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1841.799880][T27505] Call Trace: [ 1841.803197][T27505] dump_stack+0x172/0x1f0 [ 1841.807565][T27505] should_fail.cold+0xa/0x15 [ 1841.812182][T27505] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1841.818018][T27505] ? ___might_sleep+0x163/0x280 [ 1841.822887][T27505] __should_failslab+0x121/0x190 [ 1841.827859][T27505] should_failslab+0x9/0x14 [ 1841.832387][T27505] kmem_cache_alloc+0x2b2/0x6f0 [ 1841.837265][T27505] ? find_held_lock+0x35/0x130 [ 1841.842058][T27505] ? kernfs_activate+0x192/0x1f0 [ 1841.847026][T27505] __kernfs_new_node+0xef/0x690 [ 1841.851904][T27505] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1841.857388][T27505] ? lock_downgrade+0x880/0x880 [ 1841.861292][T27567] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1841.862266][T27505] ? kasan_check_write+0x14/0x20 08:13:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6000, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1841.862288][T27505] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1841.862309][T27505] ? wait_for_completion+0x440/0x440 [ 1841.862336][T27505] kernfs_new_node+0x99/0x130 [ 1841.893736][T27505] __kernfs_create_file+0x51/0x340 [ 1841.898871][T27505] sysfs_add_file_mode_ns+0x222/0x560 [ 1841.904279][T27505] internal_create_group+0x35b/0xc40 [ 1841.909675][T27505] ? bd_set_size+0x89/0xb0 [ 1841.914122][T27505] ? remove_files.isra.0+0x190/0x190 [ 1841.919443][T27505] sysfs_create_group+0x20/0x30 [ 1841.924318][T27505] lo_ioctl+0x10af/0x2150 [ 1841.928677][T27505] ? lo_rw_aio+0x1120/0x1120 [ 1841.933299][T27505] blkdev_ioctl+0x6f2/0x1d10 [ 1841.937908][T27505] ? blkpg_ioctl+0xa90/0xa90 [ 1841.942514][T27505] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1841.948347][T27505] ? ___might_sleep+0x163/0x280 [ 1841.953242][T27505] block_ioctl+0xee/0x130 [ 1841.957585][T27505] ? blkdev_fallocate+0x410/0x410 [ 1841.962623][T27505] do_vfs_ioctl+0xd6e/0x1390 [ 1841.967241][T27505] ? ioctl_preallocate+0x210/0x210 [ 1841.972373][T27505] ? selinux_file_mprotect+0x620/0x620 [ 1841.977856][T27505] ? __fget+0x381/0x550 [ 1841.982041][T27505] ? ksys_dup3+0x3e0/0x3e0 [ 1841.986476][T27505] ? do_sys_open+0x31d/0x5d0 [ 1841.991086][T27505] ? tomoyo_file_ioctl+0x23/0x30 [ 1841.996044][T27505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1842.002302][T27505] ? security_file_ioctl+0x93/0xc0 [ 1842.007478][T27505] ksys_ioctl+0xab/0xd0 [ 1842.011662][T27505] __x64_sys_ioctl+0x73/0xb0 [ 1842.016279][T27505] do_syscall_64+0x103/0x610 [ 1842.020884][T27505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1842.026788][T27505] RIP: 0033:0x458c17 [ 1842.030702][T27505] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1842.050326][T27505] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1842.058776][T27505] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1842.066778][T27505] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1842.074784][T27505] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 08:13:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x6, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1842.082796][T27505] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1842.090829][T27505] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1842.101932][T27563] SELinux: failed to load policy 08:13:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000006800"/96], 0x60) [ 1842.144644][T27571] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x60000000}, 0x0) 08:13:48 executing program 0 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1842.271129][T27582] SELinux: failed to load policy 08:13:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000006c00"/96], 0x60) 08:13:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xf, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x68000000}, 0x0) [ 1842.390421][T27675] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1842.410326][T27666] FAULT_INJECTION: forcing a failure. [ 1842.410326][T27666] name failslab, interval 1, probability 0, space 0, times 0 [ 1842.434246][T27698] SELinux: failed to load policy [ 1842.453743][T27666] CPU: 1 PID: 27666 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1842.461798][T27666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1842.471885][T27666] Call Trace: [ 1842.475207][T27666] dump_stack+0x172/0x1f0 [ 1842.479585][T27666] should_fail.cold+0xa/0x15 [ 1842.484212][T27666] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1842.490071][T27666] ? ___might_sleep+0x163/0x280 [ 1842.494955][T27666] __should_failslab+0x121/0x190 [ 1842.499915][T27666] should_failslab+0x9/0x14 [ 1842.504437][T27666] kmem_cache_alloc+0x2b2/0x6f0 [ 1842.509300][T27666] ? find_held_lock+0x35/0x130 [ 1842.514082][T27666] ? kernfs_activate+0x192/0x1f0 [ 1842.519037][T27666] __kernfs_new_node+0xef/0x690 [ 1842.524078][T27666] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1842.529555][T27666] ? lock_downgrade+0x880/0x880 [ 1842.534422][T27666] ? kasan_check_write+0x14/0x20 [ 1842.539373][T27666] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1842.545372][T27666] ? wait_for_completion+0x440/0x440 [ 1842.550673][T27666] kernfs_new_node+0x99/0x130 [ 1842.555367][T27666] __kernfs_create_file+0x51/0x340 [ 1842.560491][T27666] sysfs_add_file_mode_ns+0x222/0x560 [ 1842.565882][T27666] internal_create_group+0x35b/0xc40 [ 1842.571178][T27666] ? bd_set_size+0x89/0xb0 [ 1842.575614][T27666] ? remove_files.isra.0+0x190/0x190 [ 1842.580932][T27666] sysfs_create_group+0x20/0x30 [ 1842.585805][T27666] lo_ioctl+0x10af/0x2150 [ 1842.590161][T27666] ? lo_rw_aio+0x1120/0x1120 [ 1842.594774][T27666] blkdev_ioctl+0x6f2/0x1d10 [ 1842.599447][T27666] ? blkpg_ioctl+0xa90/0xa90 [ 1842.604080][T27666] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1842.609945][T27666] ? ___might_sleep+0x163/0x280 [ 1842.614834][T27666] block_ioctl+0xee/0x130 [ 1842.619184][T27666] ? blkdev_fallocate+0x410/0x410 [ 1842.624249][T27666] do_vfs_ioctl+0xd6e/0x1390 [ 1842.628866][T27666] ? ioctl_preallocate+0x210/0x210 [ 1842.633993][T27666] ? selinux_file_mprotect+0x620/0x620 [ 1842.639466][T27666] ? __fget+0x381/0x550 [ 1842.643641][T27666] ? ksys_dup3+0x3e0/0x3e0 [ 1842.648072][T27666] ? do_sys_open+0x31d/0x5d0 [ 1842.652677][T27666] ? tomoyo_file_ioctl+0x23/0x30 [ 1842.657627][T27666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1842.663985][T27666] ? security_file_ioctl+0x93/0xc0 [ 1842.669131][T27666] ksys_ioctl+0xab/0xd0 [ 1842.673315][T27666] __x64_sys_ioctl+0x73/0xb0 [ 1842.677926][T27666] do_syscall_64+0x103/0x610 [ 1842.682541][T27666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1842.688460][T27666] RIP: 0033:0x458c17 [ 1842.692366][T27666] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1842.711986][T27666] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1842.720422][T27666] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1842.728407][T27666] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1842.736399][T27666] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1842.744479][T27666] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 08:13:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000007400"/96], 0x60) 08:13:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6087, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1842.752474][T27666] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1842.788005][T27704] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1842.869353][T27714] SELinux: failed to load policy 08:13:48 executing program 0 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6c000000}, 0x0) 08:13:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000007a00"/96], 0x60) 08:13:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x10, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1843.003874][T27735] FAULT_INJECTION: forcing a failure. [ 1843.003874][T27735] name failslab, interval 1, probability 0, space 0, times 0 [ 1843.074268][T27802] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1843.097843][T27735] CPU: 1 PID: 27735 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1843.105895][T27735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1843.116062][T27735] Call Trace: [ 1843.119412][T27735] dump_stack+0x172/0x1f0 [ 1843.123786][T27735] should_fail.cold+0xa/0x15 [ 1843.128416][T27735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1843.134264][T27735] ? ___might_sleep+0x163/0x280 [ 1843.139143][T27735] __should_failslab+0x121/0x190 [ 1843.144118][T27735] should_failslab+0x9/0x14 [ 1843.148653][T27735] kmem_cache_alloc+0x2b2/0x6f0 [ 1843.153534][T27735] ? lock_downgrade+0x880/0x880 [ 1843.158416][T27735] ? kasan_check_read+0x11/0x20 [ 1843.163295][T27735] __kernfs_new_node+0xef/0x690 [ 1843.169107][T27735] ? kernfs_dop_revalidate+0x3c0/0x3c0 08:13:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6558, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x74000000}, 0x0) [ 1843.174587][T27735] ? wait_for_completion+0x440/0x440 [ 1843.179915][T27735] ? mutex_unlock+0xd/0x10 [ 1843.184358][T27735] ? kernfs_activate+0x192/0x1f0 [ 1843.189322][T27735] kernfs_new_node+0x99/0x130 [ 1843.194027][T27735] __kernfs_create_file+0x51/0x340 [ 1843.199163][T27735] sysfs_add_file_mode_ns+0x222/0x560 [ 1843.204563][T27735] internal_create_group+0x35b/0xc40 [ 1843.209863][T27735] ? bd_set_size+0x89/0xb0 [ 1843.214360][T27735] ? remove_files.isra.0+0x190/0x190 [ 1843.219673][T27735] sysfs_create_group+0x20/0x30 [ 1843.224541][T27735] lo_ioctl+0x10af/0x2150 [ 1843.228884][T27735] ? lo_rw_aio+0x1120/0x1120 [ 1843.233489][T27735] blkdev_ioctl+0x6f2/0x1d10 [ 1843.238092][T27735] ? blkpg_ioctl+0xa90/0xa90 [ 1843.242698][T27735] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1843.248529][T27735] ? ___might_sleep+0x163/0x280 [ 1843.253404][T27735] block_ioctl+0xee/0x130 [ 1843.257744][T27735] ? blkdev_fallocate+0x410/0x410 [ 1843.262791][T27735] do_vfs_ioctl+0xd6e/0x1390 [ 1843.267406][T27735] ? ioctl_preallocate+0x210/0x210 08:13:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1843.272526][T27735] ? selinux_file_mprotect+0x620/0x620 [ 1843.277997][T27735] ? __fget+0x381/0x550 [ 1843.282168][T27735] ? ksys_dup3+0x3e0/0x3e0 [ 1843.286602][T27735] ? do_sys_open+0x31d/0x5d0 [ 1843.291209][T27735] ? tomoyo_file_ioctl+0x23/0x30 [ 1843.296181][T27735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1843.302440][T27735] ? security_file_ioctl+0x93/0xc0 [ 1843.307574][T27735] ksys_ioctl+0xab/0xd0 [ 1843.311752][T27735] __x64_sys_ioctl+0x73/0xb0 [ 1843.316374][T27735] do_syscall_64+0x103/0x610 [ 1843.320985][T27735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1843.325669][T27811] SELinux: failed to load policy [ 1843.326898][T27735] RIP: 0033:0x458c17 [ 1843.335738][T27735] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1843.355363][T27735] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1843.363804][T27735] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 08:13:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000000100"/96], 0x60) [ 1843.371814][T27735] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1843.379828][T27735] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1843.387929][T27735] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1843.395921][T27735] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1843.447605][T27836] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7a000000}, 0x0) [ 1843.502639][T27847] SELinux: failed to load policy 08:13:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:49 executing program 0 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000000200"/96], 0x60) 08:13:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x14, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1843.627298][T27875] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x81000000}, 0x0) 08:13:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6800, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1843.704847][T27962] FAULT_INJECTION: forcing a failure. [ 1843.704847][T27962] name failslab, interval 1, probability 0, space 0, times 0 [ 1843.743362][T27969] SELinux: failed to load policy 08:13:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1843.776844][T27962] CPU: 1 PID: 27962 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1843.784893][T27962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1843.794970][T27962] Call Trace: [ 1843.798294][T27962] dump_stack+0x172/0x1f0 [ 1843.802657][T27962] should_fail.cold+0xa/0x15 [ 1843.807291][T27962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1843.811704][T27972] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1843.813213][T27962] ? ___might_sleep+0x163/0x280 [ 1843.813248][T27962] __should_failslab+0x121/0x190 [ 1843.813272][T27962] should_failslab+0x9/0x14 [ 1843.838451][T27962] kmem_cache_alloc+0x2b2/0x6f0 [ 1843.843335][T27962] ? lock_downgrade+0x880/0x880 [ 1843.848213][T27962] ? kasan_check_read+0x11/0x20 [ 1843.853110][T27962] __kernfs_new_node+0xef/0x690 [ 1843.857997][T27962] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1843.863502][T27962] ? wait_for_completion+0x440/0x440 [ 1843.868849][T27962] ? mutex_unlock+0xd/0x10 [ 1843.873299][T27962] ? kernfs_activate+0x192/0x1f0 [ 1843.878284][T27962] kernfs_new_node+0x99/0x130 [ 1843.883003][T27962] __kernfs_create_file+0x51/0x340 [ 1843.888142][T27962] sysfs_add_file_mode_ns+0x222/0x560 [ 1843.893542][T27962] internal_create_group+0x35b/0xc40 [ 1843.898867][T27962] ? bd_set_size+0x89/0xb0 [ 1843.903314][T27962] ? remove_files.isra.0+0x190/0x190 [ 1843.908635][T27962] sysfs_create_group+0x20/0x30 [ 1843.913510][T27962] lo_ioctl+0x10af/0x2150 [ 1843.917869][T27962] ? lo_rw_aio+0x1120/0x1120 [ 1843.922484][T27962] blkdev_ioctl+0x6f2/0x1d10 [ 1843.927105][T27962] ? blkpg_ioctl+0xa90/0xa90 [ 1843.931715][T27962] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1843.937589][T27962] ? ___might_sleep+0x163/0x280 [ 1843.942466][T27962] block_ioctl+0xee/0x130 [ 1843.946821][T27962] ? blkdev_fallocate+0x410/0x410 [ 1843.951863][T27962] do_vfs_ioctl+0xd6e/0x1390 [ 1843.956485][T27962] ? ioctl_preallocate+0x210/0x210 [ 1843.961614][T27962] ? selinux_file_mprotect+0x620/0x620 [ 1843.967088][T27962] ? __fget+0x381/0x550 [ 1843.971274][T27962] ? ksys_dup3+0x3e0/0x3e0 [ 1843.975715][T27962] ? do_sys_open+0x31d/0x5d0 [ 1843.980331][T27962] ? tomoyo_file_ioctl+0x23/0x30 [ 1843.985296][T27962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1843.991564][T27962] ? security_file_ioctl+0x93/0xc0 [ 1843.996819][T27962] ksys_ioctl+0xab/0xd0 [ 1844.001012][T27962] __x64_sys_ioctl+0x73/0xb0 [ 1844.005626][T27962] do_syscall_64+0x103/0x610 [ 1844.010256][T27962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1844.016174][T27962] RIP: 0033:0x458c17 [ 1844.020077][T27962] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1844.041182][T27962] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1844.049637][T27962] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1844.057636][T27962] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1844.065628][T27962] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 08:13:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000000300"/96], 0x60) 08:13:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1844.073620][T27962] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1844.081621][T27962] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1844.133445][T27981] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000000400"/96], 0x60) 08:13:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x9effffff}, 0x0) 08:13:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:50 executing program 0 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x25, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffffff}, 0x0) 08:13:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000000500"/96], 0x60) [ 1844.373260][T28051] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x6c00, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1844.424201][T28087] FAULT_INJECTION: forcing a failure. [ 1844.424201][T28087] name failslab, interval 1, probability 0, space 0, times 0 [ 1844.472414][T28087] CPU: 0 PID: 28087 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1844.480463][T28087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1844.490543][T28087] Call Trace: [ 1844.493869][T28087] dump_stack+0x172/0x1f0 [ 1844.498243][T28087] should_fail.cold+0xa/0x15 [ 1844.502866][T28087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1844.508698][T28087] ? ___might_sleep+0x163/0x280 [ 1844.513569][T28087] __should_failslab+0x121/0x190 [ 1844.516600][T28116] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1844.518520][T28087] should_failslab+0x9/0x14 [ 1844.518540][T28087] kmem_cache_alloc+0x2b2/0x6f0 [ 1844.518558][T28087] ? lock_downgrade+0x880/0x880 [ 1844.518574][T28087] ? kasan_check_read+0x11/0x20 [ 1844.518598][T28087] __kernfs_new_node+0xef/0x690 [ 1844.553360][T28087] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 1844.558854][T28087] ? wait_for_completion+0x440/0x440 [ 1844.564167][T28087] ? mutex_unlock+0xd/0x10 [ 1844.568599][T28087] ? kernfs_activate+0x192/0x1f0 [ 1844.573555][T28087] kernfs_new_node+0x99/0x130 [ 1844.578258][T28087] __kernfs_create_file+0x51/0x340 [ 1844.583391][T28087] sysfs_add_file_mode_ns+0x222/0x560 [ 1844.587106][T28119] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1844.588783][T28087] internal_create_group+0x35b/0xc40 [ 1844.588801][T28087] ? bd_set_size+0x89/0xb0 [ 1844.588823][T28087] ? remove_files.isra.0+0x190/0x190 [ 1844.588853][T28087] sysfs_create_group+0x20/0x30 [ 1844.619533][T28087] lo_ioctl+0x10af/0x2150 [ 1844.623881][T28087] ? lo_rw_aio+0x1120/0x1120 [ 1844.628489][T28087] blkdev_ioctl+0x6f2/0x1d10 [ 1844.633101][T28087] ? blkpg_ioctl+0xa90/0xa90 [ 1844.637714][T28087] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1844.642068][T28122] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1844.643546][T28087] ? ___might_sleep+0x163/0x280 [ 1844.643572][T28087] block_ioctl+0xee/0x130 [ 1844.643585][T28087] ? blkdev_fallocate+0x410/0x410 [ 1844.643603][T28087] do_vfs_ioctl+0xd6e/0x1390 [ 1844.643623][T28087] ? ioctl_preallocate+0x210/0x210 [ 1844.643645][T28087] ? selinux_file_mprotect+0x620/0x620 [ 1844.683851][T28087] ? __fget+0x381/0x550 [ 1844.688037][T28087] ? ksys_dup3+0x3e0/0x3e0 [ 1844.692480][T28087] ? do_sys_open+0x31d/0x5d0 [ 1844.696431][T28126] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1844.697096][T28087] ? tomoyo_file_ioctl+0x23/0x30 [ 1844.697116][T28087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:13:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1844.697134][T28087] ? security_file_ioctl+0x93/0xc0 [ 1844.697160][T28087] ksys_ioctl+0xab/0xd0 [ 1844.728469][T28087] __x64_sys_ioctl+0x73/0xb0 [ 1844.733095][T28087] do_syscall_64+0x103/0x610 [ 1844.737711][T28087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1844.743614][T28087] RIP: 0033:0x458c17 [ 1844.747518][T28087] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1844.749847][T28129] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1844.767147][T28087] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1844.767163][T28087] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1844.767171][T28087] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1844.767177][T28087] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1844.767184][T28087] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 08:13:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000000600"/96], 0x60) [ 1844.767191][T28087] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffff000}, 0x0) 08:13:51 executing program 0 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1845.284756][T28248] FAULT_INJECTION: forcing a failure. [ 1845.284756][T28248] name failslab, interval 1, probability 0, space 0, times 0 [ 1845.308321][T28248] CPU: 1 PID: 28248 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1845.316381][T28248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1845.326585][T28248] Call Trace: [ 1845.329933][T28248] dump_stack+0x172/0x1f0 [ 1845.334306][T28248] should_fail.cold+0xa/0x15 [ 1845.338942][T28248] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1845.344789][T28248] ? ___might_sleep+0x163/0x280 [ 1845.349676][T28248] __should_failslab+0x121/0x190 [ 1845.354647][T28248] should_failslab+0x9/0x14 [ 1845.359176][T28248] kmem_cache_alloc_trace+0x2d1/0x760 [ 1845.364613][T28248] kobject_uevent_env+0x2fb/0x1030 [ 1845.369766][T28248] kobject_uevent+0x20/0x26 [ 1845.374300][T28248] lo_ioctl+0x112b/0x2150 [ 1845.378772][T28248] ? lo_rw_aio+0x1120/0x1120 [ 1845.383437][T28248] blkdev_ioctl+0x6f2/0x1d10 [ 1845.388067][T28248] ? blkpg_ioctl+0xa90/0xa90 [ 1845.392678][T28248] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1845.398518][T28248] ? ___might_sleep+0x163/0x280 [ 1845.403402][T28248] block_ioctl+0xee/0x130 [ 1845.407752][T28248] ? blkdev_fallocate+0x410/0x410 [ 1845.412801][T28248] do_vfs_ioctl+0xd6e/0x1390 [ 1845.417426][T28248] ? ioctl_preallocate+0x210/0x210 [ 1845.422551][T28248] ? selinux_file_mprotect+0x620/0x620 [ 1845.428067][T28248] ? __fget+0x381/0x550 [ 1845.432342][T28248] ? ksys_dup3+0x3e0/0x3e0 [ 1845.436793][T28248] ? do_sys_open+0x31d/0x5d0 [ 1845.441416][T28248] ? tomoyo_file_ioctl+0x23/0x30 [ 1845.446383][T28248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1845.452658][T28248] ? security_file_ioctl+0x93/0xc0 [ 1845.457797][T28248] ksys_ioctl+0xab/0xd0 [ 1845.461989][T28248] __x64_sys_ioctl+0x73/0xb0 [ 1845.466631][T28248] do_syscall_64+0x103/0x610 [ 1845.471252][T28248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1845.477169][T28248] RIP: 0033:0x458c17 [ 1845.481075][T28248] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1845.500701][T28248] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1845.509138][T28248] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1845.517138][T28248] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1845.525131][T28248] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 08:13:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xe0, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xffffff7f}, 0x0) 08:13:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000000700"/96], 0x60) 08:13:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7400, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1845.533127][T28248] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1845.541129][T28248] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xffffff9e}, 0x0) [ 1845.599170][T28255] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000000a00"/96], 0x60) 08:13:51 executing program 0 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x7a00, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x300, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffffff0}, 0x0) [ 1845.839379][T28383] FAULT_INJECTION: forcing a failure. [ 1845.839379][T28383] name failslab, interval 1, probability 0, space 0, times 0 [ 1845.864022][T28386] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1845.881691][T28383] CPU: 0 PID: 28383 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1845.889723][T28383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1845.899800][T28383] Call Trace: [ 1845.903122][T28383] dump_stack+0x172/0x1f0 [ 1845.907477][T28383] should_fail.cold+0xa/0x15 [ 1845.912089][T28383] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1845.917920][T28383] ? ___might_sleep+0x163/0x280 [ 1845.922786][T28383] __should_failslab+0x121/0x190 [ 1845.927737][T28383] should_failslab+0x9/0x14 [ 1845.932260][T28383] __kmalloc+0x2dc/0x740 [ 1845.936534][T28383] ? kobject_uevent_env+0x2fb/0x1030 [ 1845.941832][T28383] ? rcu_read_lock_sched_held+0x110/0x130 [ 1845.947577][T28383] ? kobject_get_path+0xc4/0x1b0 [ 1845.952528][T28383] kobject_get_path+0xc4/0x1b0 [ 1845.957324][T28383] kobject_uevent_env+0x31f/0x1030 [ 1845.962456][T28383] kobject_uevent+0x20/0x26 [ 1845.966971][T28383] lo_ioctl+0x112b/0x2150 [ 1845.971324][T28383] ? lo_rw_aio+0x1120/0x1120 [ 1845.975934][T28383] blkdev_ioctl+0x6f2/0x1d10 [ 1845.980535][T28383] ? blkpg_ioctl+0xa90/0xa90 [ 1845.985134][T28383] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1845.990969][T28383] ? ___might_sleep+0x163/0x280 [ 1845.995836][T28383] block_ioctl+0xee/0x130 [ 1846.000181][T28383] ? blkdev_fallocate+0x410/0x410 [ 1846.005220][T28383] do_vfs_ioctl+0xd6e/0x1390 [ 1846.009839][T28383] ? ioctl_preallocate+0x210/0x210 [ 1846.014968][T28383] ? selinux_file_mprotect+0x620/0x620 [ 1846.020453][T28383] ? __fget+0x381/0x550 [ 1846.024625][T28383] ? ksys_dup3+0x3e0/0x3e0 [ 1846.029057][T28383] ? do_sys_open+0x31d/0x5d0 [ 1846.033666][T28383] ? tomoyo_file_ioctl+0x23/0x30 [ 1846.038626][T28383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.044886][T28383] ? security_file_ioctl+0x93/0xc0 [ 1846.050026][T28383] ksys_ioctl+0xab/0xd0 [ 1846.054197][T28383] __x64_sys_ioctl+0x73/0xb0 [ 1846.059177][T28383] do_syscall_64+0x103/0x610 [ 1846.063788][T28383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1846.069688][T28383] RIP: 0033:0x458c17 [ 1846.073593][T28383] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1846.093221][T28383] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1846.101662][T28383] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1846.109640][T28383] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1846.117617][T28383] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1846.125593][T28383] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1846.133571][T28383] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1846.143495][T28387] sel_write_load: 5 callbacks suppressed [ 1846.143503][T28387] SELinux: failed to load policy 08:13:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000002000"/96], 0x60) 08:13:52 executing program 0 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4000000000000}, 0x0) [ 1846.333671][T28427] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1846.334402][T28429] SELinux: failed to load policy 08:13:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000003f00"/96], 0x60) 08:13:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x8100, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x40030000000000}, 0x0) [ 1846.477988][T28515] FAULT_INJECTION: forcing a failure. [ 1846.477988][T28515] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.521003][T28515] CPU: 1 PID: 28515 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1846.529139][T28515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1846.537960][T28519] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1846.539210][T28515] Call Trace: [ 1846.539254][T28515] dump_stack+0x172/0x1f0 [ 1846.539288][T28515] should_fail.cold+0xa/0x15 [ 1846.562355][T28515] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1846.567560][T28520] SELinux: failed to load policy [ 1846.568196][T28515] ? ___might_sleep+0x163/0x280 [ 1846.578017][T28515] __should_failslab+0x121/0x190 [ 1846.584281][T28515] should_failslab+0x9/0x14 [ 1846.588818][T28515] __kmalloc+0x2dc/0x740 [ 1846.593098][T28515] ? kobject_uevent_env+0x2fb/0x1030 [ 1846.598415][T28515] ? rcu_read_lock_sched_held+0x110/0x130 [ 1846.604152][T28515] ? kobject_get_path+0xc4/0x1b0 [ 1846.609103][T28515] kobject_get_path+0xc4/0x1b0 [ 1846.613890][T28515] kobject_uevent_env+0x31f/0x1030 08:13:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x397, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000004800"/96], 0x60) [ 1846.619023][T28515] kobject_uevent+0x20/0x26 [ 1846.623544][T28515] lo_ioctl+0x112b/0x2150 [ 1846.627897][T28515] ? lo_rw_aio+0x1120/0x1120 [ 1846.632860][T28515] blkdev_ioctl+0x6f2/0x1d10 [ 1846.637470][T28515] ? blkpg_ioctl+0xa90/0xa90 [ 1846.642081][T28515] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1846.647920][T28515] ? ___might_sleep+0x163/0x280 [ 1846.652794][T28515] block_ioctl+0xee/0x130 [ 1846.657148][T28515] ? blkdev_fallocate+0x410/0x410 [ 1846.662601][T28515] do_vfs_ioctl+0xd6e/0x1390 08:13:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1846.667269][T28515] ? ioctl_preallocate+0x210/0x210 [ 1846.667897][T28524] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1846.672595][T28515] ? selinux_file_mprotect+0x620/0x620 [ 1846.672612][T28515] ? __fget+0x381/0x550 [ 1846.672633][T28515] ? ksys_dup3+0x3e0/0x3e0 [ 1846.672657][T28515] ? do_sys_open+0x31d/0x5d0 [ 1846.702290][T28515] ? tomoyo_file_ioctl+0x23/0x30 [ 1846.707563][T28515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1846.713864][T28515] ? security_file_ioctl+0x93/0xc0 [ 1846.718994][T28515] ksys_ioctl+0xab/0xd0 [ 1846.723177][T28515] __x64_sys_ioctl+0x73/0xb0 [ 1846.727805][T28515] do_syscall_64+0x103/0x610 [ 1846.732424][T28515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1846.738333][T28515] RIP: 0033:0x458c17 [ 1846.742255][T28515] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1846.761880][T28515] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1846.770743][T28515] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1846.779209][T28515] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1846.787232][T28515] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1846.795236][T28515] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1846.803248][T28515] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1846.823642][T28527] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:52 executing program 0 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1846.944582][T28531] SELinux: failed to load policy 08:13:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 08:13:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000004c00"/96], 0x60) [ 1846.999450][T28582] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:52 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xc131, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x100000000000000}, 0x0) [ 1847.110142][T28647] FAULT_INJECTION: forcing a failure. [ 1847.110142][T28647] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.148635][T28651] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1847.149203][T28647] CPU: 0 PID: 28647 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1847.168453][T28647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.178534][T28647] Call Trace: [ 1847.181853][T28647] dump_stack+0x172/0x1f0 [ 1847.183095][T28652] SELinux: failed to load policy [ 1847.186295][T28647] should_fail.cold+0xa/0x15 [ 1847.186322][T28647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1847.186342][T28647] ? ___might_sleep+0x163/0x280 [ 1847.186368][T28647] __should_failslab+0x121/0x190 [ 1847.211501][T28647] should_failslab+0x9/0x14 [ 1847.216056][T28647] kmem_cache_alloc_node+0x264/0x710 [ 1847.221360][T28647] ? find_held_lock+0x35/0x130 [ 1847.226122][T28647] __alloc_skb+0xd5/0x5e0 [ 1847.230457][T28647] ? skb_trim+0x190/0x190 [ 1847.234781][T28647] ? kasan_check_read+0x11/0x20 [ 1847.239681][T28647] alloc_uevent_skb+0x83/0x1e2 [ 1847.244449][T28647] kobject_uevent_env+0xa63/0x1030 [ 1847.249566][T28647] kobject_uevent+0x20/0x26 [ 1847.254059][T28647] lo_ioctl+0x112b/0x2150 [ 1847.258383][T28647] ? lo_rw_aio+0x1120/0x1120 [ 1847.262969][T28647] blkdev_ioctl+0x6f2/0x1d10 [ 1847.267552][T28647] ? blkpg_ioctl+0xa90/0xa90 [ 1847.272131][T28647] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1847.277937][T28647] ? ___might_sleep+0x163/0x280 [ 1847.282781][T28647] block_ioctl+0xee/0x130 [ 1847.287109][T28647] ? blkdev_fallocate+0x410/0x410 [ 1847.292151][T28647] do_vfs_ioctl+0xd6e/0x1390 [ 1847.296733][T28647] ? ioctl_preallocate+0x210/0x210 [ 1847.301830][T28647] ? selinux_file_mprotect+0x620/0x620 [ 1847.307273][T28647] ? __fget+0x381/0x550 [ 1847.311418][T28647] ? ksys_dup3+0x3e0/0x3e0 [ 1847.315907][T28647] ? do_sys_open+0x31d/0x5d0 [ 1847.320506][T28647] ? tomoyo_file_ioctl+0x23/0x30 [ 1847.325429][T28647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.331657][T28647] ? security_file_ioctl+0x93/0xc0 [ 1847.336759][T28647] ksys_ioctl+0xab/0xd0 [ 1847.340910][T28647] __x64_sys_ioctl+0x73/0xb0 [ 1847.345488][T28647] do_syscall_64+0x103/0x610 [ 1847.350069][T28647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1847.355979][T28647] RIP: 0033:0x458c17 [ 1847.359877][T28647] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1847.379495][T28647] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1847.387897][T28647] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1847.395876][T28647] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:13:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1847.403843][T28647] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1847.411803][T28647] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1847.419779][T28647] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1e00, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000006000"/96], 0x60) 08:13:53 executing program 0 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1847.551021][T28664] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x200000000000000}, 0x0) [ 1847.606164][T28686] SELinux: failed to load policy [ 1847.636892][T28752] SELinux: failed to load policy 08:13:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000006800"/96], 0x60) [ 1847.691533][T28770] FAULT_INJECTION: forcing a failure. [ 1847.691533][T28770] name failslab, interval 1, probability 0, space 0, times 0 [ 1847.723037][T28770] CPU: 0 PID: 28770 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1847.731197][T28770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.741276][T28770] Call Trace: [ 1847.744608][T28770] dump_stack+0x172/0x1f0 [ 1847.748968][T28770] should_fail.cold+0xa/0x15 [ 1847.753588][T28770] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1847.759423][T28770] ? ___might_sleep+0x163/0x280 [ 1847.764321][T28770] __should_failslab+0x121/0x190 [ 1847.769278][T28770] should_failslab+0x9/0x14 [ 1847.773806][T28770] kmem_cache_alloc+0x2b2/0x6f0 [ 1847.778677][T28770] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1847.784494][T28770] ? lock_downgrade+0x880/0x880 [ 1847.789373][T28770] skb_clone+0x150/0x3b0 [ 1847.793636][T28770] netlink_broadcast_filtered+0x870/0xb20 [ 1847.799381][T28770] netlink_broadcast+0x3a/0x50 [ 1847.804168][T28770] kobject_uevent_env+0xa94/0x1030 [ 1847.809303][T28770] kobject_uevent+0x20/0x26 [ 1847.813837][T28770] lo_ioctl+0x112b/0x2150 [ 1847.818184][T28770] ? lo_rw_aio+0x1120/0x1120 [ 1847.822797][T28770] blkdev_ioctl+0x6f2/0x1d10 [ 1847.827407][T28770] ? blkpg_ioctl+0xa90/0xa90 [ 1847.832012][T28770] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1847.837843][T28770] ? ___might_sleep+0x163/0x280 [ 1847.842719][T28770] block_ioctl+0xee/0x130 [ 1847.847066][T28770] ? blkdev_fallocate+0x410/0x410 [ 1847.852113][T28770] do_vfs_ioctl+0xd6e/0x1390 [ 1847.856722][T28770] ? ioctl_preallocate+0x210/0x210 [ 1847.861847][T28770] ? selinux_file_mprotect+0x620/0x620 [ 1847.867323][T28770] ? __fget+0x381/0x550 [ 1847.871495][T28770] ? ksys_dup3+0x3e0/0x3e0 [ 1847.875923][T28770] ? do_sys_open+0x31d/0x5d0 [ 1847.880530][T28770] ? tomoyo_file_ioctl+0x23/0x30 [ 1847.885480][T28770] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1847.891738][T28770] ? security_file_ioctl+0x93/0xc0 [ 1847.896871][T28770] ksys_ioctl+0xab/0xd0 [ 1847.901041][T28770] __x64_sys_ioctl+0x73/0xb0 [ 1847.905656][T28770] do_syscall_64+0x103/0x610 [ 1847.910298][T28770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1847.917627][T28770] RIP: 0033:0x458c17 [ 1847.921539][T28770] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:13:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xf000, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1847.941167][T28770] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1847.949605][T28770] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1847.957611][T28770] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1847.965606][T28770] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1847.973624][T28770] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1847.981636][T28770] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x300000000000000}, 0x0) [ 1848.022479][T28775] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1848.055593][T28777] SELinux: failed to load policy 08:13:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000006c00"/96], 0x60) 08:13:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1f00, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:54 executing program 0 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x400000000000000}, 0x0) [ 1848.253301][T28820] SELinux: failed to load policy [ 1848.264562][T28826] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000007400"/96], 0x60) 08:13:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xff7f, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x500000000000000}, 0x0) 08:13:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1848.450259][T28900] SELinux: failed to load policy 08:13:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000000007a00"/96], 0x60) 08:13:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x600000000000000}, 0x0) [ 1848.482037][T28905] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1848.517556][T28901] FAULT_INJECTION: forcing a failure. [ 1848.517556][T28901] name failslab, interval 1, probability 0, space 0, times 0 [ 1848.553436][T28901] CPU: 0 PID: 28901 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1848.561532][T28901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1848.571618][T28901] Call Trace: [ 1848.574944][T28901] dump_stack+0x172/0x1f0 [ 1848.579303][T28901] should_fail.cold+0xa/0x15 [ 1848.583981][T28901] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1848.589832][T28901] ? ___might_sleep+0x163/0x280 [ 1848.594717][T28901] __should_failslab+0x121/0x190 [ 1848.599680][T28901] should_failslab+0x9/0x14 [ 1848.604207][T28901] kmem_cache_alloc+0x2b2/0x6f0 [ 1848.609102][T28901] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1848.615025][T28901] ? lock_downgrade+0x880/0x880 [ 1848.619911][T28901] skb_clone+0x150/0x3b0 [ 1848.624184][T28901] netlink_broadcast_filtered+0x870/0xb20 [ 1848.629951][T28901] netlink_broadcast+0x3a/0x50 [ 1848.634742][T28901] kobject_uevent_env+0xa94/0x1030 [ 1848.639890][T28901] kobject_uevent+0x20/0x26 [ 1848.644418][T28901] lo_ioctl+0x112b/0x2150 [ 1848.648801][T28901] ? lo_rw_aio+0x1120/0x1120 [ 1848.653416][T28901] blkdev_ioctl+0x6f2/0x1d10 [ 1848.658030][T28901] ? blkpg_ioctl+0xa90/0xa90 [ 1848.662643][T28901] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1848.668478][T28901] ? ___might_sleep+0x163/0x280 [ 1848.673356][T28901] block_ioctl+0xee/0x130 [ 1848.677694][T28901] ? blkdev_fallocate+0x410/0x410 [ 1848.682743][T28901] do_vfs_ioctl+0xd6e/0x1390 [ 1848.687363][T28901] ? ioctl_preallocate+0x210/0x210 [ 1848.692492][T28901] ? selinux_file_mprotect+0x620/0x620 [ 1848.697963][T28901] ? __fget+0x381/0x550 [ 1848.702135][T28901] ? ksys_dup3+0x3e0/0x3e0 [ 1848.706566][T28901] ? do_sys_open+0x31d/0x5d0 [ 1848.711175][T28901] ? tomoyo_file_ioctl+0x23/0x30 [ 1848.716128][T28901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.722386][T28901] ? security_file_ioctl+0x93/0xc0 [ 1848.727521][T28901] ksys_ioctl+0xab/0xd0 [ 1848.731694][T28901] __x64_sys_ioctl+0x73/0xb0 [ 1848.736300][T28901] do_syscall_64+0x103/0x610 [ 1848.740911][T28901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1848.746811][T28901] RIP: 0033:0x458c17 [ 1848.750717][T28901] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1848.770345][T28901] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1848.778778][T28901] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458c17 [ 1848.786766][T28901] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1848.794755][T28901] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 08:13:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffe0, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1848.802747][T28901] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1848.810740][T28901] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:54 executing program 0 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x700000000000000}, 0x0) 08:13:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000ffffffff00"/96], 0x60) [ 1849.019221][T29018] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1849.076344][T29021] FAULT_INJECTION: forcing a failure. [ 1849.076344][T29021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1849.089620][T29021] CPU: 1 PID: 29021 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1849.097617][T29021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.107693][T29021] Call Trace: [ 1849.111020][T29021] dump_stack+0x172/0x1f0 [ 1849.115385][T29021] should_fail.cold+0xa/0x15 [ 1849.120012][T29021] ? lo_ioctl+0xcf/0x2150 [ 1849.124373][T29021] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1849.130204][T29021] ? __lock_acquire+0x548/0x3fb0 [ 1849.135187][T29021] should_fail_alloc_page+0x50/0x60 [ 1849.140444][T29021] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1849.145858][T29021] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1849.151603][T29021] ? find_held_lock+0x35/0x130 [ 1849.156406][T29021] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1849.162254][T29021] cache_grow_begin+0x9c/0x860 [ 1849.168565][T29021] ? getname_flags+0xd6/0x5b0 [ 1849.173277][T29021] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1849.179556][T29021] kmem_cache_alloc+0x62d/0x6f0 [ 1849.184440][T29021] ? __fget+0x381/0x550 [ 1849.188635][T29021] getname_flags+0xd6/0x5b0 [ 1849.193173][T29021] do_mkdirat+0xa0/0x2a0 [ 1849.197438][T29021] ? __ia32_sys_mknod+0xb0/0xb0 [ 1849.202310][T29021] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1849.207788][T29021] ? do_syscall_64+0x26/0x610 [ 1849.212484][T29021] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1849.218567][T29021] ? do_syscall_64+0x26/0x610 [ 1849.223273][T29021] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1849.228586][T29021] __x64_sys_mkdir+0x5c/0x80 [ 1849.233194][T29021] do_syscall_64+0x103/0x610 [ 1849.237820][T29021] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1849.243725][T29021] RIP: 0033:0x4581c7 [ 1849.247638][T29021] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1849.267361][T29021] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 08:13:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf00000000000000}, 0x0) 08:13:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000200"/96], 0x60) 08:13:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210d1, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1849.275797][T29021] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1849.283804][T29021] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 1849.291801][T29021] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1849.299803][T29021] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1849.307814][T29021] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1849.320445][T29029] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x2000000000000000}, 0x0) 08:13:55 executing program 0 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1849.458198][T29040] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000300"/96], 0x60) 08:13:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3928000000000000}, 0x0) 08:13:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210d2, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1849.634499][T29147] FAULT_INJECTION: forcing a failure. [ 1849.634499][T29147] name failslab, interval 1, probability 0, space 0, times 0 [ 1849.704440][T29147] CPU: 1 PID: 29147 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1849.712485][T29147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.722564][T29147] Call Trace: [ 1849.725887][T29147] dump_stack+0x172/0x1f0 [ 1849.730252][T29147] should_fail.cold+0xa/0x15 [ 1849.734871][T29147] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1849.740701][T29147] ? ___might_sleep+0x163/0x280 [ 1849.745574][T29147] __should_failslab+0x121/0x190 [ 1849.750526][T29147] should_failslab+0x9/0x14 [ 1849.755134][T29147] kmem_cache_alloc+0x2b2/0x6f0 [ 1849.759996][T29147] ? __d_lookup+0x433/0x760 [ 1849.764509][T29147] ? lookup_dcache+0x23/0x140 [ 1849.769194][T29147] ? d_lookup+0xf9/0x260 [ 1849.773462][T29147] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1849.778764][T29147] __d_alloc+0x2e/0x8c0 [ 1849.782937][T29147] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1849.788674][T29147] d_alloc+0x4d/0x2b0 [ 1849.792674][T29147] __lookup_hash+0xcd/0x190 [ 1849.797195][T29147] filename_create+0x1a7/0x4f0 08:13:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x3f00000000000000}, 0x0) [ 1849.801995][T29147] ? kern_path_mountpoint+0x40/0x40 [ 1849.807209][T29147] ? strncpy_from_user+0x2a8/0x380 [ 1849.812360][T29147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.818619][T29147] ? getname_flags+0x277/0x5b0 [ 1849.823406][T29147] do_mkdirat+0xb5/0x2a0 [ 1849.827672][T29147] ? __ia32_sys_mknod+0xb0/0xb0 [ 1849.832543][T29147] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1849.838018][T29147] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1849.844103][T29147] ? do_syscall_64+0x26/0x610 [ 1849.848796][T29147] ? lockdep_hardirqs_on+0x418/0x5d0 08:13:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000400"/96], 0x60) [ 1849.854111][T29147] __x64_sys_mkdir+0x5c/0x80 [ 1849.858731][T29147] do_syscall_64+0x103/0x610 [ 1849.863350][T29147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1849.869275][T29147] RIP: 0033:0x4581c7 [ 1849.873182][T29147] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1849.893072][T29147] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 08:13:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1849.901508][T29147] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1849.901518][T29147] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 1849.901525][T29147] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1849.901533][T29147] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1849.901542][T29147] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1849.919017][T29157] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:55 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4000000000000000}, 0x0) [ 1850.001336][T29162] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000500"/96], 0x60) [ 1850.169480][T29208] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:56 executing program 0 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210d3, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4800000000000000}, 0x0) 08:13:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000600"/96], 0x60) [ 1850.402210][T29284] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x4c00000000000000}, 0x0) [ 1850.492195][T29291] FAULT_INJECTION: forcing a failure. [ 1850.492195][T29291] name failslab, interval 1, probability 0, space 0, times 0 [ 1850.522251][T29291] CPU: 1 PID: 29291 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1850.530303][T29291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.530312][T29291] Call Trace: [ 1850.530346][T29291] dump_stack+0x172/0x1f0 [ 1850.530371][T29291] should_fail.cold+0xa/0x15 [ 1850.530392][T29291] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1850.530414][T29291] ? ___might_sleep+0x163/0x280 [ 1850.530434][T29291] __should_failslab+0x121/0x190 [ 1850.530538][T29291] ? ratelimit_state_init+0xb0/0xb0 [ 1850.530556][T29291] should_failslab+0x9/0x14 [ 1850.530575][T29291] kmem_cache_alloc+0x2b2/0x6f0 [ 1850.530597][T29291] ? ratelimit_state_init+0xb0/0xb0 [ 1850.530616][T29291] ext4_alloc_inode+0x1f/0x640 [ 1850.530632][T29291] ? ratelimit_state_init+0xb0/0xb0 [ 1850.530653][T29291] alloc_inode+0x66/0x190 [ 1850.573689][T29291] new_inode_pseudo+0x19/0xf0 [ 1850.573706][T29291] new_inode+0x1f/0x40 [ 1850.573725][T29291] __ext4_new_inode+0x37e/0x5450 [ 1850.573751][T29291] ? avc_has_perm+0x404/0x610 [ 1850.573768][T29291] ? ext4_free_inode+0x1450/0x1450 [ 1850.573791][T29291] ? dqget+0x10d0/0x10d0 [ 1850.573820][T29291] ? selinux_determine_inode_label+0x1b1/0x390 [ 1850.573843][T29291] ext4_mkdir+0x3d5/0xdf0 [ 1850.583246][T29291] ? ext4_init_dot_dotdot+0x520/0x520 [ 1850.583267][T29291] ? selinux_inode_mkdir+0x23/0x30 [ 1850.583286][T29291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.583303][T29291] ? security_inode_mkdir+0xee/0x120 [ 1850.583320][T29291] vfs_mkdir+0x433/0x690 [ 1850.583340][T29291] do_mkdirat+0x234/0x2a0 [ 1850.598479][T29291] ? __ia32_sys_mknod+0xb0/0xb0 [ 1850.598498][T29291] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1850.598518][T29291] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1850.598534][T29291] ? do_syscall_64+0x26/0x610 [ 1850.598551][T29291] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1850.598570][T29291] __x64_sys_mkdir+0x5c/0x80 [ 1850.607574][T29291] do_syscall_64+0x103/0x610 [ 1850.607594][T29291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1850.607605][T29291] RIP: 0033:0x4581c7 [ 1850.607620][T29291] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 08:13:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6000000000000000}, 0x0) [ 1850.607628][T29291] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1850.607643][T29291] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1850.607653][T29291] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 1850.607661][T29291] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1850.607670][T29291] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1850.607679][T29291] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000700"/96], 0x60) 08:13:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6800000000000000}, 0x0) 08:13:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffe0, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:56 executing program 0 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210d4, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1850.966906][T29378] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000a00"/96], 0x60) 08:13:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x6c00000000000000}, 0x0) 08:13:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1851.095665][T29413] FAULT_INJECTION: forcing a failure. [ 1851.095665][T29413] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.191157][T29413] CPU: 1 PID: 29413 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1851.192854][T29417] sel_write_load: 8 callbacks suppressed [ 1851.192861][T29417] SELinux: failed to load policy [ 1851.199239][T29413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.199248][T29413] Call Trace: [ 1851.199279][T29413] dump_stack+0x172/0x1f0 [ 1851.199304][T29413] should_fail.cold+0xa/0x15 [ 1851.199327][T29413] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1851.199352][T29413] ? ___might_sleep+0x163/0x280 [ 1851.199374][T29413] __should_failslab+0x121/0x190 [ 1851.199391][T29413] should_failslab+0x9/0x14 [ 1851.199410][T29413] kmem_cache_alloc+0x2b2/0x6f0 [ 1851.199424][T29413] ? __d_lookup+0x433/0x760 [ 1851.199437][T29413] ? lookup_dcache+0x23/0x140 [ 1851.199450][T29413] ? d_lookup+0xf9/0x260 [ 1851.199467][T29413] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1851.199486][T29413] __d_alloc+0x2e/0x8c0 [ 1851.199512][T29413] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1851.230797][T29451] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1851.232340][T29413] d_alloc+0x4d/0x2b0 [ 1851.232363][T29413] __lookup_hash+0xcd/0x190 [ 1851.232381][T29413] filename_create+0x1a7/0x4f0 [ 1851.232404][T29413] ? kern_path_mountpoint+0x40/0x40 [ 1851.315325][T29413] ? strncpy_from_user+0x2a8/0x380 [ 1851.320465][T29413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.326718][T29413] ? getname_flags+0x277/0x5b0 [ 1851.331501][T29413] do_mkdirat+0xb5/0x2a0 [ 1851.335767][T29413] ? __ia32_sys_mknod+0xb0/0xb0 [ 1851.340701][T29413] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1851.346254][T29413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1851.352365][T29413] ? do_syscall_64+0x26/0x610 [ 1851.357160][T29413] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1851.362474][T29413] __x64_sys_mkdir+0x5c/0x80 [ 1851.367096][T29413] do_syscall_64+0x103/0x610 [ 1851.371721][T29413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1851.377630][T29413] RIP: 0033:0x4581c7 [ 1851.381540][T29413] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1851.401261][T29413] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1851.409707][T29413] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1851.417698][T29413] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 1851.425691][T29413] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1851.433685][T29413] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 08:13:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100004800"/96], 0x60) 08:13:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1851.441679][T29413] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7400000000000000}, 0x0) [ 1851.515278][T29466] SELinux: failed to load policy 08:13:57 executing program 0 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210d5, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1851.555579][T29526] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffff88805e2682d8, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x7a00000000000000}, 0x0) 08:13:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100004c00"/96], 0x60) 08:13:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x8100000000000000}, 0x0) [ 1851.717737][T29537] SELinux: failed to load policy 08:13:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 08:13:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100006000"/96], 0x60) [ 1851.780275][T29543] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1851.867602][T29585] SELinux: failed to load policy [ 1851.874990][T29595] FAULT_INJECTION: forcing a failure. [ 1851.874990][T29595] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.888634][T29595] CPU: 0 PID: 29595 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1851.896642][T29595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.896690][T29595] Call Trace: [ 1851.896724][T29595] dump_stack+0x172/0x1f0 [ 1851.896760][T29595] should_fail.cold+0xa/0x15 [ 1851.919077][T29595] ? security_compute_sid.part.0+0xfb6/0x1620 [ 1851.925168][T29595] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1851.925187][T29595] ? __lock_acquire+0x548/0x3fb0 [ 1851.925201][T29595] ? security_compute_sid.part.0+0xfe0/0x1620 [ 1851.925220][T29595] __should_failslab+0x121/0x190 [ 1851.925250][T29595] should_failslab+0x9/0x14 [ 1851.925267][T29595] __kmalloc+0x71/0x740 [ 1851.925289][T29595] ? context_struct_to_string+0x368/0x950 [ 1851.925320][T29595] context_struct_to_string+0x368/0x950 08:13:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1851.938590][T29602] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1851.942153][T29595] ? dump_masked_av_helper+0xa0/0xa0 [ 1851.942175][T29595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.942192][T29595] ? sidtab_search_core+0x164/0x210 [ 1851.942234][T29595] security_sid_to_context_core.isra.0+0x2fb/0x390 [ 1852.001118][T29595] security_sid_to_context_force+0x3a/0x50 [ 1852.006946][T29595] selinux_inode_init_security+0x555/0x7b0 [ 1852.012781][T29595] ? selinux_inode_create+0x30/0x30 [ 1852.017995][T29595] ? lock_downgrade+0x880/0x880 [ 1852.022868][T29595] ? kasan_check_read+0x11/0x20 [ 1852.027750][T29595] security_inode_init_security+0x1b3/0x3c0 [ 1852.033738][T29595] ? ext4_init_acl+0x290/0x290 [ 1852.038526][T29595] ? security_skb_classify_flow+0xc0/0xc0 [ 1852.044264][T29595] ? posix_acl_create+0x11a/0x430 [ 1852.046124][T29605] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1852.049291][T29595] ? lock_downgrade+0x880/0x880 [ 1852.049325][T29595] ? ext4_set_acl+0x4f0/0x4f0 [ 1852.049344][T29595] ? _raw_spin_unlock+0x2d/0x50 [ 1852.049373][T29595] ext4_init_security+0x34/0x40 [ 1852.079454][T29595] __ext4_new_inode+0x44b7/0x5450 [ 1852.084514][T29595] ? ext4_free_inode+0x1450/0x1450 [ 1852.089653][T29595] ? dqget+0x10d0/0x10d0 [ 1852.093920][T29595] ? selinux_determine_inode_label+0x1b1/0x390 [ 1852.100093][T29595] ext4_mkdir+0x3d5/0xdf0 [ 1852.104526][T29595] ? ext4_init_dot_dotdot+0x520/0x520 [ 1852.109920][T29595] ? selinux_inode_mkdir+0x23/0x30 08:13:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1852.115051][T29595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.121315][T29595] ? security_inode_mkdir+0xee/0x120 [ 1852.126622][T29595] vfs_mkdir+0x433/0x690 [ 1852.130888][T29595] do_mkdirat+0x234/0x2a0 [ 1852.135252][T29595] ? __ia32_sys_mknod+0xb0/0xb0 [ 1852.140123][T29595] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1852.146365][T29595] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1852.152449][T29595] ? do_syscall_64+0x26/0x610 [ 1852.157584][T29595] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1852.162889][T29595] __x64_sys_mkdir+0x5c/0x80 [ 1852.164956][T29608] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1852.167497][T29595] do_syscall_64+0x103/0x610 [ 1852.167520][T29595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1852.167533][T29595] RIP: 0033:0x4581c7 [ 1852.167549][T29595] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1852.167558][T29595] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1852.167572][T29595] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1852.167589][T29595] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 1852.236880][T29595] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1852.244863][T29595] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1852.252848][T29595] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:58 executing program 0 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210d6, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100006800"/96], 0x60) 08:13:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 08:13:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffff88805e268658, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 1852.429424][T29671] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1852.451842][T29670] SELinux: failed to load policy 08:13:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100006c00"/96], 0x60) 08:13:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:58 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 1852.674424][T29771] SELinux: failed to load policy 08:13:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffe0, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210d7, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1852.726311][T29786] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1852.956197][T29796] FAULT_INJECTION: forcing a failure. [ 1852.956197][T29796] name failslab, interval 1, probability 0, space 0, times 0 [ 1852.969915][T29796] CPU: 1 PID: 29796 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1852.977933][T29796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.988047][T29796] Call Trace: [ 1852.991378][T29796] dump_stack+0x172/0x1f0 [ 1852.995748][T29796] should_fail.cold+0xa/0x15 [ 1853.000370][T29796] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1853.006205][T29796] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1853.011870][T29796] __should_failslab+0x121/0x190 [ 1853.016834][T29796] should_failslab+0x9/0x14 [ 1853.021350][T29796] kmem_cache_alloc+0x47/0x6f0 [ 1853.026131][T29796] ? ext4_es_scan+0x730/0x730 [ 1853.032765][T29796] ? do_raw_write_lock+0x124/0x290 [ 1853.037939][T29796] __es_insert_extent+0x2cc/0xf20 [ 1853.042993][T29796] ext4_es_insert_extent+0x2b7/0xa40 [ 1853.048309][T29796] ? ext4_es_scan_clu+0x50/0x50 [ 1853.053192][T29796] ? rcu_read_lock_sched_held+0x110/0x130 [ 1853.060325][T29796] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1853.066595][T29796] ? ext4_es_find_extent_range+0xff/0x600 [ 1853.072398][T29796] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1853.077981][T29796] ? ext4_rereserve_cluster+0x240/0x240 [ 1853.083562][T29796] ? ext4_find_extent+0x76e/0x9d0 [ 1853.088637][T29796] ? ext4_find_extent+0x6a6/0x9d0 [ 1853.093680][T29796] ext4_ext_map_blocks+0x20a8/0x5260 [ 1853.099109][T29796] ? ext4_ext_release+0x10/0x10 [ 1853.104027][T29796] ? lock_acquire+0x16f/0x3f0 [ 1853.108728][T29796] ? ext4_map_blocks+0x3fd/0x18e0 [ 1853.113791][T29796] ext4_map_blocks+0xec7/0x18e0 [ 1853.118669][T29796] ? ext4_issue_zeroout+0x190/0x190 [ 1853.123892][T29796] ? kasan_check_write+0x14/0x20 [ 1853.128875][T29796] ? __brelse+0x95/0xb0 [ 1853.133052][T29796] ext4_getblk+0xc4/0x510 [ 1853.137400][T29796] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1853.142447][T29796] ? ext4_free_inode+0x1450/0x1450 [ 1853.147593][T29796] ext4_bread+0x8f/0x230 [ 1853.151861][T29796] ? ext4_getblk+0x510/0x510 [ 1853.156476][T29796] ext4_append+0x155/0x370 [ 1853.160920][T29796] ext4_mkdir+0x61b/0xdf0 [ 1853.165296][T29796] ? ext4_init_dot_dotdot+0x520/0x520 [ 1853.171638][T29796] ? selinux_inode_mkdir+0x23/0x30 [ 1853.176769][T29796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.183034][T29796] ? security_inode_mkdir+0xee/0x120 [ 1853.188345][T29796] vfs_mkdir+0x433/0x690 [ 1853.192610][T29796] do_mkdirat+0x234/0x2a0 [ 1853.196961][T29796] ? __ia32_sys_mknod+0xb0/0xb0 [ 1853.201832][T29796] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1853.207311][T29796] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1853.213398][T29796] ? do_syscall_64+0x26/0x610 [ 1853.218095][T29796] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1853.223400][T29796] __x64_sys_mkdir+0x5c/0x80 [ 1853.228010][T29796] do_syscall_64+0x103/0x610 [ 1853.232618][T29796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1853.238516][T29796] RIP: 0033:0x4581c7 [ 1853.242422][T29796] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1853.262043][T29796] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1853.270481][T29796] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1853.278477][T29796] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 1853.286470][T29796] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1853.294562][T29796] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1853.302552][T29796] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:13:59 executing program 0 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100007400"/96], 0x60) 08:13:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 08:13:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210d8, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:13:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1853.535215][T29911] FAULT_INJECTION: forcing a failure. [ 1853.535215][T29911] name failslab, interval 1, probability 0, space 0, times 0 [ 1853.548059][T29911] CPU: 0 PID: 29911 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1853.556067][T29911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1853.557329][T29915] SELinux: failed to load policy [ 1853.566138][T29911] Call Trace: [ 1853.566167][T29911] dump_stack+0x172/0x1f0 [ 1853.566189][T29911] should_fail.cold+0xa/0x15 [ 1853.566207][T29911] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1853.566235][T29911] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1853.566258][T29911] __should_failslab+0x121/0x190 [ 1853.566279][T29911] should_failslab+0x9/0x14 [ 1853.594854][T29911] kmem_cache_alloc+0x47/0x6f0 [ 1853.594873][T29911] ? ext4_es_scan+0x730/0x730 [ 1853.594891][T29911] ? do_raw_write_lock+0x124/0x290 [ 1853.594910][T29911] __es_insert_extent+0x2cc/0xf20 [ 1853.594934][T29911] ext4_es_insert_extent+0x2b7/0xa40 [ 1853.594952][T29911] ? ext4_es_scan_clu+0x50/0x50 [ 1853.594974][T29911] ? rcu_read_lock_sched_held+0x110/0x130 [ 1853.594988][T29911] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1853.595000][T29911] ? ext4_es_find_extent_range+0xff/0x600 [ 1853.595018][T29911] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 1853.595035][T29911] ? ext4_rereserve_cluster+0x240/0x240 [ 1853.595050][T29911] ? ext4_find_extent+0x76e/0x9d0 [ 1853.595070][T29911] ? ext4_find_extent+0x6a6/0x9d0 [ 1853.595090][T29911] ext4_ext_map_blocks+0x20a8/0x5260 [ 1853.604547][T29911] ? ext4_ext_release+0x10/0x10 [ 1853.604579][T29911] ? lock_acquire+0x16f/0x3f0 [ 1853.604596][T29911] ? ext4_map_blocks+0x3fd/0x18e0 [ 1853.604623][T29911] ext4_map_blocks+0xec7/0x18e0 [ 1853.604648][T29911] ? ext4_issue_zeroout+0x190/0x190 [ 1853.604673][T29911] ? kasan_check_write+0x14/0x20 [ 1853.604687][T29911] ? __brelse+0x95/0xb0 [ 1853.604706][T29911] ext4_getblk+0xc4/0x510 [ 1853.604724][T29911] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1853.604744][T29911] ? ext4_free_inode+0x1450/0x1450 [ 1853.604765][T29911] ext4_bread+0x8f/0x230 [ 1853.614212][T29911] ? ext4_getblk+0x510/0x510 [ 1853.614252][T29911] ext4_append+0x155/0x370 [ 1853.614273][T29911] ext4_mkdir+0x61b/0xdf0 [ 1853.614298][T29911] ? ext4_init_dot_dotdot+0x520/0x520 [ 1853.614325][T29911] ? selinux_inode_mkdir+0x23/0x30 [ 1853.614341][T29911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.614357][T29911] ? security_inode_mkdir+0xee/0x120 [ 1853.614376][T29911] vfs_mkdir+0x433/0x690 [ 1853.614396][T29911] do_mkdirat+0x234/0x2a0 [ 1853.624554][T29911] ? __ia32_sys_mknod+0xb0/0xb0 [ 1853.624571][T29911] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1853.624590][T29911] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1853.624604][T29911] ? do_syscall_64+0x26/0x610 [ 1853.624622][T29911] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1853.624640][T29911] __x64_sys_mkdir+0x5c/0x80 [ 1853.624656][T29911] do_syscall_64+0x103/0x610 [ 1853.624674][T29911] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1853.624687][T29911] RIP: 0033:0x4581c7 [ 1853.624702][T29911] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1853.624710][T29911] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1853.624723][T29911] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1853.624730][T29911] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 1853.624749][T29911] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1853.634892][T29911] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1853.634902][T29911] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1853.895246][T29907] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:59 executing program 0 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1853.929629][T29914] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100007a00"/96], 0x60) 08:13:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3}, 0x0) [ 1853.985093][T29908] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:13:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:13:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da43625c0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:13:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210d9, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1854.073389][T30015] SELinux: failed to load policy [ 1854.079968][T30010] FAULT_INJECTION: forcing a failure. [ 1854.079968][T30010] name failslab, interval 1, probability 0, space 0, times 0 [ 1854.109165][T30024] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1854.151248][T30010] CPU: 1 PID: 30010 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1854.159306][T30010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1854.169394][T30010] Call Trace: [ 1854.172729][T30010] dump_stack+0x172/0x1f0 [ 1854.177095][T30010] should_fail.cold+0xa/0x15 [ 1854.181723][T30010] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1854.187561][T30010] ? ___might_sleep+0x163/0x280 [ 1854.192441][T30010] __should_failslab+0x121/0x190 [ 1854.197407][T30010] should_failslab+0x9/0x14 [ 1854.201929][T30010] __kmalloc+0x2dc/0x740 [ 1854.206198][T30010] ? mark_held_locks+0xa4/0xf0 [ 1854.210993][T30010] ? kfree+0x173/0x230 [ 1854.215078][T30010] ? ext4_find_extent+0x76e/0x9d0 [ 1854.220121][T30010] ext4_find_extent+0x76e/0x9d0 [ 1854.225087][T30010] ext4_ext_map_blocks+0x1c3/0x5260 [ 1854.230321][T30010] ? ext4_ext_release+0x10/0x10 [ 1854.235202][T30010] ? find_held_lock+0x35/0x130 [ 1854.240012][T30010] ? lock_acquire+0x16f/0x3f0 [ 1854.244723][T30010] ? ext4_map_blocks+0x85d/0x18e0 [ 1854.249780][T30010] ext4_map_blocks+0x8c5/0x18e0 [ 1854.254700][T30010] ? ext4_issue_zeroout+0x190/0x190 [ 1854.259935][T30010] ? kasan_check_write+0x14/0x20 [ 1854.264895][T30010] ? __brelse+0x95/0xb0 [ 1854.269085][T30010] ext4_getblk+0xc4/0x510 [ 1854.273440][T30010] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1854.278493][T30010] ? ext4_free_inode+0x1450/0x1450 [ 1854.283634][T30010] ext4_bread+0x8f/0x230 [ 1854.287905][T30010] ? ext4_getblk+0x510/0x510 [ 1854.292534][T30010] ext4_append+0x155/0x370 [ 1854.296994][T30010] ext4_mkdir+0x61b/0xdf0 08:14:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 08:14:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000300"/96], 0x60) [ 1854.301361][T30010] ? ext4_init_dot_dotdot+0x520/0x520 [ 1854.306753][T30010] ? selinux_inode_mkdir+0x23/0x30 [ 1854.311866][T30010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1854.318126][T30010] ? security_inode_mkdir+0xee/0x120 [ 1854.323448][T30010] vfs_mkdir+0x433/0x690 [ 1854.327718][T30010] do_mkdirat+0x234/0x2a0 [ 1854.332170][T30010] ? __ia32_sys_mknod+0xb0/0xb0 [ 1854.337073][T30010] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1854.337093][T30010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1854.337107][T30010] ? do_syscall_64+0x26/0x610 [ 1854.337123][T30010] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1854.337144][T30010] __x64_sys_mkdir+0x5c/0x80 [ 1854.337161][T30010] do_syscall_64+0x103/0x610 [ 1854.337180][T30010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1854.337193][T30010] RIP: 0033:0x4581c7 [ 1854.337209][T30010] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1854.337216][T30010] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1854.337242][T30010] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1854.337251][T30010] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 1854.337259][T30010] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1854.337266][T30010] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1854.337274][T30010] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1854.361003][T30037] SELinux: failed to load policy 08:14:00 executing program 0 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1854.525391][T30031] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1854.560610][T30026] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1854.617152][T30068] FAULT_INJECTION: forcing a failure. [ 1854.617152][T30068] name failslab, interval 1, probability 0, space 0, times 0 [ 1854.629970][T30068] CPU: 0 PID: 30068 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1854.637990][T30068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1854.648062][T30068] Call Trace: [ 1854.651381][T30068] dump_stack+0x172/0x1f0 [ 1854.655729][T30068] should_fail.cold+0xa/0x15 [ 1854.660348][T30068] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1854.666171][T30068] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1854.671909][T30068] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1854.671933][T30068] __should_failslab+0x121/0x190 [ 1854.671950][T30068] should_failslab+0x9/0x14 [ 1854.671969][T30068] kmem_cache_alloc+0x47/0x6f0 [ 1854.671985][T30068] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1854.672005][T30068] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1854.702996][T30068] ? ext4_es_scan+0x730/0x730 [ 1854.707722][T30068] ? do_raw_write_lock+0x124/0x290 [ 1854.712864][T30068] __es_insert_extent+0x2cc/0xf20 [ 1854.717932][T30068] ext4_es_insert_extent+0x2b7/0xa40 [ 1854.723255][T30068] ? ext4_es_scan_clu+0x50/0x50 [ 1854.728245][T30068] ext4_map_blocks+0xb87/0x18e0 [ 1854.733146][T30068] ? ext4_issue_zeroout+0x190/0x190 [ 1854.738378][T30068] ? kasan_check_write+0x14/0x20 [ 1854.743334][T30068] ? __brelse+0x95/0xb0 [ 1854.743359][T30068] ext4_getblk+0xc4/0x510 [ 1854.743379][T30068] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1854.743400][T30068] ? ext4_free_inode+0x1450/0x1450 [ 1854.762052][T30068] ext4_bread+0x8f/0x230 [ 1854.766347][T30068] ? ext4_getblk+0x510/0x510 [ 1854.769691][T30147] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1854.770961][T30068] ext4_append+0x155/0x370 [ 1854.770983][T30068] ext4_mkdir+0x61b/0xdf0 [ 1854.771012][T30068] ? ext4_init_dot_dotdot+0x520/0x520 [ 1854.796044][T30068] ? selinux_inode_mkdir+0x23/0x30 [ 1854.796062][T30068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1854.796078][T30068] ? security_inode_mkdir+0xee/0x120 [ 1854.796096][T30068] vfs_mkdir+0x433/0x690 08:14:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 08:14:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:14:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363a24ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000500"/96], 0x60) 08:14:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210da, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1854.796117][T30068] do_mkdirat+0x234/0x2a0 [ 1854.796132][T30068] ? __ia32_sys_mknod+0xb0/0xb0 [ 1854.796148][T30068] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1854.796164][T30068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1854.796178][T30068] ? do_syscall_64+0x26/0x610 [ 1854.796193][T30068] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1854.796216][T30068] __x64_sys_mkdir+0x5c/0x80 [ 1854.821496][T30068] do_syscall_64+0x103/0x610 [ 1854.821521][T30068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1854.821534][T30068] RIP: 0033:0x4581c7 [ 1854.821554][T30068] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1854.831170][T30149] SELinux: failed to load policy [ 1854.831869][T30068] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1854.831885][T30068] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1854.831893][T30068] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 08:14:00 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6}, 0x0) 08:14:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000600"/96], 0x60) [ 1854.831911][T30068] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1854.839760][T30150] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1854.842661][T30068] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1854.842671][T30068] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:14:00 executing program 0 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1855.087672][T30161] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1855.113851][T30162] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1855.188721][T30189] FAULT_INJECTION: forcing a failure. [ 1855.188721][T30189] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.202340][T30189] CPU: 0 PID: 30189 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1855.210348][T30189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1855.220427][T30189] Call Trace: [ 1855.224023][T30189] dump_stack+0x172/0x1f0 [ 1855.228395][T30189] should_fail.cold+0xa/0x15 [ 1855.233014][T30189] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1855.238837][T30189] ? __sigqueue_alloc+0x173/0x4d0 [ 1855.243889][T30189] ? find_held_lock+0x35/0x130 [ 1855.248677][T30189] __should_failslab+0x121/0x190 [ 1855.253632][T30189] should_failslab+0x9/0x14 [ 1855.258160][T30189] kmem_cache_alloc+0x47/0x6f0 [ 1855.262947][T30189] ? kasan_check_read+0x11/0x20 [ 1855.267818][T30189] __sigqueue_alloc+0x268/0x4d0 [ 1855.272687][T30189] __send_signal+0xda3/0x1590 [ 1855.277395][T30189] send_signal+0x49/0xd0 [ 1855.281668][T30189] force_sig_info+0x251/0x310 [ 1855.286375][T30189] force_sig_fault+0xbb/0xf0 [ 1855.290974][T30189] ? force_sigsegv+0x120/0x120 [ 1855.295759][T30189] ? trace_hardirqs_on+0x67/0x230 [ 1855.300862][T30189] __bad_area_nosemaphore+0x332/0x420 [ 1855.306296][T30189] bad_area+0x69/0x80 [ 1855.310318][T30189] __do_page_fault+0x996/0xda0 [ 1855.315114][T30189] do_page_fault+0x71/0x581 [ 1855.319643][T30189] ? page_fault+0x8/0x30 [ 1855.323912][T30189] page_fault+0x1e/0x30 [ 1855.328093][T30189] RIP: 0033:0x452a5f [ 1855.332091][T30189] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1855.351720][T30189] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00010283 [ 1855.357803][T30189] RAX: 00007f5eb3af2b40 RBX: 0000000020000428 RCX: 0000000000000000 [ 1855.365796][T30189] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f5eb3af2b40 [ 1855.373795][T30189] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 1855.381780][T30189] R10: 0000000000000075 R11: 00000000004e31a0 R12: 0000000000000004 08:14:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7}, 0x0) 08:14:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000700"/96], 0x60) 08:14:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363a9fed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1855.389774][T30189] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210db, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1855.478877][T30274] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000a00"/96], 0x60) 08:14:01 executing program 0 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1855.531547][T30279] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf}, 0x0) [ 1855.624899][T30285] FAULT_INJECTION: forcing a failure. [ 1855.624899][T30285] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.637862][T30285] CPU: 0 PID: 30285 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1855.645864][T30285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1855.655940][T30285] Call Trace: [ 1855.659273][T30285] dump_stack+0x172/0x1f0 [ 1855.663644][T30285] should_fail.cold+0xa/0x15 [ 1855.668298][T30285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1855.674151][T30285] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1855.679905][T30285] ? __es_tree_search.isra.0+0x1bf/0x230 [ 1855.685575][T30285] __should_failslab+0x121/0x190 [ 1855.690540][T30285] should_failslab+0x9/0x14 [ 1855.695161][T30285] kmem_cache_alloc+0x47/0x6f0 [ 1855.699949][T30285] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1855.705690][T30285] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 1855.711165][T30285] ? ext4_es_scan+0x730/0x730 [ 1855.715856][T30285] ? do_raw_write_lock+0x124/0x290 [ 1855.720990][T30285] __es_insert_extent+0x2cc/0xf20 [ 1855.726047][T30285] ext4_es_insert_extent+0x2b7/0xa40 [ 1855.731370][T30285] ? ext4_es_scan_clu+0x50/0x50 [ 1855.736273][T30285] ext4_map_blocks+0xb87/0x18e0 [ 1855.741181][T30285] ? ext4_issue_zeroout+0x190/0x190 [ 1855.746423][T30285] ? kasan_check_write+0x14/0x20 [ 1855.751378][T30285] ? __brelse+0x95/0xb0 [ 1855.755554][T30285] ext4_getblk+0xc4/0x510 [ 1855.759904][T30285] ? ext4_iomap_begin+0xfe0/0xfe0 [ 1855.764947][T30285] ? ext4_free_inode+0x1450/0x1450 [ 1855.770074][T30285] ext4_bread+0x8f/0x230 [ 1855.774443][T30285] ? ext4_getblk+0x510/0x510 [ 1855.779171][T30285] ext4_append+0x155/0x370 [ 1855.783637][T30285] ext4_mkdir+0x61b/0xdf0 [ 1855.788013][T30285] ? ext4_init_dot_dotdot+0x520/0x520 [ 1855.793410][T30285] ? selinux_inode_mkdir+0x23/0x30 [ 1855.798535][T30285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1855.804792][T30285] ? security_inode_mkdir+0xee/0x120 [ 1855.810092][T30285] vfs_mkdir+0x433/0x690 [ 1855.814358][T30285] do_mkdirat+0x234/0x2a0 [ 1855.818706][T30285] ? __ia32_sys_mknod+0xb0/0xb0 [ 1855.823577][T30285] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1855.829066][T30285] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1855.835154][T30285] ? do_syscall_64+0x26/0x610 [ 1855.839846][T30285] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1855.845152][T30285] __x64_sys_mkdir+0x5c/0x80 [ 1855.849759][T30285] do_syscall_64+0x103/0x610 [ 1855.854364][T30285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1855.860271][T30285] RIP: 0033:0x4581c7 [ 1855.864180][T30285] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1855.884002][T30285] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1855.892437][T30285] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 00000000004581c7 [ 1855.900421][T30285] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000000 [ 1855.908406][T30285] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1855.916393][T30285] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 08:14:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0200000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1855.924380][T30285] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1855.975600][T30293] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48}, 0x0) 08:14:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000002000"/96], 0x60) 08:14:01 executing program 0 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1856.072222][T30353] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210dc, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1856.146275][T30402] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1856.186711][T30405] FAULT_INJECTION: forcing a failure. [ 1856.186711][T30405] name failslab, interval 1, probability 0, space 0, times 0 [ 1856.195740][T30407] sel_write_load: 3 callbacks suppressed [ 1856.195746][T30407] SELinux: failed to load policy [ 1856.211278][T30409] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c}, 0x0) [ 1856.240207][T30405] CPU: 1 PID: 30405 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1856.248285][T30405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1856.259547][T30405] Call Trace: [ 1856.262871][T30405] dump_stack+0x172/0x1f0 [ 1856.267241][T30405] should_fail.cold+0xa/0x15 [ 1856.267267][T30405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1856.277891][T30405] ? ___might_sleep+0x163/0x280 [ 1856.283400][T30405] __should_failslab+0x121/0x190 [ 1856.288839][T30405] should_failslab+0x9/0x14 [ 1856.293380][T30405] __kmalloc_track_caller+0x2d8/0x740 [ 1856.298785][T30405] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1856.305060][T30405] ? strndup_user+0x77/0xd0 [ 1856.309596][T30405] memdup_user+0x26/0xb0 [ 1856.314296][T30405] strndup_user+0x77/0xd0 [ 1856.319067][T30405] ksys_mount+0x7b/0x150 [ 1856.323340][T30405] __x64_sys_mount+0xbe/0x150 [ 1856.328049][T30405] do_syscall_64+0x103/0x610 [ 1856.332679][T30405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1856.338673][T30405] RIP: 0033:0x45b81a [ 1856.342588][T30405] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1856.362217][T30405] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1856.370678][T30405] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1856.378674][T30405] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 08:14:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000003f00"/96], 0x60) 08:14:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1856.386677][T30405] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1856.394667][T30405] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1856.402665][T30405] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:14:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210dd, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1856.440300][T30517] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1856.485494][T30520] SELinux: failed to load policy 08:14:02 executing program 0 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1856.507043][T30524] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x60}, 0x0) 08:14:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000004800"/96], 0x60) 08:14:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:14:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1856.651550][T30535] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210de, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x68}, 0x0) [ 1856.711862][T30615] FAULT_INJECTION: forcing a failure. [ 1856.711862][T30615] name failslab, interval 1, probability 0, space 0, times 0 [ 1856.726025][T30610] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1856.738844][T30633] SELinux: failed to load policy [ 1856.803545][T30615] CPU: 1 PID: 30615 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1856.811616][T30615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1856.821701][T30615] Call Trace: [ 1856.825021][T30615] dump_stack+0x172/0x1f0 [ 1856.829391][T30615] should_fail.cold+0xa/0x15 [ 1856.834012][T30615] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1856.839864][T30615] ? ___might_sleep+0x163/0x280 [ 1856.844777][T30615] __should_failslab+0x121/0x190 [ 1856.849754][T30615] should_failslab+0x9/0x14 [ 1856.854283][T30615] __kmalloc_track_caller+0x2d8/0x740 [ 1856.859686][T30615] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1856.865942][T30615] ? strndup_user+0x77/0xd0 [ 1856.870479][T30615] memdup_user+0x26/0xb0 [ 1856.874749][T30615] strndup_user+0x77/0xd0 [ 1856.879116][T30615] ksys_mount+0x7b/0x150 [ 1856.883389][T30615] __x64_sys_mount+0xbe/0x150 [ 1856.888103][T30615] do_syscall_64+0x103/0x610 [ 1856.892725][T30615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1856.898648][T30615] RIP: 0033:0x45b81a [ 1856.902561][T30615] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1856.922198][T30615] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1856.930655][T30615] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1856.938654][T30615] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 08:14:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1856.946833][T30615] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1856.954835][T30615] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1856.962838][T30615] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000004c00"/96], 0x60) [ 1857.014192][T30650] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1857.060170][T30689] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6c}, 0x0) 08:14:03 executing program 0 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1857.141048][T30732] SELinux: failed to load policy 08:14:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:14:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210df, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000006000"/96], 0x60) [ 1857.199536][T30760] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1857.251190][T30765] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1857.264288][T30763] FAULT_INJECTION: forcing a failure. [ 1857.264288][T30763] name failslab, interval 1, probability 0, space 0, times 0 [ 1857.296431][T30763] CPU: 0 PID: 30763 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1857.304519][T30763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1857.314689][T30763] Call Trace: [ 1857.318022][T30763] dump_stack+0x172/0x1f0 [ 1857.322387][T30763] should_fail.cold+0xa/0x15 [ 1857.327005][T30763] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1857.332841][T30763] ? ___might_sleep+0x163/0x280 [ 1857.337714][T30763] __should_failslab+0x121/0x190 [ 1857.342666][T30763] should_failslab+0x9/0x14 [ 1857.347187][T30763] __kmalloc_track_caller+0x2d8/0x740 [ 1857.352733][T30763] ? setup_sigcontext+0x7d0/0x7d0 [ 1857.357783][T30763] ? __bad_area_nosemaphore+0xb3/0x420 [ 1857.363267][T30763] ? strndup_user+0x77/0xd0 [ 1857.367797][T30763] memdup_user+0x26/0xb0 [ 1857.372056][T30763] strndup_user+0x77/0xd0 [ 1857.376405][T30763] ksys_mount+0x3c/0x150 [ 1857.380666][T30763] __x64_sys_mount+0xbe/0x150 [ 1857.385362][T30763] do_syscall_64+0x103/0x610 [ 1857.389972][T30763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1857.395879][T30763] RIP: 0033:0x45b81a [ 1857.399787][T30763] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1857.419414][T30763] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1857.427846][T30763] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1857.435839][T30763] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1857.443840][T30763] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 08:14:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x74}, 0x0) [ 1857.451833][T30763] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1857.459826][T30763] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0600000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1857.507677][T30872] SELinux: failed to load policy 08:14:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1857.587185][T30876] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:03 executing program 0 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1857.638503][T30883] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000006800"/96], 0x60) 08:14:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7a}, 0x0) 08:14:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0700000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e1, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1857.764743][T30987] FAULT_INJECTION: forcing a failure. [ 1857.764743][T30987] name failslab, interval 1, probability 0, space 0, times 0 [ 1857.800499][T30995] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1857.805491][T30992] SELinux: failed to load policy [ 1857.816952][T30987] CPU: 1 PID: 30987 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1857.825113][T30987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1857.825123][T30987] Call Trace: [ 1857.825152][T30987] dump_stack+0x172/0x1f0 [ 1857.825176][T30987] should_fail.cold+0xa/0x15 [ 1857.825199][T30987] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1857.825235][T30987] ? ___might_sleep+0x163/0x280 [ 1857.825265][T30987] __should_failslab+0x121/0x190 [ 1857.843180][T30987] should_failslab+0x9/0x14 [ 1857.868347][T30987] kmem_cache_alloc_trace+0x2d1/0x760 [ 1857.873744][T30987] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1857.880137][T30987] ? _copy_from_user+0xdd/0x150 [ 1857.885021][T30987] copy_mount_options+0x5c/0x3a0 [ 1857.889984][T30987] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1857.896361][T30987] ksys_mount+0xa7/0x150 [ 1857.900621][T30987] __x64_sys_mount+0xbe/0x150 [ 1857.905443][T30987] do_syscall_64+0x103/0x610 [ 1857.910050][T30987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1857.915955][T30987] RIP: 0033:0x45b81a [ 1857.919861][T30987] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1857.939486][T30987] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1857.947952][T30987] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1857.956089][T30987] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1857.964083][T30987] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1857.972284][T30987] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1857.980753][T30987] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000006c00"/96], 0x60) 08:14:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 1858.059991][T31002] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1858.107004][T31010] SELinux: failed to load policy 08:14:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000007400"/96], 0x60) 08:14:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1858.173798][T31072] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x300}, 0x0) [ 1858.279945][T31112] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1858.295677][T31110] SELinux: failed to load policy [ 1858.326655][T31118] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:04 executing program 0 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e2, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000007a00"/96], 0x60) 08:14:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:14:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x500}, 0x0) 08:14:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1858.446946][T31122] SELinux: failed to load policy [ 1858.504902][T31131] FAULT_INJECTION: forcing a failure. [ 1858.504902][T31131] name failslab, interval 1, probability 0, space 0, times 0 [ 1858.546324][T31131] CPU: 0 PID: 31131 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1858.554462][T31131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1858.564538][T31131] Call Trace: [ 1858.567856][T31131] dump_stack+0x172/0x1f0 [ 1858.572207][T31131] should_fail.cold+0xa/0x15 [ 1858.576827][T31131] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1858.582653][T31131] ? ___might_sleep+0x163/0x280 [ 1858.587520][T31131] __should_failslab+0x121/0x190 [ 1858.592477][T31131] should_failslab+0x9/0x14 [ 1858.597000][T31131] kmem_cache_alloc_trace+0x2d1/0x760 [ 1858.602391][T31131] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1858.608654][T31131] ? _copy_from_user+0xdd/0x150 [ 1858.613538][T31131] copy_mount_options+0x5c/0x3a0 [ 1858.618499][T31131] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1858.624855][T31131] ksys_mount+0xa7/0x150 [ 1858.629123][T31131] __x64_sys_mount+0xbe/0x150 [ 1858.633837][T31131] do_syscall_64+0x103/0x610 [ 1858.638463][T31131] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1858.644374][T31131] RIP: 0033:0x45b81a [ 1858.648365][T31131] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1858.667996][T31131] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1858.676443][T31131] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1858.684443][T31131] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 08:14:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e3, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000100"/96], 0x60) [ 1858.692445][T31131] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1858.700443][T31131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1858.708447][T31131] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1858.717147][T31133] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1858.733262][T31135] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x600}, 0x0) [ 1858.770397][T31240] SELinux: failed to load policy 08:14:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:14:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0a00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000200"/96], 0x60) [ 1858.861373][T31246] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1858.920985][T31296] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:04 executing program 0 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x700}, 0x0) 08:14:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) 08:14:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e4, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0b00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000300"/96], 0x60) [ 1859.145488][T31358] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1859.198821][T31361] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1859.246650][T31370] FAULT_INJECTION: forcing a failure. [ 1859.246650][T31370] name failslab, interval 1, probability 0, space 0, times 0 08:14:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) [ 1859.290730][T31370] CPU: 1 PID: 31370 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1859.298785][T31370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1859.298793][T31370] Call Trace: [ 1859.298831][T31370] dump_stack+0x172/0x1f0 [ 1859.298857][T31370] should_fail.cold+0xa/0x15 [ 1859.298885][T31370] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1859.321171][T31370] ? ___might_sleep+0x163/0x280 [ 1859.321195][T31370] __should_failslab+0x121/0x190 [ 1859.321212][T31370] should_failslab+0x9/0x14 [ 1859.321240][T31370] kmem_cache_alloc+0x2b2/0x6f0 [ 1859.321262][T31370] ? cache_grow_end+0xa4/0x190 [ 1859.331936][T31370] ? kasan_check_write+0x14/0x20 [ 1859.331958][T31370] getname_flags+0xd6/0x5b0 [ 1859.331979][T31370] user_path_at_empty+0x2f/0x50 [ 1859.331996][T31370] do_mount+0x150/0x2c40 [ 1859.332016][T31370] ? copy_mount_options+0x5c/0x3a0 [ 1859.346504][T31370] ? copy_mount_string+0x40/0x40 [ 1859.346532][T31370] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1859.346546][T31370] ? copy_mount_options+0x280/0x3a0 [ 1859.346565][T31370] ksys_mount+0xdb/0x150 [ 1859.346581][T31370] __x64_sys_mount+0xbe/0x150 [ 1859.346601][T31370] do_syscall_64+0x103/0x610 [ 1859.346621][T31370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1859.346632][T31370] RIP: 0033:0x45b81a [ 1859.346648][T31370] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1859.346655][T31370] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1859.346669][T31370] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1859.346679][T31370] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1859.346687][T31370] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1859.346702][T31370] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1859.360892][T31370] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed1000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000400"/96], 0x60) 08:14:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 1859.533998][T31376] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 08:14:05 executing program 0 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1859.626264][T31423] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e5, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed2300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1859.695040][T31489] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000500"/96], 0x60) 08:14:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x2) 08:14:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2839}, 0x0) [ 1859.814202][T31493] FAULT_INJECTION: forcing a failure. [ 1859.814202][T31493] name failslab, interval 1, probability 0, space 0, times 0 [ 1859.857767][T31493] CPU: 0 PID: 31493 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1859.865836][T31493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1859.865844][T31493] Call Trace: [ 1859.865874][T31493] dump_stack+0x172/0x1f0 [ 1859.865899][T31493] should_fail.cold+0xa/0x15 [ 1859.865919][T31493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1859.865942][T31493] ? ___might_sleep+0x163/0x280 [ 1859.865964][T31493] __should_failslab+0x121/0x190 [ 1859.865987][T31493] should_failslab+0x9/0x14 [ 1859.885312][T31503] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1859.888264][T31493] kmem_cache_alloc_trace+0x2d1/0x760 [ 1859.888290][T31493] alloc_fs_context+0x5a/0x640 [ 1859.888318][T31493] fs_context_for_mount+0x25/0x30 [ 1859.908380][T31493] do_mount+0x13d7/0x2c40 [ 1859.908404][T31493] ? copy_mount_string+0x40/0x40 [ 1859.908427][T31493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1859.908446][T31493] ? copy_mount_options+0x280/0x3a0 [ 1859.955117][T31493] ksys_mount+0xdb/0x150 [ 1859.955138][T31493] __x64_sys_mount+0xbe/0x150 [ 1859.955158][T31493] do_syscall_64+0x103/0x610 [ 1859.955178][T31493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1859.955198][T31493] RIP: 0033:0x45b81a [ 1859.968880][T31493] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1859.968890][T31493] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:14:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000600"/96], 0x60) [ 1859.968906][T31493] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1859.968916][T31493] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1859.968925][T31493] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1859.968933][T31493] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1859.968948][T31493] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x3) 08:14:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed4800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e6, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1860.076446][T31610] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x4) 08:14:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3928}, 0x0) 08:14:06 executing program 0 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000700"/96], 0x60) [ 1860.244152][T31625] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed4c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1860.288382][T31651] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x5) 08:14:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000000a00"/96], 0x60) 08:14:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e7, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) [ 1860.397869][T31731] FAULT_INJECTION: forcing a failure. [ 1860.397869][T31731] name failslab, interval 1, probability 0, space 0, times 0 [ 1860.431525][T31731] CPU: 1 PID: 31731 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1860.439563][T31731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1860.449632][T31731] Call Trace: [ 1860.452953][T31731] dump_stack+0x172/0x1f0 [ 1860.457318][T31731] should_fail.cold+0xa/0x15 [ 1860.461941][T31731] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1860.467765][T31731] ? ___might_sleep+0x163/0x280 [ 1860.472634][T31731] __should_failslab+0x121/0x190 [ 1860.477593][T31731] should_failslab+0x9/0x14 [ 1860.482102][T31731] __kmalloc_track_caller+0x2d8/0x740 [ 1860.487475][T31731] ? kasan_kmalloc+0x9/0x10 [ 1860.491977][T31731] ? kmem_cache_alloc_trace+0x151/0x760 [ 1860.497533][T31731] ? legacy_init_fs_context+0x48/0xe0 [ 1860.502935][T31731] ? alloc_fs_context+0x365/0x640 [ 1860.507966][T31731] ? fs_context_for_mount+0x25/0x30 [ 1860.513170][T31731] ? do_mount+0x13d7/0x2c40 [ 1860.517689][T31731] ? ksys_mount+0xdb/0x150 [ 1860.522258][T31731] ? btrfs_mount+0xdc/0x15e2 [ 1860.526884][T31731] kstrdup+0x3a/0x70 [ 1860.530800][T31731] ? btrfs_remount+0x11f0/0x11f0 [ 1860.535760][T31731] btrfs_mount+0xdc/0x15e2 [ 1860.540185][T31731] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1860.545403][T31731] ? fs_parse+0x57e/0xfc0 [ 1860.549754][T31731] ? btrfs_remount+0x11f0/0x11f0 [ 1860.554705][T31731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1860.560971][T31731] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1860.567146][T31731] ? selinux_sb_show_options+0x550/0x550 [ 1860.572794][T31731] ? rcu_read_lock_sched_held+0x110/0x130 [ 1860.578536][T31731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1860.584789][T31731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1860.591050][T31731] ? vfs_parse_fs_string+0x111/0x170 [ 1860.596356][T31731] ? vfs_parse_fs_string+0x111/0x170 [ 1860.601664][T31731] ? rcu_read_lock_sched_held+0x110/0x130 [ 1860.607491][T31731] ? kfree+0x1fa/0x230 [ 1860.611659][T31731] ? vfs_parse_fs_string+0x116/0x170 [ 1860.616967][T31731] ? btrfs_remount+0x11f0/0x11f0 [ 1860.621913][T31731] legacy_get_tree+0xf2/0x200 [ 1860.626607][T31731] ? btrfs_remount+0x11f0/0x11f0 [ 1860.631559][T31731] ? legacy_get_tree+0xf2/0x200 [ 1860.636424][T31731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1860.642683][T31731] vfs_get_tree+0x123/0x450 [ 1860.647203][T31731] do_mount+0x1436/0x2c40 [ 1860.651559][T31731] ? copy_mount_string+0x40/0x40 [ 1860.656515][T31731] ? __sanitizer_cov_trace_const_cmp4+0x20/0x20 [ 1860.662865][T31731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1860.669138][T31731] ? copy_mount_options+0x280/0x3a0 [ 1860.674368][T31731] ksys_mount+0xdb/0x150 [ 1860.678637][T31731] __x64_sys_mount+0xbe/0x150 [ 1860.683342][T31731] do_syscall_64+0x103/0x610 [ 1860.687960][T31731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1860.693866][T31731] RIP: 0033:0x45b81a [ 1860.697773][T31731] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1860.717404][T31731] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1860.725847][T31731] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1860.733873][T31731] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 08:14:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x6) [ 1860.741869][T31731] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1860.749857][T31731] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1860.757843][T31731] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1860.792155][T31745] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed6800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x7) 08:14:06 executing program 0 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1860.850286][T31750] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 08:14:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000002000"/96], 0x60) [ 1860.981848][T31761] FAULT_INJECTION: forcing a failure. [ 1860.981848][T31761] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.042969][T31761] CPU: 1 PID: 31761 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1861.044013][T31811] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1861.051044][T31761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1861.051053][T31761] Call Trace: [ 1861.051087][T31761] dump_stack+0x172/0x1f0 [ 1861.051112][T31761] should_fail.cold+0xa/0x15 [ 1861.051149][T31761] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1861.051180][T31761] ? ___might_sleep+0x163/0x280 [ 1861.106770][T31761] __should_failslab+0x121/0x190 [ 1861.111755][T31761] should_failslab+0x9/0x14 [ 1861.116311][T31761] __kmalloc_track_caller+0x2d8/0x740 [ 1861.121722][T31761] ? kasan_kmalloc+0x9/0x10 [ 1861.126262][T31761] ? kmem_cache_alloc_trace+0x151/0x760 [ 1861.131836][T31761] ? legacy_init_fs_context+0x48/0xe0 [ 1861.137254][T31761] ? alloc_fs_context+0x365/0x640 [ 1861.142311][T31761] ? fs_context_for_mount+0x25/0x30 [ 1861.147536][T31761] ? do_mount+0x13d7/0x2c40 [ 1861.152065][T31761] ? ksys_mount+0xdb/0x150 [ 1861.156513][T31761] ? btrfs_mount+0xdc/0x15e2 [ 1861.161131][T31761] kstrdup+0x3a/0x70 [ 1861.165048][T31761] ? btrfs_remount+0x11f0/0x11f0 [ 1861.170904][T31761] btrfs_mount+0xdc/0x15e2 [ 1861.175340][T31761] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1861.180567][T31761] ? fs_parse+0x57e/0xfc0 [ 1861.184944][T31761] ? btrfs_remount+0x11f0/0x11f0 [ 1861.189904][T31761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1861.196173][T31761] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1861.202356][T31761] ? selinux_sb_show_options+0x550/0x550 [ 1861.208020][T31761] ? rcu_read_lock_sched_held+0x110/0x130 [ 1861.213759][T31761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1861.220016][T31761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1861.226290][T31761] ? vfs_parse_fs_string+0x111/0x170 [ 1861.231601][T31761] ? vfs_parse_fs_string+0x111/0x170 [ 1861.236918][T31761] ? rcu_read_lock_sched_held+0x110/0x130 [ 1861.242747][T31761] ? kfree+0x1fa/0x230 [ 1861.246845][T31761] ? vfs_parse_fs_string+0x116/0x170 [ 1861.252149][T31761] ? btrfs_remount+0x11f0/0x11f0 [ 1861.257104][T31761] legacy_get_tree+0xf2/0x200 [ 1861.261827][T31761] ? btrfs_remount+0x11f0/0x11f0 [ 1861.266786][T31761] ? legacy_get_tree+0xf2/0x200 [ 1861.271661][T31761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1861.277918][T31761] vfs_get_tree+0x123/0x450 [ 1861.282440][T31761] do_mount+0x1436/0x2c40 [ 1861.286792][T31761] ? copy_mount_string+0x40/0x40 [ 1861.291755][T31761] ? copy_mount_options+0x1fb/0x3a0 [ 1861.296970][T31761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1861.303223][T31761] ? copy_mount_options+0x280/0x3a0 [ 1861.308449][T31761] ksys_mount+0xdb/0x150 [ 1861.312708][T31761] __x64_sys_mount+0xbe/0x150 [ 1861.317428][T31761] do_syscall_64+0x103/0x610 [ 1861.322034][T31761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1861.327932][T31761] RIP: 0033:0x45b81a [ 1861.331847][T31761] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1861.351474][T31761] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1861.359913][T31761] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1861.367911][T31761] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1861.375904][T31761] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1861.383897][T31761] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 08:14:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) 08:14:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000003f00"/96], 0x60) 08:14:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e8, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xa) [ 1861.391889][T31761] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1861.426825][T31871] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xc) [ 1861.455413][T31877] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1861.484396][T31876] sel_write_load: 10 callbacks suppressed [ 1861.484403][T31876] SELinux: failed to load policy 08:14:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c00}, 0x0) 08:14:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed6c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000004800"/96], 0x60) [ 1861.556304][T31881] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xe) [ 1861.646662][T31976] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1861.679868][T31987] SELinux: failed to load policy 08:14:07 executing program 0 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x10) 08:14:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 08:14:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210e9, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1861.712056][T31993] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000004c00"/96], 0x60) [ 1861.849293][T32001] FAULT_INJECTION: forcing a failure. [ 1861.849293][T32001] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.872751][T32001] CPU: 1 PID: 32001 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1861.880822][T32001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1861.890902][T32001] Call Trace: [ 1861.894236][T32001] dump_stack+0x172/0x1f0 [ 1861.898603][T32001] should_fail.cold+0xa/0x15 [ 1861.903236][T32001] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1861.909078][T32001] ? ___might_sleep+0x163/0x280 [ 1861.913955][T32001] __should_failslab+0x121/0x190 [ 1861.918914][T32001] should_failslab+0x9/0x14 [ 1861.923452][T32001] kmem_cache_alloc_trace+0x2d1/0x760 [ 1861.928853][T32001] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1861.934678][T32001] ? rcu_read_lock_sched_held+0x110/0x130 [ 1861.940456][T32001] ? kmem_cache_alloc_trace+0x354/0x760 [ 1861.946032][T32001] legacy_init_fs_context+0x48/0xe0 [ 1861.951262][T32001] ? generic_parse_monolithic+0x200/0x200 [ 1861.957025][T32001] alloc_fs_context+0x365/0x640 [ 1861.961905][T32001] fs_context_for_mount+0x25/0x30 [ 1861.967209][T32001] do_mount+0x13d7/0x2c40 [ 1861.971576][T32001] ? copy_mount_string+0x40/0x40 [ 1861.976541][T32001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1861.982848][T32001] ? copy_mount_options+0x280/0x3a0 [ 1861.988077][T32001] ksys_mount+0xdb/0x150 [ 1861.992345][T32001] __x64_sys_mount+0xbe/0x150 [ 1861.997046][T32001] do_syscall_64+0x103/0x610 [ 1862.001650][T32001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1862.007775][T32001] RIP: 0033:0x45b81a [ 1862.011683][T32001] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1862.031309][T32001] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1862.039753][T32001] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a 08:14:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210ea, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1862.047761][T32001] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1862.055753][T32001] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1862.063754][T32001] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1862.071748][T32001] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1862.080400][T32002] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1862.092404][T32108] SELinux: failed to load policy [ 1862.101214][T32109] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000006000"/96], 0x60) 08:14:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6800}, 0x0) 08:14:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed7400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x60) [ 1862.260571][T32118] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1862.275276][T32115] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1862.287628][T32119] SELinux: failed to load policy 08:14:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6c00}, 0x0) 08:14:08 executing program 0 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1862.312507][T32161] SELinux: failed to load policy 08:14:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000006800"/96], 0x60) 08:14:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210eb, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xf0) [ 1862.386910][T32226] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1862.425588][T32228] FAULT_INJECTION: forcing a failure. 08:14:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed7a00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1862.425588][T32228] name failslab, interval 1, probability 0, space 0, times 0 [ 1862.465089][T32228] CPU: 0 PID: 32228 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1862.473142][T32228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1862.483235][T32228] Call Trace: [ 1862.486561][T32228] dump_stack+0x172/0x1f0 [ 1862.490919][T32228] should_fail.cold+0xa/0x15 [ 1862.495532][T32228] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1862.501361][T32228] ? ___might_sleep+0x163/0x280 [ 1862.506246][T32228] __should_failslab+0x121/0x190 [ 1862.511196][T32228] should_failslab+0x9/0x14 [ 1862.515722][T32228] __kmalloc_track_caller+0x2d8/0x740 [ 1862.521118][T32228] ? vfs_parse_fs_string+0xe8/0x170 [ 1862.526340][T32228] kmemdup_nul+0x31/0xa0 [ 1862.527633][T32239] SELinux: failed to load policy [ 1862.530598][T32228] vfs_parse_fs_string+0xe8/0x170 [ 1862.530615][T32228] ? vfs_parse_fs_param+0x510/0x510 [ 1862.530638][T32228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1862.530651][T32228] ? alloc_fs_context+0x3bb/0x640 [ 1862.530672][T32228] do_mount+0x6e9/0x2c40 [ 1862.561483][T32228] ? copy_mount_string+0x40/0x40 [ 1862.566449][T32228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1862.572710][T32228] ? copy_mount_options+0x280/0x3a0 [ 1862.577937][T32228] ksys_mount+0xdb/0x150 [ 1862.582198][T32228] __x64_sys_mount+0xbe/0x150 [ 1862.586907][T32228] do_syscall_64+0x103/0x610 [ 1862.591517][T32228] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1862.597426][T32228] RIP: 0033:0x45b81a [ 1862.601336][T32228] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1862.620968][T32228] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1862.629430][T32228] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1862.637422][T32228] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1862.645416][T32228] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1862.653410][T32228] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1862.661406][T32228] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7400}, 0x0) 08:14:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000006c00"/96], 0x60) 08:14:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x300) 08:14:08 executing program 0 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1862.774981][T32253] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1862.815852][T32309] SELinux: failed to load policy 08:14:08 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7a00}, 0x0) 08:14:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ede000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210ec, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000007400"/96], 0x60) [ 1862.891661][T32351] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1862.926269][T32354] FAULT_INJECTION: forcing a failure. [ 1862.926269][T32354] name failslab, interval 1, probability 0, space 0, times 0 [ 1862.954459][T32353] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1862.962196][T32354] CPU: 1 PID: 32354 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1862.973369][T32354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1862.983442][T32354] Call Trace: [ 1862.986764][T32354] dump_stack+0x172/0x1f0 [ 1862.991128][T32354] should_fail.cold+0xa/0x15 [ 1862.995737][T32354] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1863.001566][T32354] ? ___might_sleep+0x163/0x280 [ 1863.006444][T32354] __should_failslab+0x121/0x190 [ 1863.011402][T32354] should_failslab+0x9/0x14 [ 1863.015922][T32354] __kmalloc_track_caller+0x2d8/0x740 [ 1863.021312][T32354] ? vfs_parse_fs_string+0xe8/0x170 [ 1863.026535][T32354] kmemdup_nul+0x31/0xa0 [ 1863.030794][T32354] vfs_parse_fs_string+0xe8/0x170 [ 1863.035845][T32354] ? vfs_parse_fs_param+0x510/0x510 [ 1863.041063][T32354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.047323][T32354] ? alloc_fs_context+0x3bb/0x640 [ 1863.052386][T32354] vfs_kern_mount.part.0+0x73/0xf0 [ 1863.057537][T32354] vfs_kern_mount+0x40/0x60 [ 1863.063427][T32354] btrfs_mount+0x2b4/0x15e2 [ 1863.067957][T32354] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1863.073217][T32354] ? fs_parse+0x57e/0xfc0 [ 1863.077596][T32354] ? btrfs_remount+0x11f0/0x11f0 [ 1863.086133][T32354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.092419][T32354] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1863.098658][T32354] ? selinux_sb_show_options+0x550/0x550 [ 1863.104326][T32354] ? rcu_read_lock_sched_held+0x110/0x130 [ 1863.110080][T32354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.116353][T32354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.122627][T32354] ? vfs_parse_fs_string+0x111/0x170 [ 1863.127956][T32354] ? vfs_parse_fs_string+0x111/0x170 [ 1863.133286][T32354] ? rcu_read_lock_sched_held+0x110/0x130 [ 1863.139035][T32354] ? kfree+0x1fa/0x230 [ 1863.143138][T32354] ? vfs_parse_fs_string+0x116/0x170 [ 1863.148456][T32354] ? btrfs_remount+0x11f0/0x11f0 [ 1863.153421][T32354] legacy_get_tree+0xf2/0x200 [ 1863.158127][T32354] ? btrfs_remount+0x11f0/0x11f0 [ 1863.163103][T32354] ? legacy_get_tree+0xf2/0x200 [ 1863.168948][T32354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.175221][T32354] vfs_get_tree+0x123/0x450 [ 1863.179756][T32354] do_mount+0x1436/0x2c40 [ 1863.184116][T32354] ? copy_mount_string+0x40/0x40 [ 1863.189079][T32354] ? _copy_from_user+0xdd/0x150 [ 1863.193953][T32354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.200212][T32354] ? copy_mount_options+0x280/0x3a0 [ 1863.205448][T32354] ksys_mount+0xdb/0x150 [ 1863.209721][T32354] __x64_sys_mount+0xbe/0x150 [ 1863.214428][T32354] do_syscall_64+0x103/0x610 [ 1863.219042][T32354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1863.224947][T32354] RIP: 0033:0x45b81a [ 1863.228856][T32354] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 08:14:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x500) 08:14:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8100}, 0x0) [ 1863.248484][T32354] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1863.257021][T32354] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1863.265038][T32354] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1863.273047][T32354] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1863.281052][T32354] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1863.289052][T32354] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210ed, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1863.321500][T32465] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1863.351002][T32464] SELinux: failed to load policy [ 1863.356575][T32467] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a5800000000000000000000000000000100000000007a00"/96], 0x60) 08:14:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x600) 08:14:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 08:14:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1863.445671][T32474] SELinux: failed to load policy [ 1863.521412][T32481] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1863.544623][T32478] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:09 executing program 0 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000000100"/96], 0x60) 08:14:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 08:14:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x700) 08:14:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210ee, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1863.657117][T32589] SELinux: failed to load policy [ 1863.663487][T32588] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1863.714922][T32594] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 08:14:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000000200"/96], 0x60) [ 1863.763136][T32596] FAULT_INJECTION: forcing a failure. [ 1863.763136][T32596] name failslab, interval 1, probability 0, space 0, times 0 [ 1863.823395][T32596] CPU: 0 PID: 32596 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1863.831431][T32596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1863.831440][T32596] Call Trace: [ 1863.831471][T32596] dump_stack+0x172/0x1f0 [ 1863.831496][T32596] should_fail.cold+0xa/0x15 [ 1863.831521][T32596] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1863.859592][T32596] ? ___might_sleep+0x163/0x280 [ 1863.864474][T32596] __should_failslab+0x121/0x190 [ 1863.869435][T32596] should_failslab+0x9/0x14 [ 1863.869455][T32596] kmem_cache_alloc_trace+0x2d1/0x760 [ 1863.869470][T32596] ? kasan_kmalloc+0x9/0x10 [ 1863.869486][T32596] ? __kmalloc_node+0x4e/0x70 [ 1863.869510][T32596] btrfs_mount_root+0x1d0/0x1220 [ 1863.869532][T32596] ? btrfs_decode_error+0x70/0x70 [ 1863.888689][T32596] ? selinux_sb_show_options+0x550/0x550 [ 1863.888714][T32596] ? rcu_read_lock_sched_held+0x110/0x130 [ 1863.888730][T32596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.888745][T32596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.888766][T32596] ? vfs_parse_fs_string+0x111/0x170 [ 1863.904402][T32596] ? vfs_parse_fs_string+0x111/0x170 [ 1863.904422][T32596] ? rcu_read_lock_sched_held+0x110/0x130 [ 1863.904439][T32596] ? kfree+0x1fa/0x230 [ 1863.904455][T32596] ? vfs_parse_fs_string+0x116/0x170 [ 1863.904476][T32596] ? btrfs_decode_error+0x70/0x70 [ 1863.904490][T32596] legacy_get_tree+0xf2/0x200 [ 1863.904520][T32596] vfs_get_tree+0x123/0x450 [ 1863.916498][T32596] fc_mount+0x17/0xc0 [ 1863.916519][T32596] vfs_kern_mount.part.0+0xd8/0xf0 [ 1863.916538][T32596] vfs_kern_mount+0x40/0x60 [ 1863.916565][T32596] btrfs_mount+0x2b4/0x15e2 [ 1863.928101][T32596] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1863.943134][T32596] ? fs_parse+0x57e/0xfc0 [ 1863.943164][T32596] ? btrfs_remount+0x11f0/0x11f0 [ 1863.943181][T32596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.943205][T32596] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1863.958188][T32596] ? selinux_sb_show_options+0x550/0x550 [ 1863.971755][T32596] ? rcu_read_lock_sched_held+0x110/0x130 [ 1863.971773][T32596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.971789][T32596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.971806][T32596] ? vfs_parse_fs_string+0x111/0x170 [ 1863.971831][T32596] ? vfs_parse_fs_string+0x111/0x170 [ 1863.986039][T32596] ? rcu_read_lock_sched_held+0x110/0x130 [ 1863.986060][T32596] ? kfree+0x1fa/0x230 [ 1863.986078][T32596] ? vfs_parse_fs_string+0x116/0x170 [ 1863.986105][T32596] ? btrfs_remount+0x11f0/0x11f0 [ 1863.995367][T32596] legacy_get_tree+0xf2/0x200 [ 1863.995386][T32596] ? btrfs_remount+0x11f0/0x11f0 [ 1863.995399][T32596] ? legacy_get_tree+0xf2/0x200 [ 1863.995414][T32596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1863.995430][T32596] vfs_get_tree+0x123/0x450 [ 1863.995446][T32596] do_mount+0x1436/0x2c40 [ 1863.995476][T32596] ? copy_mount_string+0x40/0x40 [ 1864.019395][T32596] ? _copy_from_user+0xdd/0x150 [ 1864.019418][T32596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1864.019432][T32596] ? copy_mount_options+0x280/0x3a0 [ 1864.019450][T32596] ksys_mount+0xdb/0x150 [ 1864.019472][T32596] __x64_sys_mount+0xbe/0x150 [ 1864.037683][T32596] do_syscall_64+0x103/0x610 [ 1864.037705][T32596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1864.037718][T32596] RIP: 0033:0x45b81a [ 1864.037734][T32596] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1864.037743][T32596] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:14:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xa00) [ 1864.037759][T32596] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1864.037768][T32596] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1864.037776][T32596] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1864.037792][T32596] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1864.052984][T32596] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1864.226084][T32610] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1864.255348][T32609] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 08:14:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000000300"/96], 0x60) 08:14:10 executing program 0 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xc00) 08:14:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210ef, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1864.379989][T32714] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 08:14:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000000400"/96], 0x60) [ 1864.454487][T32720] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xe00) [ 1864.512691][T32718] FAULT_INJECTION: forcing a failure. [ 1864.512691][T32718] name failslab, interval 1, probability 0, space 0, times 0 [ 1864.547294][T32718] CPU: 1 PID: 32718 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1864.555345][T32718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1864.565428][T32718] Call Trace: [ 1864.568753][T32718] dump_stack+0x172/0x1f0 [ 1864.573114][T32718] should_fail.cold+0xa/0x15 [ 1864.577737][T32718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1864.583570][T32718] ? ___might_sleep+0x163/0x280 [ 1864.588550][T32718] __should_failslab+0x121/0x190 [ 1864.593514][T32718] should_failslab+0x9/0x14 [ 1864.598037][T32718] kmem_cache_alloc_node_trace+0x270/0x720 [ 1864.603867][T32718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1864.610146][T32718] __kmalloc_node+0x3d/0x70 [ 1864.614689][T32718] kvmalloc_node+0xbd/0x100 [ 1864.619223][T32718] btrfs_mount_root+0x12b/0x1220 [ 1864.624243][T32718] ? btrfs_decode_error+0x70/0x70 [ 1864.629302][T32718] ? selinux_sb_show_options+0x550/0x550 [ 1864.634972][T32718] ? rcu_read_lock_sched_held+0x110/0x130 [ 1864.640733][T32718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1864.646994][T32718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1864.653266][T32718] ? vfs_parse_fs_string+0x111/0x170 [ 1864.658575][T32718] ? vfs_parse_fs_string+0x111/0x170 [ 1864.663886][T32718] ? rcu_read_lock_sched_held+0x110/0x130 [ 1864.669629][T32718] ? kfree+0x1fa/0x230 [ 1864.669649][T32718] ? vfs_parse_fs_string+0x116/0x170 [ 1864.669678][T32718] ? btrfs_decode_error+0x70/0x70 [ 1864.684049][T32718] legacy_get_tree+0xf2/0x200 [ 1864.684072][T32718] vfs_get_tree+0x123/0x450 [ 1864.684093][T32718] fc_mount+0x17/0xc0 [ 1864.684111][T32718] vfs_kern_mount.part.0+0xd8/0xf0 [ 1864.684126][T32718] vfs_kern_mount+0x40/0x60 [ 1864.684146][T32718] btrfs_mount+0x2b4/0x15e2 [ 1864.684158][T32718] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1864.684173][T32718] ? fs_parse+0x57e/0xfc0 [ 1864.684203][T32718] ? btrfs_remount+0x11f0/0x11f0 [ 1864.711448][T32718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1864.711471][T32718] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1864.711490][T32718] ? selinux_sb_show_options+0x550/0x550 [ 1864.711509][T32718] ? rcu_read_lock_sched_held+0x110/0x130 [ 1864.711529][T32718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1864.732260][T32718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1864.732280][T32718] ? vfs_parse_fs_string+0x111/0x170 [ 1864.732295][T32718] ? vfs_parse_fs_string+0x111/0x170 [ 1864.732313][T32718] ? rcu_read_lock_sched_held+0x110/0x130 [ 1864.732331][T32718] ? kfree+0x1fa/0x230 [ 1864.732350][T32718] ? vfs_parse_fs_string+0x116/0x170 [ 1864.756098][T32718] ? btrfs_remount+0x11f0/0x11f0 [ 1864.778614][T32718] legacy_get_tree+0xf2/0x200 [ 1864.778636][T32718] ? btrfs_remount+0x11f0/0x11f0 [ 1864.778649][T32718] ? legacy_get_tree+0xf2/0x200 [ 1864.778667][T32718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1864.778683][T32718] vfs_get_tree+0x123/0x450 [ 1864.778703][T32718] do_mount+0x1436/0x2c40 [ 1864.792988][T32718] ? copy_mount_string+0x40/0x40 [ 1864.793008][T32718] ? _copy_from_user+0xdd/0x150 [ 1864.793030][T32718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1864.793043][T32718] ? copy_mount_options+0x280/0x3a0 [ 1864.793062][T32718] ksys_mount+0xdb/0x150 [ 1864.813840][T32718] __x64_sys_mount+0xbe/0x150 [ 1864.813864][T32718] do_syscall_64+0x103/0x610 [ 1864.813886][T32718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1864.813899][T32718] RIP: 0033:0x45b81a [ 1864.813913][T32718] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1864.813921][T32718] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1864.813936][T32718] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1864.813944][T32718] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1864.813952][T32718] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1864.813960][T32718] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1864.813976][T32718] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1864.950695][T32734] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000000500"/96], 0x60) 08:14:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:10 executing program 0 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1864.994366][T32737] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1865.014203][T32733] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:10 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 08:14:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x1b9d) 08:14:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000000600"/96], 0x60) [ 1865.143060][ T377] FAULT_INJECTION: forcing a failure. [ 1865.143060][ T377] name failslab, interval 1, probability 0, space 0, times 0 [ 1865.182752][ T381] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1865.201009][ T377] CPU: 1 PID: 377 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1865.208884][ T377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1865.208892][ T377] Call Trace: [ 1865.208922][ T377] dump_stack+0x172/0x1f0 [ 1865.208947][ T377] should_fail.cold+0xa/0x15 [ 1865.208967][ T377] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1865.208991][ T377] ? ___might_sleep+0x163/0x280 [ 1865.209012][ T377] __should_failslab+0x121/0x190 [ 1865.209031][ T377] should_failslab+0x9/0x14 [ 1865.209051][ T377] kmem_cache_alloc_trace+0x2d1/0x760 [ 1865.209069][ T377] ? kasan_kmalloc+0x9/0x10 [ 1865.209084][ T377] ? __kmalloc_node+0x4e/0x70 [ 1865.209109][ T377] btrfs_mount_root+0x1d0/0x1220 [ 1865.209134][ T377] ? btrfs_decode_error+0x70/0x70 [ 1865.209159][ T377] ? selinux_sb_show_options+0x550/0x550 [ 1865.226869][ T377] ? rcu_read_lock_sched_held+0x110/0x130 [ 1865.226888][ T377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.226904][ T377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.226921][ T377] ? vfs_parse_fs_string+0x111/0x170 [ 1865.226940][ T377] ? vfs_parse_fs_string+0x111/0x170 [ 1865.310413][ T377] ? rcu_read_lock_sched_held+0x110/0x130 [ 1865.316203][ T377] ? kfree+0x1fa/0x230 [ 1865.320389][ T377] ? vfs_parse_fs_string+0x116/0x170 [ 1865.325694][ T377] ? btrfs_decode_error+0x70/0x70 [ 1865.330738][ T377] legacy_get_tree+0xf2/0x200 [ 1865.335436][ T377] vfs_get_tree+0x123/0x450 [ 1865.339966][ T377] fc_mount+0x17/0xc0 [ 1865.343961][ T377] vfs_kern_mount.part.0+0xd8/0xf0 [ 1865.349100][ T377] vfs_kern_mount+0x40/0x60 [ 1865.353629][ T377] btrfs_mount+0x2b4/0x15e2 [ 1865.358144][ T377] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1865.363364][ T377] ? fs_parse+0x57e/0xfc0 [ 1865.367804][ T377] ? btrfs_remount+0x11f0/0x11f0 [ 1865.372770][ T377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.379041][ T377] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1865.385233][ T377] ? selinux_sb_show_options+0x550/0x550 [ 1865.390891][ T377] ? rcu_read_lock_sched_held+0x110/0x130 [ 1865.396628][ T377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.402886][ T377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.409153][ T377] ? vfs_parse_fs_string+0x111/0x170 [ 1865.414460][ T377] ? vfs_parse_fs_string+0x111/0x170 [ 1865.419764][ T377] ? rcu_read_lock_sched_held+0x110/0x130 [ 1865.425500][ T377] ? kfree+0x1fa/0x230 [ 1865.429588][ T377] ? vfs_parse_fs_string+0x116/0x170 [ 1865.434889][ T377] ? btrfs_remount+0x11f0/0x11f0 [ 1865.439841][ T377] legacy_get_tree+0xf2/0x200 [ 1865.444531][ T377] ? btrfs_remount+0x11f0/0x11f0 [ 1865.449473][ T377] ? legacy_get_tree+0xf2/0x200 [ 1865.454334][ T377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.460585][ T377] vfs_get_tree+0x123/0x450 [ 1865.465108][ T377] do_mount+0x1436/0x2c40 [ 1865.469462][ T377] ? copy_mount_string+0x40/0x40 [ 1865.474501][ T377] ? _copy_from_user+0xdd/0x150 [ 1865.479386][ T377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.485637][ T377] ? copy_mount_options+0x280/0x3a0 [ 1865.490857][ T377] ksys_mount+0xdb/0x150 [ 1865.495115][ T377] __x64_sys_mount+0xbe/0x150 [ 1865.499817][ T377] do_syscall_64+0x103/0x610 [ 1865.504425][ T377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1865.510330][ T377] RIP: 0033:0x45b81a [ 1865.514242][ T377] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1865.533885][ T377] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1865.542312][ T377] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1865.550301][ T377] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1865.558491][ T377] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1865.566492][ T377] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1865.574477][ T377] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 08:14:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x3f00) 08:14:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000000700"/96], 0x60) 08:14:11 executing program 0 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1865.705568][ T476] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1865.721540][ T494] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f1, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:11 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 08:14:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x4000) 08:14:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000000a00"/96], 0x60) [ 1865.857702][ T500] FAULT_INJECTION: forcing a failure. [ 1865.857702][ T500] name failslab, interval 1, probability 0, space 0, times 0 [ 1865.904468][ T500] CPU: 0 PID: 500 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1865.912338][ T500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1865.912346][ T500] Call Trace: [ 1865.912376][ T500] dump_stack+0x172/0x1f0 [ 1865.912401][ T500] should_fail.cold+0xa/0x15 [ 1865.912424][ T500] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1865.912450][ T500] ? ___might_sleep+0x163/0x280 [ 1865.930140][ T500] __should_failslab+0x121/0x190 [ 1865.930160][ T500] should_failslab+0x9/0x14 [ 1865.930179][ T500] kmem_cache_alloc_trace+0x2d1/0x760 [ 1865.930195][ T500] ? kasan_kmalloc+0x9/0x10 [ 1865.930210][ T500] ? __kmalloc_node+0x4e/0x70 [ 1865.930244][ T500] btrfs_mount_root+0x174/0x1220 [ 1865.940666][ T500] ? btrfs_decode_error+0x70/0x70 [ 1865.940686][ T500] ? selinux_sb_show_options+0x550/0x550 [ 1865.940707][ T500] ? rcu_read_lock_sched_held+0x110/0x130 [ 1865.940723][ T500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.940738][ T500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.940759][ T500] ? vfs_parse_fs_string+0x111/0x170 [ 1865.950539][ T500] ? vfs_parse_fs_string+0x111/0x170 [ 1865.950559][ T500] ? rcu_read_lock_sched_held+0x110/0x130 [ 1865.950578][ T500] ? kfree+0x1fa/0x230 [ 1865.950594][ T500] ? vfs_parse_fs_string+0x116/0x170 [ 1865.950615][ T500] ? btrfs_decode_error+0x70/0x70 [ 1865.950634][ T500] legacy_get_tree+0xf2/0x200 [ 1865.960505][ T500] vfs_get_tree+0x123/0x450 [ 1865.960528][ T500] fc_mount+0x17/0xc0 [ 1865.960547][ T500] vfs_kern_mount.part.0+0xd8/0xf0 [ 1865.960566][ T500] vfs_kern_mount+0x40/0x60 [ 1865.960586][ T500] btrfs_mount+0x2b4/0x15e2 [ 1865.960606][ T500] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1865.969782][ T500] ? fs_parse+0x57e/0xfc0 [ 1865.969809][ T500] ? btrfs_remount+0x11f0/0x11f0 [ 1865.969825][ T500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.969844][ T500] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1865.969862][ T500] ? selinux_sb_show_options+0x550/0x550 [ 1865.969885][ T500] ? rcu_read_lock_sched_held+0x110/0x130 [ 1865.979836][ T500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.979853][ T500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.979870][ T500] ? vfs_parse_fs_string+0x111/0x170 [ 1865.979885][ T500] ? vfs_parse_fs_string+0x111/0x170 [ 1865.979902][ T500] ? rcu_read_lock_sched_held+0x110/0x130 [ 1865.979919][ T500] ? kfree+0x1fa/0x230 [ 1865.979944][ T500] ? vfs_parse_fs_string+0x116/0x170 [ 1865.991291][ T500] ? btrfs_remount+0x11f0/0x11f0 [ 1865.991307][ T500] legacy_get_tree+0xf2/0x200 [ 1865.991331][ T500] ? btrfs_remount+0x11f0/0x11f0 [ 1865.991343][ T500] ? legacy_get_tree+0xf2/0x200 [ 1865.991360][ T500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.991377][ T500] vfs_get_tree+0x123/0x450 [ 1865.991398][ T500] do_mount+0x1436/0x2c40 [ 1866.003880][ T500] ? copy_mount_string+0x40/0x40 [ 1866.003899][ T500] ? copy_mount_options+0x1ea/0x3a0 [ 1866.003914][ T500] ? copy_mount_options+0x1f3/0x3a0 [ 1866.003932][ T500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1866.003946][ T500] ? copy_mount_options+0x280/0x3a0 [ 1866.003965][ T500] ksys_mount+0xdb/0x150 [ 1866.003981][ T500] __x64_sys_mount+0xbe/0x150 [ 1866.004001][ T500] do_syscall_64+0x103/0x610 [ 1866.004030][ T500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1866.014587][ T500] RIP: 0033:0x45b81a [ 1866.014604][ T500] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1866.014612][ T500] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1866.014628][ T500] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1866.014637][ T500] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1866.014646][ T500] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1866.014655][ T500] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1866.014664][ T500] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000002000"/96], 0x60) 08:14:12 executing program 0 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1866.368071][ T513] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1866.395983][ T509] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1866.458179][ T534] FAULT_INJECTION: forcing a failure. [ 1866.458179][ T534] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1866.471453][ T534] CPU: 1 PID: 534 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1866.479281][ T534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1866.489355][ T534] Call Trace: [ 1866.492673][ T534] dump_stack+0x172/0x1f0 [ 1866.497035][ T534] should_fail.cold+0xa/0x15 [ 1866.501661][ T534] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1866.507499][ T534] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1866.513334][ T534] ? __lock_acquire+0x548/0x3fb0 [ 1866.518295][ T534] ? legacy_get_tree+0xf2/0x200 [ 1866.523163][ T534] ? vfs_get_tree+0x123/0x450 [ 1866.527858][ T534] ? do_mount+0x1436/0x2c40 [ 1866.532374][ T534] ? ksys_mount+0xdb/0x150 [ 1866.536823][ T534] should_fail_alloc_page+0x50/0x60 [ 1866.542036][ T534] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1866.547432][ T534] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1866.553171][ T534] ? find_held_lock+0x35/0x130 [ 1866.557965][ T534] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1866.563816][ T534] cache_grow_begin+0x9c/0x860 [ 1866.568599][ T534] ? btrfs_mount_root+0x174/0x1220 [ 1866.573736][ T534] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1866.580000][ T534] kmem_cache_alloc_trace+0x67f/0x760 [ 1866.585387][ T534] ? kasan_kmalloc+0x9/0x10 [ 1866.585415][ T534] btrfs_mount_root+0x174/0x1220 [ 1866.585436][ T534] ? btrfs_decode_error+0x70/0x70 [ 1866.585453][ T534] ? selinux_sb_show_options+0x550/0x550 [ 1866.585472][ T534] ? rcu_read_lock_sched_held+0x110/0x130 [ 1866.585489][ T534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1866.585503][ T534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1866.585518][ T534] ? vfs_parse_fs_string+0x111/0x170 [ 1866.585530][ T534] ? vfs_parse_fs_string+0x111/0x170 [ 1866.585552][ T534] ? rcu_read_lock_sched_held+0x110/0x130 [ 1866.605649][ T534] ? kfree+0x1fa/0x230 [ 1866.605676][ T534] ? vfs_parse_fs_string+0x116/0x170 [ 1866.605696][ T534] ? btrfs_decode_error+0x70/0x70 08:14:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f2, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000003f00"/96], 0x60) 08:14:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 08:14:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x5865) 08:14:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed000a000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1866.605708][ T534] legacy_get_tree+0xf2/0x200 [ 1866.605725][ T534] vfs_get_tree+0x123/0x450 [ 1866.605744][ T534] fc_mount+0x17/0xc0 [ 1866.605761][ T534] vfs_kern_mount.part.0+0xd8/0xf0 [ 1866.605779][ T534] vfs_kern_mount+0x40/0x60 [ 1866.605803][ T534] btrfs_mount+0x2b4/0x15e2 [ 1866.624172][ T534] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1866.624189][ T534] ? fs_parse+0x57e/0xfc0 [ 1866.624213][ T534] ? btrfs_remount+0x11f0/0x11f0 [ 1866.624238][ T534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1866.624258][ T534] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1866.624280][ T534] ? selinux_sb_show_options+0x550/0x550 [ 1866.634859][ T534] ? rcu_read_lock_sched_held+0x110/0x130 [ 1866.634874][ T534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1866.634887][ T534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1866.634901][ T534] ? vfs_parse_fs_string+0x111/0x170 [ 1866.634913][ T534] ? vfs_parse_fs_string+0x111/0x170 [ 1866.634926][ T534] ? rcu_read_lock_sched_held+0x110/0x130 [ 1866.634941][ T534] ? kfree+0x1fa/0x230 [ 1866.634954][ T534] ? vfs_parse_fs_string+0x116/0x170 [ 1866.634976][ T534] ? btrfs_remount+0x11f0/0x11f0 [ 1866.634988][ T534] legacy_get_tree+0xf2/0x200 [ 1866.635003][ T534] ? btrfs_remount+0x11f0/0x11f0 [ 1866.635015][ T534] ? legacy_get_tree+0xf2/0x200 [ 1866.635029][ T534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1866.635050][ T534] vfs_get_tree+0x123/0x450 [ 1866.655579][ T534] do_mount+0x1436/0x2c40 [ 1866.664763][ T534] ? copy_mount_string+0x40/0x40 [ 1866.664786][ T534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1866.664798][ T534] ? copy_mount_options+0x280/0x3a0 [ 1866.664820][ T534] ksys_mount+0xdb/0x150 [ 1866.664835][ T534] __x64_sys_mount+0xbe/0x150 [ 1866.664854][ T534] do_syscall_64+0x103/0x610 [ 1866.664873][ T534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1866.664885][ T534] RIP: 0033:0x45b81a [ 1866.664901][ T534] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1866.664909][ T534] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1866.664931][ T534] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1866.678530][ T534] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1866.688223][ T534] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1866.688242][ T534] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1866.688249][ T534] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1866.782643][ T633] sel_write_load: 8 callbacks suppressed [ 1866.782651][ T633] SELinux: failed to load policy [ 1866.931984][ T628] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:12 executing program 0 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000004800"/96], 0x60) 08:14:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x6000) 08:14:12 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) 08:14:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f3, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1867.047968][ T727] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed000b000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1867.105802][ T742] SELinux: failed to load policy [ 1867.111418][ T744] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1867.140761][ T746] FAULT_INJECTION: forcing a failure. [ 1867.140761][ T746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 08:14:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x6558) [ 1867.154751][ T746] CPU: 0 PID: 746 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1867.162570][ T746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1867.173774][ T746] Call Trace: [ 1867.177094][ T746] dump_stack+0x172/0x1f0 [ 1867.181439][ T746] should_fail.cold+0xa/0x15 [ 1867.186038][ T746] ? legacy_get_tree+0xf2/0x200 [ 1867.190904][ T746] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1867.196730][ T746] ? __lock_acquire+0x548/0x3fb0 [ 1867.201681][ T746] ? do_syscall_64+0x103/0x610 [ 1867.206457][ T746] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1867.212555][ T746] should_fail_alloc_page+0x50/0x60 [ 1867.217775][ T746] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1867.223165][ T746] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1867.228892][ T746] ? find_held_lock+0x35/0x130 [ 1867.233671][ T746] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1867.234289][ T751] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1867.239495][ T746] cache_grow_begin+0x9c/0x860 08:14:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x8100) [ 1867.239515][ T746] ? btrfs_mount_root+0x1d0/0x1220 [ 1867.239540][ T746] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1867.266523][ T746] kmem_cache_alloc_trace+0x67f/0x760 [ 1867.271911][ T746] ? kasan_kmalloc+0x9/0x10 [ 1867.276450][ T746] btrfs_mount_root+0x1d0/0x1220 [ 1867.281428][ T746] ? btrfs_decode_error+0x70/0x70 [ 1867.286467][ T746] ? selinux_sb_show_options+0x550/0x550 [ 1867.292113][ T746] ? rcu_read_lock_sched_held+0x110/0x130 [ 1867.297844][ T746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.304099][ T746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.310356][ T746] ? vfs_parse_fs_string+0x111/0x170 [ 1867.315658][ T746] ? vfs_parse_fs_string+0x111/0x170 [ 1867.320954][ T746] ? rcu_read_lock_sched_held+0x110/0x130 [ 1867.326689][ T746] ? kfree+0x1fa/0x230 [ 1867.330771][ T746] ? vfs_parse_fs_string+0x116/0x170 [ 1867.334662][ T754] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1867.336066][ T746] ? btrfs_decode_error+0x70/0x70 [ 1867.336082][ T746] legacy_get_tree+0xf2/0x200 08:14:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x9d1b) [ 1867.336103][ T746] vfs_get_tree+0x123/0x450 [ 1867.361164][ T746] fc_mount+0x17/0xc0 [ 1867.365167][ T746] vfs_kern_mount.part.0+0xd8/0xf0 [ 1867.370295][ T746] vfs_kern_mount+0x40/0x60 [ 1867.374818][ T746] btrfs_mount+0x2b4/0x15e2 [ 1867.379332][ T746] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1867.384535][ T746] ? fs_parse+0x57e/0xfc0 [ 1867.388882][ T746] ? btrfs_remount+0x11f0/0x11f0 [ 1867.393830][ T746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.400086][ T746] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1867.406262][ T746] ? selinux_sb_show_options+0x550/0x550 [ 1867.412011][ T746] ? rcu_read_lock_sched_held+0x110/0x130 [ 1867.417746][ T746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.423997][ T746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.430263][ T746] ? vfs_parse_fs_string+0x111/0x170 [ 1867.435556][ T746] ? vfs_parse_fs_string+0x111/0x170 [ 1867.440858][ T746] ? rcu_read_lock_sched_held+0x110/0x130 [ 1867.446591][ T746] ? kfree+0x1fa/0x230 [ 1867.450689][ T746] ? vfs_parse_fs_string+0x116/0x170 08:14:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xf000) [ 1867.455995][ T746] ? btrfs_remount+0x11f0/0x11f0 [ 1867.460946][ T746] legacy_get_tree+0xf2/0x200 [ 1867.465634][ T746] ? btrfs_remount+0x11f0/0x11f0 [ 1867.470588][ T746] ? legacy_get_tree+0xf2/0x200 [ 1867.475459][ T746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.481718][ T746] vfs_get_tree+0x123/0x450 [ 1867.486246][ T746] do_mount+0x1436/0x2c40 [ 1867.489092][ T760] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1867.490608][ T746] ? copy_mount_string+0x40/0x40 [ 1867.490625][ T746] ? copy_mount_options+0x1ea/0x3a0 [ 1867.490648][ T746] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 1867.517181][ T746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.523448][ T746] ? copy_mount_options+0x280/0x3a0 [ 1867.528665][ T746] ksys_mount+0xdb/0x150 [ 1867.532919][ T746] __x64_sys_mount+0xbe/0x150 [ 1867.537613][ T746] do_syscall_64+0x103/0x610 [ 1867.542223][ T746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1867.548134][ T746] RIP: 0033:0x45b81a 08:14:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xf0ffff) [ 1867.552037][ T746] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1867.571662][ T746] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1867.580183][ T746] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1867.588176][ T746] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1867.596173][ T746] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 08:14:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) [ 1867.604164][ T746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1867.612150][ T746] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1867.654359][ T769] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:13 executing program 0 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000004c00"/96], 0x60) 08:14:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x1000000) 08:14:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) [ 1867.758603][ T852] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1867.771835][ T863] SELinux: failed to load policy 08:14:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f4, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed240f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1867.803352][ T868] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1867.821537][ T883] FAULT_INJECTION: forcing a failure. [ 1867.821537][ T883] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1867.834802][ T883] CPU: 1 PID: 883 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1867.842633][ T883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1867.852714][ T883] Call Trace: [ 1867.856046][ T883] dump_stack+0x172/0x1f0 [ 1867.860416][ T883] should_fail.cold+0xa/0x15 [ 1867.865065][ T883] ? legacy_get_tree+0xf2/0x200 [ 1867.865094][ T883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1867.865121][ T883] ? __lock_acquire+0x548/0x3fb0 [ 1867.875807][ T883] ? do_syscall_64+0x103/0x610 [ 1867.875832][ T883] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1867.875853][ T883] should_fail_alloc_page+0x50/0x60 [ 1867.875869][ T883] __alloc_pages_nodemask+0x1a1/0x8d0 08:14:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 1867.875889][ T883] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1867.875902][ T883] ? find_held_lock+0x35/0x130 [ 1867.875924][ T883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1867.875943][ T883] cache_grow_begin+0x9c/0x860 [ 1867.875962][ T883] ? btrfs_mount_root+0x1d0/0x1220 [ 1867.875979][ T883] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1867.876008][ T883] kmem_cache_alloc_trace+0x67f/0x760 [ 1867.928561][ T883] ? kasan_kmalloc+0x9/0x10 [ 1867.928591][ T883] btrfs_mount_root+0x1d0/0x1220 08:14:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x2000000) 08:14:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000006000"/96], 0x60) [ 1867.928615][ T883] ? btrfs_decode_error+0x70/0x70 [ 1867.954737][ T883] ? selinux_sb_show_options+0x550/0x550 [ 1867.960409][ T883] ? rcu_read_lock_sched_held+0x110/0x130 [ 1867.966161][ T883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.972446][ T883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.978728][ T883] ? vfs_parse_fs_string+0x111/0x170 [ 1867.984047][ T883] ? vfs_parse_fs_string+0x111/0x170 [ 1867.989362][ T883] ? rcu_read_lock_sched_held+0x110/0x130 [ 1867.995100][ T883] ? kfree+0x1fa/0x230 [ 1867.995121][ T883] ? vfs_parse_fs_string+0x116/0x170 [ 1867.995143][ T883] ? btrfs_decode_error+0x70/0x70 [ 1867.995155][ T883] legacy_get_tree+0xf2/0x200 [ 1867.995171][ T883] vfs_get_tree+0x123/0x450 [ 1867.995190][ T883] fc_mount+0x17/0xc0 [ 1867.995207][ T883] vfs_kern_mount.part.0+0xd8/0xf0 [ 1867.995246][ T883] vfs_kern_mount+0x40/0x60 [ 1868.014303][ T883] btrfs_mount+0x2b4/0x15e2 [ 1868.014320][ T883] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1868.014338][ T883] ? fs_parse+0x57e/0xfc0 [ 1868.014359][ T883] ? btrfs_remount+0x11f0/0x11f0 [ 1868.014374][ T883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.014391][ T883] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1868.014407][ T883] ? selinux_sb_show_options+0x550/0x550 [ 1868.014423][ T883] ? rcu_read_lock_sched_held+0x110/0x130 [ 1868.014437][ T883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.014451][ T883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.014464][ T883] ? vfs_parse_fs_string+0x111/0x170 [ 1868.014477][ T883] ? vfs_parse_fs_string+0x111/0x170 [ 1868.014492][ T883] ? rcu_read_lock_sched_held+0x110/0x130 [ 1868.014508][ T883] ? kfree+0x1fa/0x230 [ 1868.014530][ T883] ? vfs_parse_fs_string+0x116/0x170 [ 1868.023055][ T883] ? btrfs_remount+0x11f0/0x11f0 [ 1868.023072][ T883] legacy_get_tree+0xf2/0x200 [ 1868.023088][ T883] ? btrfs_remount+0x11f0/0x11f0 [ 1868.023100][ T883] ? legacy_get_tree+0xf2/0x200 [ 1868.023124][ T883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.032757][ T883] vfs_get_tree+0x123/0x450 [ 1868.032778][ T883] do_mount+0x1436/0x2c40 [ 1868.032805][ T883] ? copy_mount_string+0x40/0x40 [ 1868.058025][ T883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.058036][ T883] ? copy_mount_options+0x280/0x3a0 [ 1868.058046][ T883] ksys_mount+0xdb/0x150 [ 1868.058056][ T883] __x64_sys_mount+0xbe/0x150 [ 1868.058068][ T883] do_syscall_64+0x103/0x610 [ 1868.058081][ T883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1868.058089][ T883] RIP: 0033:0x45b81a [ 1868.058099][ T883] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1868.058103][ T883] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1868.058112][ T883] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1868.058117][ T883] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1868.058122][ T883] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1868.058127][ T883] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1868.058132][ T883] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1868.136995][ T898] SELinux: failed to load policy [ 1868.300027][ T897] SELinux: failed to load policy [ 1868.306055][ T895] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:14 executing program 0 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000006800"/96], 0x60) [ 1868.355045][ T899] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 08:14:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed2010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x3000000) [ 1868.474991][ T1001] SELinux: failed to load policy [ 1868.484943][ T1003] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1868.497745][ T1006] FAULT_INJECTION: forcing a failure. [ 1868.497745][ T1006] name failslab, interval 1, probability 0, space 0, times 0 [ 1868.543934][ T1006] CPU: 1 PID: 1006 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1868.551913][ T1006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1868.556388][ T1014] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1868.562002][ T1006] Call Trace: [ 1868.562082][ T1006] dump_stack+0x172/0x1f0 [ 1868.580604][ T1006] should_fail.cold+0xa/0x15 [ 1868.585238][ T1006] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1868.591085][ T1006] ? ___might_sleep+0x163/0x280 [ 1868.595975][ T1006] __should_failslab+0x121/0x190 [ 1868.600944][ T1006] should_failslab+0x9/0x14 [ 1868.605480][ T1006] __kmalloc_track_caller+0x2d8/0x740 [ 1868.610878][ T1006] ? btrfs_mount_root+0x1d0/0x1220 [ 1868.616025][ T1006] ? rcu_read_lock_sched_held+0x110/0x130 [ 1868.621781][ T1006] ? btrfs_mount_root+0x2b8/0x1220 [ 1868.626934][ T1006] kstrdup+0x3a/0x70 [ 1868.630857][ T1006] btrfs_mount_root+0x2b8/0x1220 [ 1868.635827][ T1006] ? btrfs_decode_error+0x70/0x70 08:14:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000006c00"/96], 0x60) 08:14:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x39280000}, 0x0) [ 1868.640874][ T1006] ? selinux_sb_show_options+0x550/0x550 [ 1868.646525][ T1006] ? rcu_read_lock_sched_held+0x110/0x130 [ 1868.652268][ T1006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.658541][ T1006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.664817][ T1006] ? vfs_parse_fs_string+0x111/0x170 [ 1868.670133][ T1006] ? vfs_parse_fs_string+0x111/0x170 [ 1868.675446][ T1006] ? rcu_read_lock_sched_held+0x110/0x130 [ 1868.681194][ T1006] ? kfree+0x1fa/0x230 [ 1868.685296][ T1006] ? vfs_parse_fs_string+0x116/0x170 [ 1868.690692][ T1006] ? btrfs_decode_error+0x70/0x70 [ 1868.690709][ T1006] legacy_get_tree+0xf2/0x200 [ 1868.690733][ T1006] vfs_get_tree+0x123/0x450 [ 1868.704958][ T1006] fc_mount+0x17/0xc0 [ 1868.708962][ T1006] vfs_kern_mount.part.0+0xd8/0xf0 [ 1868.714094][ T1006] vfs_kern_mount+0x40/0x60 [ 1868.718618][ T1006] btrfs_mount+0x2b4/0x15e2 [ 1868.718634][ T1006] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1868.718655][ T1006] ? fs_parse+0x57e/0xfc0 [ 1868.732692][ T1006] ? btrfs_remount+0x11f0/0x11f0 [ 1868.732711][ T1006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.732731][ T1006] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1868.732748][ T1006] ? selinux_sb_show_options+0x550/0x550 [ 1868.732771][ T1006] ? rcu_read_lock_sched_held+0x110/0x130 [ 1868.742672][ T1019] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1868.743948][ T1006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.743966][ T1006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.743984][ T1006] ? vfs_parse_fs_string+0x111/0x170 08:14:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f5, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) [ 1868.743998][ T1006] ? vfs_parse_fs_string+0x111/0x170 [ 1868.744016][ T1006] ? rcu_read_lock_sched_held+0x110/0x130 [ 1868.744033][ T1006] ? kfree+0x1fa/0x230 [ 1868.744053][ T1006] ? vfs_parse_fs_string+0x116/0x170 [ 1868.755870][ T1006] ? btrfs_remount+0x11f0/0x11f0 [ 1868.755888][ T1006] legacy_get_tree+0xf2/0x200 [ 1868.755903][ T1006] ? btrfs_remount+0x11f0/0x11f0 [ 1868.755922][ T1006] ? legacy_get_tree+0xf2/0x200 [ 1868.795615][ T1006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.795636][ T1006] vfs_get_tree+0x123/0x450 [ 1868.795653][ T1006] do_mount+0x1436/0x2c40 08:14:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x4000000) [ 1868.795672][ T1006] ? copy_mount_string+0x40/0x40 [ 1868.795693][ T1006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.795706][ T1006] ? copy_mount_options+0x280/0x3a0 [ 1868.795722][ T1006] ksys_mount+0xdb/0x150 [ 1868.795745][ T1006] __x64_sys_mount+0xbe/0x150 [ 1868.805565][ T1006] do_syscall_64+0x103/0x610 [ 1868.845285][ T1006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1868.845299][ T1006] RIP: 0033:0x45b81a [ 1868.845316][ T1006] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1868.845324][ T1006] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1868.845337][ T1006] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1868.845345][ T1006] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1868.845353][ T1006] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1868.845361][ T1006] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 08:14:14 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) [ 1868.845369][ T1006] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1868.867789][ T1022] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1868.960713][ T1020] SELinux: failed to load policy [ 1868.998106][ T1026] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000007400"/96], 0x60) 08:14:14 executing program 0 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x5000000) [ 1869.042167][ T1071] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed001f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48000000}, 0x0) 08:14:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f6, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1869.146170][ T1149] SELinux: failed to load policy [ 1869.154605][ T1150] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1869.170342][ T1151] FAULT_INJECTION: forcing a failure. [ 1869.170342][ T1151] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.224723][ T1157] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1869.230606][ T1151] CPU: 1 PID: 1151 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1869.243558][ T1151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1869.253628][ T1151] Call Trace: [ 1869.257114][ T1151] dump_stack+0x172/0x1f0 [ 1869.261463][ T1151] should_fail.cold+0xa/0x15 [ 1869.266078][ T1151] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1869.271906][ T1151] ? ___might_sleep+0x163/0x280 [ 1869.276778][ T1151] __should_failslab+0x121/0x190 [ 1869.281743][ T1151] should_failslab+0x9/0x14 [ 1869.286360][ T1151] __kmalloc+0x2dc/0x740 [ 1869.290626][ T1151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.296963][ T1151] ? btrfs_find_device+0x189/0x1d0 [ 1869.302094][ T1151] ? device_list_add+0xf16/0x14d0 [ 1869.307158][ T1151] device_list_add+0xf16/0x14d0 [ 1869.312039][ T1151] ? btrfs_rm_dev_replace_free_srcdev+0x300/0x300 [ 1869.318467][ T1151] ? ___might_sleep+0x163/0x280 [ 1869.323337][ T1151] btrfs_scan_one_device+0x378/0x720 [ 1869.328643][ T1151] ? btrfs_scan_one_device+0x378/0x720 [ 1869.334120][ T1151] ? device_list_add+0x14d0/0x14d0 [ 1869.339253][ T1151] ? trace_hardirqs_on+0x50/0x230 [ 1869.344300][ T1151] ? btrfs_mount_root+0xb36/0x1220 [ 1869.349436][ T1151] btrfs_mount_root+0x718/0x1220 [ 1869.354406][ T1151] ? btrfs_decode_error+0x70/0x70 [ 1869.359454][ T1151] ? selinux_sb_show_options+0x550/0x550 [ 1869.365125][ T1151] ? rcu_read_lock_sched_held+0x110/0x130 [ 1869.370868][ T1151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.377139][ T1151] ? vfs_parse_fs_string+0x111/0x170 [ 1869.382443][ T1151] ? vfs_parse_fs_string+0x111/0x170 [ 1869.387748][ T1151] ? rcu_read_lock_sched_held+0x110/0x130 [ 1869.393484][ T1151] ? kfree+0x1fa/0x230 [ 1869.397571][ T1151] ? vfs_parse_fs_string+0x116/0x170 [ 1869.402871][ T1151] ? btrfs_decode_error+0x70/0x70 [ 1869.407911][ T1151] legacy_get_tree+0xf2/0x200 [ 1869.412609][ T1151] vfs_get_tree+0x123/0x450 [ 1869.417152][ T1151] fc_mount+0x17/0xc0 [ 1869.421149][ T1151] vfs_kern_mount.part.0+0xd8/0xf0 [ 1869.426284][ T1151] vfs_kern_mount+0x40/0x60 [ 1869.430806][ T1151] btrfs_mount+0x2b4/0x15e2 [ 1869.435326][ T1151] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1869.440535][ T1151] ? fs_parse+0x57e/0xfc0 [ 1869.444894][ T1151] ? btrfs_remount+0x11f0/0x11f0 [ 1869.449861][ T1151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.456126][ T1151] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1869.462311][ T1151] ? selinux_sb_show_options+0x550/0x550 [ 1869.467991][ T1151] ? rcu_read_lock_sched_held+0x110/0x130 [ 1869.473733][ T1151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.480002][ T1151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.486300][ T1151] ? vfs_parse_fs_string+0x111/0x170 [ 1869.491630][ T1151] ? vfs_parse_fs_string+0x111/0x170 [ 1869.496966][ T1151] ? rcu_read_lock_sched_held+0x110/0x130 [ 1869.502728][ T1151] ? kfree+0x1fa/0x230 [ 1869.506839][ T1151] ? vfs_parse_fs_string+0x116/0x170 [ 1869.512179][ T1151] ? btrfs_remount+0x11f0/0x11f0 [ 1869.517158][ T1151] legacy_get_tree+0xf2/0x200 [ 1869.521862][ T1151] ? btrfs_remount+0x11f0/0x11f0 [ 1869.526831][ T1151] ? legacy_get_tree+0xf2/0x200 [ 1869.531702][ T1151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.537969][ T1151] vfs_get_tree+0x123/0x450 [ 1869.542500][ T1151] do_mount+0x1436/0x2c40 [ 1869.546858][ T1151] ? copy_mount_string+0x40/0x40 [ 1869.551824][ T1151] ? _copy_from_user+0xdd/0x150 [ 1869.556705][ T1151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.562964][ T1151] ? copy_mount_options+0x280/0x3a0 [ 1869.568193][ T1151] ksys_mount+0xdb/0x150 [ 1869.572485][ T1151] __x64_sys_mount+0xbe/0x150 [ 1869.577185][ T1151] do_syscall_64+0x103/0x610 [ 1869.581804][ T1151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1869.587722][ T1151] RIP: 0033:0x45b81a [ 1869.591631][ T1151] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1869.611274][ T1151] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 08:14:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000000000000007a00"/96], 0x60) 08:14:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4c000000}, 0x0) [ 1869.619708][ T1151] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1869.627701][ T1151] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1869.635690][ T1151] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1869.643683][ T1151] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1869.651679][ T1151] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 08:14:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x6000000) [ 1869.700508][ T1166] SELinux: failed to load policy [ 1869.704176][ T1165] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a58000000000000000000000000000001000000000000ffffffff00"/96], 0x60) 08:14:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) [ 1869.771448][ T1205] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:15 executing program 0 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x7000000) 08:14:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f7, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1869.892930][ T1284] SELinux: failed to load policy [ 1869.908837][ T1289] FAULT_INJECTION: forcing a failure. [ 1869.908837][ T1289] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.912524][ T1288] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1869.952887][ T1289] CPU: 0 PID: 1289 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1869.960845][ T1289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1869.963095][ T1293] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1869.970922][ T1289] Call Trace: [ 1869.970957][ T1289] dump_stack+0x172/0x1f0 [ 1869.970981][ T1289] should_fail.cold+0xa/0x15 [ 1869.971002][ T1289] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1869.971021][ T1289] ? find_held_lock+0x35/0x130 [ 1869.971113][ T1289] ? blk_queue_enter+0xbcd/0xe90 [ 1869.971140][ T1289] __should_failslab+0x121/0x190 [ 1870.014613][ T1289] should_failslab+0x9/0x14 [ 1870.019143][ T1289] kmem_cache_alloc_node+0x56/0x710 [ 1870.024377][ T1289] create_task_io_context+0x33/0x450 [ 1870.029686][ T1289] generic_make_request_checks+0x1a62/0x2090 [ 1870.035691][ T1289] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 1870.042657][ T1289] ? __lock_acquire+0x548/0x3fb0 [ 1870.047702][ T1289] ? bio_associate_blkg_from_css+0x4e5/0x990 [ 1870.053710][ T1289] generic_make_request+0x24c/0x12d0 [ 1870.059014][ T1289] ? blk_queue_enter+0xe90/0xe90 [ 1870.063968][ T1289] ? guard_bio_eod+0x1ce/0x6e0 [ 1870.068750][ T1289] ? find_held_lock+0x35/0x130 [ 1870.073524][ T1289] ? guard_bio_eod+0x1ce/0x6e0 [ 1870.078305][ T1289] submit_bio+0xba/0x480 [ 1870.078329][ T1289] ? submit_bio+0xba/0x480 [ 1870.078347][ T1289] ? generic_make_request+0x12d0/0x12d0 [ 1870.078373][ T1289] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1870.087030][ T1289] ? guard_bio_eod+0x295/0x6e0 [ 1870.087048][ T1289] submit_bh_wbc+0x5f7/0x7f0 [ 1870.087070][ T1289] block_read_full_page+0x7e4/0xd70 [ 1870.087090][ T1289] ? check_disk_change+0x140/0x140 [ 1870.087111][ T1289] ? __bread_gfp+0x300/0x300 [ 1870.087129][ T1289] ? add_to_page_cache_lru+0x34e/0x760 [ 1870.087147][ T1289] ? add_to_page_cache_locked+0x40/0x40 [ 1870.087170][ T1289] blkdev_readpage+0x1d/0x30 [ 1870.098440][ T1289] do_read_cache_page+0xc5c/0x14c0 [ 1870.098458][ T1289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.098475][ T1289] ? blkdev_writepages+0x30/0x30 [ 1870.098496][ T1289] ? blkdev_get+0xcc/0x990 [ 1870.098513][ T1289] ? pagecache_get_page+0x740/0x740 [ 1870.098534][ T1289] ? bd_may_claim+0xd0/0xd0 [ 1870.107891][ T1289] ? lookup_bdev.part.0+0x10e/0x1b0 [ 1870.107908][ T1289] ? blkdev_open+0x290/0x290 [ 1870.107924][ T1289] ? lock_downgrade+0x880/0x880 [ 1870.107951][ T1289] read_cache_page_gfp+0x6e/0x90 [ 1870.107973][ T1289] btrfs_scan_one_device+0x19b/0x720 [ 1870.107995][ T1289] ? kfree+0x173/0x230 [ 1870.198604][ T1289] ? device_list_add+0x14d0/0x14d0 [ 1870.203737][ T1289] ? trace_hardirqs_on+0x50/0x230 [ 1870.208779][ T1289] ? btrfs_mount_root+0xb36/0x1220 [ 1870.213913][ T1289] btrfs_mount_root+0x718/0x1220 [ 1870.218889][ T1289] ? btrfs_decode_error+0x70/0x70 [ 1870.223931][ T1289] ? selinux_sb_show_options+0x550/0x550 [ 1870.229583][ T1289] ? rcu_read_lock_sched_held+0x110/0x130 [ 1870.235333][ T1289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.241678][ T1289] ? vfs_parse_fs_string+0x111/0x170 [ 1870.246981][ T1289] ? vfs_parse_fs_string+0x111/0x170 [ 1870.252285][ T1289] ? rcu_read_lock_sched_held+0x110/0x130 [ 1870.258038][ T1289] ? kfree+0x1fa/0x230 [ 1870.262126][ T1289] ? vfs_parse_fs_string+0x116/0x170 [ 1870.267442][ T1289] ? btrfs_decode_error+0x70/0x70 [ 1870.272490][ T1289] legacy_get_tree+0xf2/0x200 [ 1870.277191][ T1289] vfs_get_tree+0x123/0x450 [ 1870.281721][ T1289] fc_mount+0x17/0xc0 [ 1870.285716][ T1289] vfs_kern_mount.part.0+0xd8/0xf0 [ 1870.290850][ T1289] vfs_kern_mount+0x40/0x60 [ 1870.295377][ T1289] btrfs_mount+0x2b4/0x15e2 [ 1870.299902][ T1289] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1870.305120][ T1289] ? fs_parse+0x57e/0xfc0 [ 1870.309471][ T1289] ? btrfs_remount+0x11f0/0x11f0 [ 1870.314422][ T1289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.320689][ T1289] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1870.326881][ T1289] ? selinux_sb_show_options+0x550/0x550 [ 1870.332717][ T1289] ? rcu_read_lock_sched_held+0x110/0x130 [ 1870.338469][ T1289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.344744][ T1289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.351020][ T1289] ? vfs_parse_fs_string+0x111/0x170 [ 1870.356343][ T1289] ? vfs_parse_fs_string+0x111/0x170 [ 1870.361687][ T1289] ? rcu_read_lock_sched_held+0x110/0x130 [ 1870.367439][ T1289] ? kfree+0x1fa/0x230 [ 1870.371536][ T1289] ? vfs_parse_fs_string+0x116/0x170 [ 1870.376846][ T1289] ? btrfs_remount+0x11f0/0x11f0 [ 1870.381795][ T1289] legacy_get_tree+0xf2/0x200 [ 1870.386604][ T1289] ? btrfs_remount+0x11f0/0x11f0 [ 1870.391572][ T1289] ? legacy_get_tree+0xf2/0x200 [ 1870.396442][ T1289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.402706][ T1289] vfs_get_tree+0x123/0x450 [ 1870.407240][ T1289] do_mount+0x1436/0x2c40 [ 1870.411601][ T1289] ? copy_mount_string+0x40/0x40 [ 1870.416556][ T1289] ? _copy_from_user+0xdd/0x150 [ 1870.421429][ T1289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.428815][ T1289] ? copy_mount_options+0x280/0x3a0 [ 1870.434031][ T1289] ksys_mount+0xdb/0x150 [ 1870.438294][ T1289] __x64_sys_mount+0xbe/0x150 [ 1870.443017][ T1289] do_syscall_64+0x103/0x610 [ 1870.447631][ T1289] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1870.453533][ T1289] RIP: 0033:0x45b81a [ 1870.457437][ T1289] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1870.477060][ T1289] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1870.485499][ T1289] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1870.493477][ T1289] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 08:14:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000200"/96], 0x60) 08:14:15 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x68000000}, 0x0) 08:14:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xa000000) [ 1870.501461][ T1289] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1870.509450][ T1289] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1870.517439][ T1289] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1870.559071][ T1304] BTRFS warning (device ): duplicate device fsid:devid for ecf6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop0 new:/dev/loop2 [ 1870.598520][ T1302] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6c000000}, 0x0) [ 1870.633500][ T1309] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:16 executing program 0 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000300"/96], 0x60) [ 1870.769289][ T1417] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1870.787756][ T1419] FAULT_INJECTION: forcing a failure. [ 1870.787756][ T1419] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1870.801026][ T1419] CPU: 1 PID: 1419 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1870.808950][ T1419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1870.819048][ T1419] Call Trace: [ 1870.822386][ T1419] dump_stack+0x172/0x1f0 [ 1870.826759][ T1419] should_fail.cold+0xa/0x15 [ 1870.826784][ T1419] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1870.837182][ T1419] ? __lock_acquire+0x548/0x3fb0 [ 1870.837206][ T1419] should_fail_alloc_page+0x50/0x60 [ 1870.837220][ T1419] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1870.837251][ T1419] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1870.837263][ T1419] ? find_held_lock+0x35/0x130 [ 1870.837286][ T1419] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1870.837310][ T1419] cache_grow_begin+0x9c/0x860 [ 1870.873866][ T1419] ? getname_kernel+0x53/0x370 [ 1870.878648][ T1419] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1870.884911][ T1419] kmem_cache_alloc+0x62d/0x6f0 [ 1870.884929][ T1419] ? fc_mount+0x17/0xc0 [ 1870.884951][ T1419] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 1870.893957][ T1419] ? vfs_kern_mount+0x40/0x60 [ 1870.893972][ T1419] ? legacy_get_tree+0xf2/0x200 [ 1870.893991][ T1419] getname_kernel+0x53/0x370 [ 1870.894007][ T1419] kern_path+0x20/0x40 08:14:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed1020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f8, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x74000000}, 0x0) [ 1870.894024][ T1419] lookup_bdev.part.0+0x7b/0x1b0 [ 1870.894038][ T1419] ? blkdev_open+0x290/0x290 [ 1870.894052][ T1419] ? lock_downgrade+0x880/0x880 [ 1870.894077][ T1419] blkdev_get_by_path+0x81/0x130 [ 1870.894101][ T1419] btrfs_scan_one_device+0xd3/0x720 [ 1870.936799][ T1419] ? kfree+0x173/0x230 [ 1870.936831][ T1419] ? device_list_add+0x14d0/0x14d0 [ 1870.936856][ T1419] ? trace_hardirqs_on+0x50/0x230 [ 1870.946136][ T1419] ? btrfs_mount_root+0xb36/0x1220 [ 1870.946158][ T1419] btrfs_mount_root+0x718/0x1220 [ 1870.946179][ T1419] ? btrfs_decode_error+0x70/0x70 [ 1870.946196][ T1419] ? selinux_sb_show_options+0x550/0x550 [ 1870.946215][ T1419] ? rcu_read_lock_sched_held+0x110/0x130 [ 1870.946241][ T1419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.946256][ T1419] ? vfs_parse_fs_string+0x111/0x170 [ 1870.946270][ T1419] ? vfs_parse_fs_string+0x111/0x170 [ 1870.946286][ T1419] ? rcu_read_lock_sched_held+0x110/0x130 [ 1870.946303][ T1419] ? kfree+0x1fa/0x230 [ 1870.946333][ T1419] ? vfs_parse_fs_string+0x116/0x170 [ 1870.966511][ T1419] ? btrfs_decode_error+0x70/0x70 08:14:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000400"/96], 0x60) [ 1870.966526][ T1419] legacy_get_tree+0xf2/0x200 [ 1870.966545][ T1419] vfs_get_tree+0x123/0x450 [ 1870.966563][ T1419] fc_mount+0x17/0xc0 [ 1870.966579][ T1419] vfs_kern_mount.part.0+0xd8/0xf0 [ 1870.966596][ T1419] vfs_kern_mount+0x40/0x60 [ 1870.966614][ T1419] btrfs_mount+0x2b4/0x15e2 [ 1870.966627][ T1419] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1870.966646][ T1419] ? fs_parse+0x57e/0xfc0 [ 1870.983058][ T1419] ? btrfs_remount+0x11f0/0x11f0 [ 1870.983077][ T1419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:14:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xc000000) [ 1870.983102][ T1419] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1871.015000][ T1419] ? selinux_sb_show_options+0x550/0x550 [ 1871.015022][ T1419] ? rcu_read_lock_sched_held+0x110/0x130 [ 1871.015036][ T1419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.015050][ T1419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.015067][ T1419] ? vfs_parse_fs_string+0x111/0x170 [ 1871.015081][ T1419] ? vfs_parse_fs_string+0x111/0x170 [ 1871.015095][ T1419] ? rcu_read_lock_sched_held+0x110/0x130 [ 1871.015112][ T1419] ? kfree+0x1fa/0x230 [ 1871.015128][ T1419] ? vfs_parse_fs_string+0x116/0x170 [ 1871.015154][ T1419] ? btrfs_remount+0x11f0/0x11f0 [ 1871.033450][ T1419] legacy_get_tree+0xf2/0x200 [ 1871.033471][ T1419] ? btrfs_remount+0x11f0/0x11f0 [ 1871.033482][ T1419] ? legacy_get_tree+0xf2/0x200 [ 1871.033499][ T1419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.033524][ T1419] vfs_get_tree+0x123/0x450 [ 1871.043151][ T1419] do_mount+0x1436/0x2c40 [ 1871.043176][ T1419] ? copy_mount_string+0x40/0x40 [ 1871.043200][ T1419] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.043220][ T1419] ? copy_mount_options+0x280/0x3a0 [ 1871.063550][ T1419] ksys_mount+0xdb/0x150 [ 1871.063570][ T1419] __x64_sys_mount+0xbe/0x150 [ 1871.063593][ T1419] do_syscall_64+0x103/0x610 [ 1871.063612][ T1419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1871.063624][ T1419] RIP: 0033:0x45b81a [ 1871.063639][ T1419] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1871.063647][ T1419] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1871.063660][ T1419] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1871.063668][ T1419] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1871.063676][ T1419] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1871.063684][ T1419] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1871.063692][ T1419] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1871.286203][ T1431] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1871.298325][ T1437] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000500"/96], 0x60) 08:14:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 08:14:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0xe000000) 08:14:17 executing program 0 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000600"/96], 0x60) 08:14:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210f9, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1871.457492][ T1550] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1871.476878][ T1551] FAULT_INJECTION: forcing a failure. [ 1871.476878][ T1551] name failslab, interval 1, probability 0, space 0, times 0 [ 1871.502622][ T1544] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1871.528433][ T1551] CPU: 1 PID: 1551 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1871.536391][ T1551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1871.546470][ T1551] Call Trace: [ 1871.549796][ T1551] dump_stack+0x172/0x1f0 08:14:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x10000000) [ 1871.554195][ T1551] should_fail.cold+0xa/0x15 [ 1871.558838][ T1551] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1871.564674][ T1551] ? ___might_sleep+0x163/0x280 [ 1871.569543][ T1551] __should_failslab+0x121/0x190 [ 1871.574500][ T1551] should_failslab+0x9/0x14 [ 1871.579019][ T1551] kmem_cache_alloc+0x2b2/0x6f0 [ 1871.583890][ T1551] ? mark_held_locks+0xf0/0xf0 [ 1871.588671][ T1551] getname_kernel+0x53/0x370 [ 1871.593278][ T1551] kern_path+0x20/0x40 [ 1871.597370][ T1551] lookup_bdev.part.0+0x7b/0x1b0 [ 1871.602325][ T1551] ? blkdev_open+0x290/0x290 [ 1871.606927][ T1551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.613180][ T1551] ? list_sort.part.0+0x605/0x8b0 [ 1871.618255][ T1551] blkdev_get_by_path+0x81/0x130 [ 1871.618304][ T1575] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1871.623215][ T1551] btrfs_get_bdev_and_sb+0x38/0x300 [ 1871.623247][ T1551] open_fs_devices+0x68e/0xbd0 [ 1871.623271][ T1551] ? find_fsid+0x2e0/0x2e0 [ 1871.623294][ T1551] ? memmove_extent_buffer.cold+0x44/0x44 [ 1871.654258][ T1551] btrfs_open_devices+0x147/0x170 [ 1871.659386][ T1551] btrfs_mount_root+0x79a/0x1220 [ 1871.664337][ T1551] ? btrfs_decode_error+0x70/0x70 [ 1871.664356][ T1551] ? selinux_sb_show_options+0x550/0x550 [ 1871.664375][ T1551] ? rcu_read_lock_sched_held+0x110/0x130 [ 1871.664391][ T1551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.664407][ T1551] ? vfs_parse_fs_string+0x111/0x170 [ 1871.664420][ T1551] ? vfs_parse_fs_string+0x111/0x170 [ 1871.664434][ T1551] ? rcu_read_lock_sched_held+0x110/0x130 [ 1871.664451][ T1551] ? kfree+0x1fa/0x230 [ 1871.664467][ T1551] ? vfs_parse_fs_string+0x116/0x170 [ 1871.664485][ T1551] ? btrfs_decode_error+0x70/0x70 [ 1871.664505][ T1551] legacy_get_tree+0xf2/0x200 [ 1871.680893][ T1551] vfs_get_tree+0x123/0x450 [ 1871.680916][ T1551] fc_mount+0x17/0xc0 [ 1871.680934][ T1551] vfs_kern_mount.part.0+0xd8/0xf0 [ 1871.680956][ T1551] vfs_kern_mount+0x40/0x60 [ 1871.692524][ T1551] btrfs_mount+0x2b4/0x15e2 [ 1871.692542][ T1551] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1871.692558][ T1551] ? fs_parse+0x57e/0xfc0 08:14:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000700"/96], 0x60) 08:14:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81000000}, 0x0) [ 1871.692587][ T1551] ? btrfs_remount+0x11f0/0x11f0 [ 1871.703593][ T1551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.703614][ T1551] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1871.703630][ T1551] ? selinux_sb_show_options+0x550/0x550 [ 1871.703648][ T1551] ? rcu_read_lock_sched_held+0x110/0x130 [ 1871.703663][ T1551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.703679][ T1551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.703695][ T1551] ? vfs_parse_fs_string+0x111/0x170 [ 1871.703708][ T1551] ? vfs_parse_fs_string+0x111/0x170 [ 1871.703723][ T1551] ? rcu_read_lock_sched_held+0x110/0x130 [ 1871.703740][ T1551] ? kfree+0x1fa/0x230 [ 1871.703754][ T1551] ? vfs_parse_fs_string+0x116/0x170 [ 1871.703773][ T1551] ? btrfs_remount+0x11f0/0x11f0 [ 1871.703783][ T1551] legacy_get_tree+0xf2/0x200 [ 1871.703796][ T1551] ? btrfs_remount+0x11f0/0x11f0 [ 1871.703806][ T1551] ? legacy_get_tree+0xf2/0x200 [ 1871.703835][ T1551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.731333][ T1551] vfs_get_tree+0x123/0x450 [ 1871.731354][ T1551] do_mount+0x1436/0x2c40 [ 1871.731376][ T1551] ? copy_mount_string+0x40/0x40 [ 1871.731397][ T1551] ? _copy_from_user+0xdd/0x150 [ 1871.745512][ T1551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.745528][ T1551] ? copy_mount_options+0x280/0x3a0 [ 1871.745548][ T1551] ksys_mount+0xdb/0x150 [ 1871.745562][ T1551] __x64_sys_mount+0xbe/0x150 [ 1871.745582][ T1551] do_syscall_64+0x103/0x610 [ 1871.745602][ T1551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1871.745614][ T1551] RIP: 0033:0x45b81a [ 1871.745629][ T1551] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1871.745637][ T1551] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1871.745652][ T1551] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1871.745661][ T1551] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1871.745669][ T1551] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1871.745685][ T1551] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1871.760137][ T1551] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1871.874738][ T1583] sel_write_load: 6 callbacks suppressed [ 1871.874745][ T1583] SELinux: failed to load policy 08:14:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x3f000000) [ 1872.004254][ T1580] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1872.059516][ T1582] SELinux: failed to load policy 08:14:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 08:14:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000000a00"/96], 0x60) 08:14:18 executing program 0 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1872.109363][ T1674] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210fa, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) 08:14:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x40000000) 08:14:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0f24000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1872.192473][ T1693] SELinux: failed to load policy [ 1872.199557][ T1694] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1872.256187][ T1696] FAULT_INJECTION: forcing a failure. [ 1872.256187][ T1696] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1872.269463][ T1696] CPU: 0 PID: 1696 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1872.277378][ T1696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1872.287456][ T1696] Call Trace: [ 1872.290786][ T1696] dump_stack+0x172/0x1f0 [ 1872.295145][ T1696] should_fail.cold+0xa/0x15 [ 1872.299760][ T1696] ? __lock_acquire+0x548/0x3fb0 08:14:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000004800"/96], 0x60) 08:14:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 1872.304719][ T1696] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1872.310540][ T1696] ? __lock_acquire+0x548/0x3fb0 [ 1872.315586][ T1696] should_fail_alloc_page+0x50/0x60 [ 1872.320803][ T1696] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1872.326190][ T1696] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1872.326207][ T1696] ? find_held_lock+0x35/0x130 [ 1872.326244][ T1696] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1872.326266][ T1696] cache_grow_begin+0x9c/0x860 [ 1872.326290][ T1696] ? getname_kernel+0x53/0x370 [ 1872.347349][ T1696] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1872.347372][ T1696] kmem_cache_alloc+0x62d/0x6f0 [ 1872.347396][ T1696] getname_kernel+0x53/0x370 [ 1872.347413][ T1696] kern_path+0x20/0x40 [ 1872.347432][ T1696] lookup_bdev.part.0+0x7b/0x1b0 [ 1872.347454][ T1696] ? blkdev_open+0x290/0x290 [ 1872.371998][ T1696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1872.372017][ T1696] ? list_sort.part.0+0x605/0x8b0 [ 1872.372044][ T1696] blkdev_get_by_path+0x81/0x130 [ 1872.372067][ T1696] btrfs_get_bdev_and_sb+0x38/0x300 [ 1872.392854][ T1696] open_fs_devices+0x68e/0xbd0 [ 1872.392881][ T1696] ? find_fsid+0x2e0/0x2e0 [ 1872.392905][ T1696] ? memmove_extent_buffer.cold+0x44/0x44 [ 1872.392925][ T1696] btrfs_open_devices+0x147/0x170 [ 1872.392954][ T1696] btrfs_mount_root+0x79a/0x1220 [ 1872.403086][ T1757] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1872.403200][ T1696] ? btrfs_decode_error+0x70/0x70 [ 1872.444601][ T1696] ? selinux_sb_show_options+0x550/0x550 [ 1872.450280][ T1696] ? rcu_read_lock_sched_held+0x110/0x130 08:14:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) [ 1872.456031][ T1696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1872.462302][ T1696] ? vfs_parse_fs_string+0x111/0x170 [ 1872.467615][ T1696] ? vfs_parse_fs_string+0x111/0x170 [ 1872.472917][ T1696] ? rcu_read_lock_sched_held+0x110/0x130 [ 1872.472937][ T1696] ? kfree+0x1fa/0x230 [ 1872.472955][ T1696] ? vfs_parse_fs_string+0x116/0x170 [ 1872.472976][ T1696] ? btrfs_decode_error+0x70/0x70 [ 1872.472995][ T1696] legacy_get_tree+0xf2/0x200 [ 1872.497792][ T1696] vfs_get_tree+0x123/0x450 [ 1872.497814][ T1696] fc_mount+0x17/0xc0 [ 1872.497832][ T1696] vfs_kern_mount.part.0+0xd8/0xf0 [ 1872.497850][ T1696] vfs_kern_mount+0x40/0x60 [ 1872.497872][ T1696] btrfs_mount+0x2b4/0x15e2 [ 1872.497886][ T1696] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1872.497903][ T1696] ? fs_parse+0x57e/0xfc0 [ 1872.497935][ T1696] ? btrfs_remount+0x11f0/0x11f0 [ 1872.513026][ T1812] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1872.516023][ T1696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 08:14:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 1872.516045][ T1696] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1872.516061][ T1696] ? selinux_sb_show_options+0x550/0x550 [ 1872.516079][ T1696] ? rcu_read_lock_sched_held+0x110/0x130 [ 1872.516094][ T1696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1872.516109][ T1696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1872.516133][ T1696] ? vfs_parse_fs_string+0x111/0x170 [ 1872.576222][ T1696] ? vfs_parse_fs_string+0x111/0x170 [ 1872.576255][ T1696] ? rcu_read_lock_sched_held+0x110/0x130 [ 1872.576273][ T1696] ? kfree+0x1fa/0x230 [ 1872.576289][ T1696] ? vfs_parse_fs_string+0x116/0x170 [ 1872.576324][ T1696] ? btrfs_remount+0x11f0/0x11f0 [ 1872.587855][ T1696] legacy_get_tree+0xf2/0x200 [ 1872.587876][ T1696] ? btrfs_remount+0x11f0/0x11f0 [ 1872.587888][ T1696] ? legacy_get_tree+0xf2/0x200 [ 1872.587905][ T1696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1872.587927][ T1696] vfs_get_tree+0x123/0x450 [ 1872.616922][ T1814] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1872.617889][ T1696] do_mount+0x1436/0x2c40 08:14:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 1872.617914][ T1696] ? copy_mount_string+0x40/0x40 [ 1872.617930][ T1696] ? _copy_from_user+0xdd/0x150 [ 1872.617955][ T1696] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1872.669692][ T1696] ? copy_mount_options+0x280/0x3a0 [ 1872.674925][ T1696] ksys_mount+0xdb/0x150 [ 1872.679187][ T1696] __x64_sys_mount+0xbe/0x150 [ 1872.679211][ T1696] do_syscall_64+0x103/0x610 [ 1872.679246][ T1696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1872.679260][ T1696] RIP: 0033:0x45b81a 08:14:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210fb, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1872.679281][ T1696] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1872.694629][ T1696] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1872.694645][ T1696] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1872.694655][ T1696] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1872.694665][ T1696] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 08:14:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 1872.694674][ T1696] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1872.694683][ T1696] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1872.750716][ T1818] SELinux: failed to load policy [ 1872.761290][ T1820] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1872.786800][ T1815] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000004c00"/96], 0x60) 08:14:18 executing program 0 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1872.869772][ T1826] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) 08:14:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000000000}, 0x0) [ 1872.945467][ T1857] SELinux: failed to load policy 08:14:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 08:14:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x60000000) 08:14:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000006000"/96], 0x60) 08:14:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x210fc, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14}]}}}]}, 0x3c}}, 0x0) [ 1873.016582][ T1915] FAULT_INJECTION: forcing a failure. [ 1873.016582][ T1915] name failslab, interval 1, probability 0, space 0, times 0 [ 1873.029800][ T1935] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1873.083793][ T1915] CPU: 0 PID: 1915 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1873.091747][ T1915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1873.101814][ T1915] Call Trace: [ 1873.105132][ T1915] dump_stack+0x172/0x1f0 [ 1873.109487][ T1915] should_fail.cold+0xa/0x15 [ 1873.114095][ T1915] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1873.119923][ T1915] ? ___might_sleep+0x163/0x280 [ 1873.124799][ T1915] __should_failslab+0x121/0x190 [ 1873.129785][ T1915] should_failslab+0x9/0x14 [ 1873.134306][ T1915] kmem_cache_alloc_trace+0x2d1/0x760 [ 1873.137948][ T1946] SELinux: failed to load policy [ 1873.139703][ T1915] ? bd_set_size+0xb0/0xb0 [ 1873.139725][ T1915] ? wait_for_completion+0x440/0x440 [ 1873.139750][ T1915] btrfs_alloc_device+0xb4/0x720 [ 1873.139775][ T1915] ? btrfs_find_device_by_devspec+0x5b0/0x5b0 [ 1873.166078][ T1915] ? blkdev_put+0x98/0x560 [ 1873.170510][ T1915] close_fs_devices.part.0+0x1af/0x790 [ 1873.176018][ T1915] btrfs_close_devices+0xa0/0x200 [ 1873.181070][ T1915] btrfs_mount_root+0xf0c/0x1220 [ 1873.186041][ T1915] ? btrfs_decode_error+0x70/0x70 [ 1873.191086][ T1915] ? selinux_sb_show_options+0x550/0x550 [ 1873.196740][ T1915] ? rcu_read_lock_sched_held+0x110/0x130 [ 1873.202478][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.208732][ T1915] ? vfs_parse_fs_string+0x111/0x170 [ 1873.214029][ T1915] ? vfs_parse_fs_string+0x111/0x170 [ 1873.219337][ T1915] ? rcu_read_lock_sched_held+0x110/0x130 [ 1873.225079][ T1915] ? kfree+0x1fa/0x230 [ 1873.229161][ T1915] ? vfs_parse_fs_string+0x116/0x170 [ 1873.234462][ T1915] ? btrfs_decode_error+0x70/0x70 [ 1873.239496][ T1915] legacy_get_tree+0xf2/0x200 [ 1873.244187][ T1915] vfs_get_tree+0x123/0x450 [ 1873.248713][ T1915] fc_mount+0x17/0xc0 [ 1873.252714][ T1915] vfs_kern_mount.part.0+0xd8/0xf0 [ 1873.257835][ T1915] vfs_kern_mount+0x40/0x60 [ 1873.262362][ T1915] btrfs_mount+0x2b4/0x15e2 [ 1873.266873][ T1915] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1873.272108][ T1915] ? fs_parse+0x57e/0xfc0 [ 1873.276464][ T1915] ? btrfs_remount+0x11f0/0x11f0 [ 1873.281416][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.287669][ T1915] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1873.293841][ T1915] ? selinux_sb_show_options+0x550/0x550 [ 1873.299500][ T1915] ? rcu_read_lock_sched_held+0x110/0x130 [ 1873.305248][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.311508][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.317772][ T1915] ? vfs_parse_fs_string+0x111/0x170 [ 1873.323084][ T1915] ? vfs_parse_fs_string+0x111/0x170 [ 1873.328388][ T1915] ? rcu_read_lock_sched_held+0x110/0x130 [ 1873.334124][ T1915] ? kfree+0x1fa/0x230 [ 1873.338206][ T1915] ? vfs_parse_fs_string+0x116/0x170 [ 1873.343525][ T1915] ? btrfs_remount+0x11f0/0x11f0 [ 1873.348482][ T1915] legacy_get_tree+0xf2/0x200 [ 1873.353176][ T1915] ? btrfs_remount+0x11f0/0x11f0 [ 1873.358126][ T1915] ? legacy_get_tree+0xf2/0x200 [ 1873.362998][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.369268][ T1915] vfs_get_tree+0x123/0x450 [ 1873.373794][ T1915] do_mount+0x1436/0x2c40 [ 1873.378141][ T1915] ? copy_mount_string+0x40/0x40 [ 1873.383088][ T1915] ? _copy_from_user+0xdd/0x150 [ 1873.387955][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.394205][ T1915] ? copy_mount_options+0x280/0x3a0 [ 1873.399430][ T1915] ksys_mount+0xdb/0x150 [ 1873.403685][ T1915] __x64_sys_mount+0xbe/0x150 [ 1873.408381][ T1915] do_syscall_64+0x103/0x610 [ 1873.412988][ T1915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1873.418888][ T1915] RIP: 0033:0x45b81a [ 1873.422793][ T1915] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1873.442417][ T1915] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1873.450854][ T1915] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1873.459201][ T1915] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1873.467203][ T1915] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1873.475201][ T1915] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 08:14:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 08:14:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000006800"/96], 0x60) [ 1873.483195][ T1915] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1873.504832][ T1947] (unnamed net_device) (uninitialized): option arp_all_targets: invalid value (18446744073709551615) [ 1873.514051][ T1915] ------------[ cut here ]------------ [ 1873.521485][ T1915] kernel BUG at fs/btrfs/volumes.c:1276! [ 1873.569556][ T1915] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1873.575712][ T1915] CPU: 0 PID: 1915 Comm: syz-executor.0 Not tainted 5.1.0-rc7+ #95 [ 1873.583642][ T1915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1873.593725][ T1915] RIP: 0010:close_fs_devices.part.0+0x5bf/0x790 [ 1873.599975][ T1915] Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 21 ad c6 fe <0f> 0b e8 1a ad c6 fe 0f 0b e8 13 ad c6 fe 0f 0b e9 16 ff ff ff e8 [ 1873.618053][ T1955] SELinux: failed to load policy [ 1873.619596][ T1915] RSP: 0018:ffff8880a3887770 EFLAGS: 00010246 [ 1873.619609][ T1915] RAX: 0000000000040000 RBX: ffff88808fc7b580 RCX: ffffc90005e77000 [ 1873.619629][ T1915] RDX: 0000000000040000 RSI: ffffffff82a9df8f RDI: 0000000000000007 [ 1873.646566][ T1915] RBP: ffff8880a38877e0 R08: ffff888089aca480 R09: ffffed1015d25bc8 [ 1873.654548][ T1915] R10: ffffed1015d25bc7 R11: ffff8880ae92de3b R12: 0000000000000000 [ 1873.662539][ T1915] R13: dffffc0000000000 R14: ffff888083751680 R15: fffffffffffffff4 [ 1873.670525][ T1915] FS: 00007f5eb3af3700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1873.679463][ T1915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1873.686054][ T1915] CR2: 00007ffd1a0680f8 CR3: 0000000064f09000 CR4: 00000000001406f0 [ 1873.694030][ T1915] Call Trace: [ 1873.697347][ T1915] btrfs_close_devices+0xa0/0x200 [ 1873.702385][ T1915] btrfs_mount_root+0xf0c/0x1220 [ 1873.707337][ T1915] ? btrfs_decode_error+0x70/0x70 [ 1873.712374][ T1915] ? selinux_sb_show_options+0x550/0x550 [ 1873.718011][ T1915] ? rcu_read_lock_sched_held+0x110/0x130 [ 1873.723733][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.729978][ T1915] ? vfs_parse_fs_string+0x111/0x170 [ 1873.735270][ T1915] ? vfs_parse_fs_string+0x111/0x170 [ 1873.740591][ T1915] ? rcu_read_lock_sched_held+0x110/0x130 [ 1873.746326][ T1915] ? kfree+0x1fa/0x230 [ 1873.750403][ T1915] ? vfs_parse_fs_string+0x116/0x170 [ 1873.755872][ T1915] ? btrfs_decode_error+0x70/0x70 [ 1873.760901][ T1915] legacy_get_tree+0xf2/0x200 [ 1873.765585][ T1915] vfs_get_tree+0x123/0x450 [ 1873.770101][ T1915] fc_mount+0x17/0xc0 [ 1873.774086][ T1915] vfs_kern_mount.part.0+0xd8/0xf0 [ 1873.779204][ T1915] vfs_kern_mount+0x40/0x60 [ 1873.783725][ T1915] btrfs_mount+0x2b4/0x15e2 [ 1873.788240][ T1915] ? fs_lookup_key.isra.0+0x96/0xc0 [ 1873.793444][ T1915] ? fs_parse+0x57e/0xfc0 [ 1873.797788][ T1915] ? btrfs_remount+0x11f0/0x11f0 [ 1873.802734][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.808985][ T1915] ? selinux_fs_context_parse_param+0xfe/0x160 [ 1873.815154][ T1915] ? selinux_sb_show_options+0x550/0x550 [ 1873.820799][ T1915] ? rcu_read_lock_sched_held+0x110/0x130 [ 1873.826616][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.832866][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.839117][ T1915] ? vfs_parse_fs_string+0x111/0x170 [ 1873.844411][ T1915] ? vfs_parse_fs_string+0x111/0x170 [ 1873.849703][ T1915] ? rcu_read_lock_sched_held+0x110/0x130 [ 1873.855437][ T1915] ? kfree+0x1fa/0x230 [ 1873.859514][ T1915] ? vfs_parse_fs_string+0x116/0x170 [ 1873.864812][ T1915] ? btrfs_remount+0x11f0/0x11f0 [ 1873.869762][ T1915] legacy_get_tree+0xf2/0x200 [ 1873.874455][ T1915] ? btrfs_remount+0x11f0/0x11f0 [ 1873.879408][ T1915] ? legacy_get_tree+0xf2/0x200 [ 1873.884282][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.890550][ T1915] vfs_get_tree+0x123/0x450 [ 1873.895061][ T1915] do_mount+0x1436/0x2c40 [ 1873.899403][ T1915] ? copy_mount_string+0x40/0x40 [ 1873.904351][ T1915] ? _copy_from_user+0xdd/0x150 [ 1873.909210][ T1915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.915467][ T1915] ? copy_mount_options+0x280/0x3a0 [ 1873.920707][ T1915] ksys_mount+0xdb/0x150 [ 1873.924976][ T1915] __x64_sys_mount+0xbe/0x150 [ 1873.929674][ T1915] do_syscall_64+0x103/0x610 [ 1873.934283][ T1915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1873.940183][ T1915] RIP: 0033:0x45b81a [ 1873.944081][ T1915] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1873.963698][ T1915] RSP: 002b:00007f5eb3af2a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1873.972125][ T1915] RAX: ffffffffffffffda RBX: 00007f5eb3af2b40 RCX: 000000000045b81a [ 1873.980109][ T1915] RDX: 00007f5eb3af2ae0 RSI: 0000000020000000 RDI: 00007f5eb3af2b00 [ 1873.988096][ T1915] RBP: 0000000000000001 R08: 00007f5eb3af2b40 R09: 00007f5eb3af2ae0 [ 1873.996077][ T1915] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1874.004056][ T1915] R13: 00000000004c7853 R14: 00000000004dd868 R15: 0000000000000003 [ 1874.012044][ T1915] Modules linked in: 08:14:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x65580000) 08:14:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0xa, 0xf0ffffffffffff}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) [ 1874.023120][ T1949] kobject: 'bond128' (00000000e2f47897): kobject_add_internal: parent: 'net', set: 'devices' [ 1874.027614][ T3877] kobject: 'loop2' (00000000ccfd45f6): kobject_uevent_env [ 1874.055675][ T1949] kobject: 'bond128' (00000000e2f47897): kobject_uevent_env [ 1874.056873][ T3877] kobject: 'loop2' (00000000ccfd45f6): fill_kobj_path: path = '/devices/virtual/block/loop2' 08:14:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c11000000000009000007000000000000000000000000385a580000000000000000000000000000010000006c00"/96], 0x60) [ 1874.066898][ T1949] kobject: 'bond128' (00000000e2f47897): fill_kobj_path: path = '/devices/virtual/net/bond128' [ 1874.085877][ T1949] kobject: 'queues' (000000004ee9f3eb): kobject_add_internal: parent: 'bond128', set: '' [ 1874.096780][ T3877] kobject: 'loop0' (00000000fbcd982b): kobject_uevent_env [ 1874.096789][ T1949] kobject: 'queues' (000000004ee9f3eb): kobject_uevent_env [ 1874.096805][ T1949] kobject: 'queues' (000000004ee9f3eb): kobject_uevent_env: filter function caused the event to drop! [ 1874.106997][ T1957] kobject: 'loop2' (00000000ccfd45f6): kobject_uevent_env [ 1874.112743][ T1949] kobject: 'rx-0' (000000008fb02d96): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.123632][ T3877] kobject: 'loop0' (00000000fbcd982b): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1874.130504][ T1949] kobject: 'rx-0' (000000008fb02d96): kobject_uevent_env [ 1874.146018][ T1957] kobject: 'loop2' (00000000ccfd45f6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1874.151080][ T1949] kobject: 'rx-0' (000000008fb02d96): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-0' [ 1874.179357][ T1949] kobject: 'rx-1' (00000000b76ae7bf): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.192007][ T1949] kobject: 'rx-1' (00000000b76ae7bf): kobject_uevent_env [ 1874.194868][ T3877] kobject: 'loop2' (00000000ccfd45f6): kobject_uevent_env [ 1874.199546][ T1949] kobject: 'rx-1' (00000000b76ae7bf): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-1' [ 1874.214789][ T3877] kobject: 'loop2' (00000000ccfd45f6): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1874.218958][ T1949] kobject: 'rx-2' (000000001aa2dac3): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.230156][ T3877] kobject: 'loop1' (000000009a7a5ea1): kobject_uevent_env [ 1874.238370][ T1949] kobject: 'rx-2' (000000001aa2dac3): kobject_uevent_env [ 1874.247904][ T3877] kobject: 'loop1' (000000009a7a5ea1): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1874.252583][ T1949] kobject: 'rx-2' (000000001aa2dac3): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-2' [ 1874.263147][ T3877] kobject: 'loop3' (0000000004d4a9fc): kobject_uevent_env [ 1874.275078][ T1965] SELinux: failed to load policy [ 1874.283500][ T3877] kobject: 'loop3' (0000000004d4a9fc): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1874.286865][ T1949] kobject: 'rx-3' (000000005e127d19): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.308981][ T1949] kobject: 'rx-3' (000000005e127d19): kobject_uevent_env [ 1874.316576][ T1949] kobject: 'rx-3' (000000005e127d19): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-3' [ 1874.328460][ T1949] kobject: 'rx-4' (00000000833d3ed1): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.341525][ T1949] kobject: 'rx-4' (00000000833d3ed1): kobject_uevent_env [ 1874.349276][ T1949] kobject: 'rx-4' (00000000833d3ed1): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-4' [ 1874.361581][ T1949] kobject: 'rx-5' (000000009b50088c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.372624][ T1949] kobject: 'rx-5' (000000009b50088c): kobject_uevent_env [ 1874.380489][ T1949] kobject: 'rx-5' (000000009b50088c): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-5' [ 1874.392730][ T1949] kobject: 'rx-6' (0000000049c8120f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.403816][ T1949] kobject: 'rx-6' (0000000049c8120f): kobject_uevent_env [ 1874.411245][ T1949] kobject: 'rx-6' (0000000049c8120f): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-6' [ 1874.424020][ T1949] kobject: 'rx-7' (00000000068aea85): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.435020][ T1949] kobject: 'rx-7' (00000000068aea85): kobject_uevent_env [ 1874.442408][ T1949] kobject: 'rx-7' (00000000068aea85): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-7' [ 1874.443640][ T1915] ---[ end trace f3eddd5e080f8279 ]--- [ 1874.455120][ T1949] kobject: 'rx-8' (00000000f7fcf29f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.467799][ T1915] RIP: 0010:close_fs_devices.part.0+0x5bf/0x790 [ 1874.470597][ T1949] kobject: 'rx-8' (00000000f7fcf29f): kobject_uevent_env [ 1874.484105][ T1949] kobject: 'rx-8' (00000000f7fcf29f): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-8' [ 1874.487371][ T1915] Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 21 ad c6 fe <0f> 0b e8 1a ad c6 fe 0f 0b e8 13 ad c6 fe 0f 0b e9 16 ff ff ff e8 [ 1874.496559][ T1949] kobject: 'rx-9' (000000005295f63e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.526549][ T1949] kobject: 'rx-9' (000000005295f63e): kobject_uevent_env [ 1874.534626][ T1949] kobject: 'rx-9' (000000005295f63e): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-9' [ 1874.547394][ T1949] kobject: 'rx-10' (00000000e1fdf58f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.558395][ T1915] RSP: 0018:ffff8880a3887770 EFLAGS: 00010246 [ 1874.565456][ T1949] kobject: 'rx-10' (00000000e1fdf58f): kobject_uevent_env [ 1874.573000][ T1949] kobject: 'rx-10' (00000000e1fdf58f): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-10' [ 1874.585193][ T1915] RAX: 0000000000040000 RBX: ffff88808fc7b580 RCX: ffffc90005e77000 [ 1874.594218][ T1949] kobject: 'rx-11' (0000000080a6acdf): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.605149][ T1915] RDX: 0000000000040000 RSI: ffffffff82a9df8f RDI: 0000000000000007 [ 1874.614131][ T1949] kobject: 'rx-11' (0000000080a6acdf): kobject_uevent_env [ 1874.621668][ T1949] kobject: 'rx-11' (0000000080a6acdf): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-11' [ 1874.633916][ T1915] RBP: ffff8880a38877e0 R08: ffff888089aca480 R09: ffffed1015d25bc8 [ 1874.642028][ T1915] R10: ffffed1015d25bc7 R11: ffff8880ae92de3b R12: 0000000000000000 [ 1874.651154][ T1949] kobject: 'rx-12' (00000000def296f7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.662360][ T1949] kobject: 'rx-12' (00000000def296f7): kobject_uevent_env [ 1874.670058][ T1915] R13: dffffc0000000000 R14: ffff888083751680 R15: fffffffffffffff4 [ 1874.679191][ T1949] kobject: 'rx-12' (00000000def296f7): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-12' [ 1874.691331][ T1915] FS: 00007f5eb3af3700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1874.701379][ T1949] kobject: 'rx-13' (00000000d6bf5895): kobject_add_internal: parent: 'queues', set: 'queues' [ 1874.712255][ T1915] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1874.719776][ T1949] kobject: 'rx-13' (00000000d6bf5895): kobject_uevent_env [ 1874.727415][ T1915] CR2: 00007faee382ddb8 CR3: 0000000064f09000 CR4: 00000000001406f0 [ 1874.736217][ T1949] kobject: 'rx-13' (00000000d6bf5895): fill_kobj_path: path = '/devices/virtual/net/bond128/queues/rx-13' [ 1874.748246][ T1915] Kernel panic - not syncing: Fatal exception [ 1874.755644][ T1915] Kernel Offset: disabled [ 1874.759973][ T1915] Rebooting in 86400 seconds..